(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:15 executing program 0: syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x11, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) r0 = socket(0x2000000000b, 0x0, 0x80000001) sendto$inet6(r0, &(0x7f0000000000)="29a8e0a9da0b05ca3bdb037a3e6d1fd4ad2ec3e93fc5f7464fa26723f3eccd6ab687cfdf5755c8f5577743b0dbcfcf530b4ef9dc6350fdc126984cb96de246b11764c1418ef10cb3cd00238f940ea2da45213593e4cf3e5bb4213ef58d3cca843ccccb8d416eed0d846cd7c2d300491ae3af4ec79e1f2ffdc5b590ef759b7518c552272d6349b8fde82e707f7b0cd9173e3777951d06132341a0d04b36ddd1a4547d28def581de67eb9046b689499340e8", 0xb1, 0x80, &(0x7f00000000c0)={0xa, 0x4e24, 0x5, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xc}}, 0x200000003}, 0x1c) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)) 2018/06/06 15:00:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffff97}, 0x0) 2018/06/06 15:00:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r3, &(0x7f0000000380)=""/235, 0x4a) r5 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r6, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r4, 0xffffffffffffffff, 0x1, 0x1}, 0x10) write(r5, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r7, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r5, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 538.928229] sit: Src spoofed 172.20.255.187/:: -> 224.0.0.1/:: 2018/06/06 15:00:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x40000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0x11}]}, 0x18}, 0x1}, 0x0) 2018/06/06 15:00:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 2018/06/06 15:00:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r5, 0x29, 0x19, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0xa) write(r6, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r7 = accept$netrom(0xffffffffffffff9c, 0x0, &(0x7f00000003c0)) ioctl$sock_netrom_TIOCOUTQ(r7, 0x5411, &(0x7f0000000400)) recvmsg$kcm(r4, &(0x7f0000003880)={&(0x7f0000003640)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000036c0)=""/143, 0x8f}, {&(0x7f0000003780)=""/147, 0x93}], 0x2, 0x0, 0x0, 0x1}, 0x10142) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r8, 0x111, 0x3, 0x0, 0x4) socketpair(0x5, 0x80000, 0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000240)={0xfffffffffffffff7, 0xce54, 0x2, 0xff, 0xfffffffffffffffb, 0xa8, 0x4, 0x7, r2}, 0x20) 2018/06/06 15:00:16 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c9924") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 538.994060] sit: Src spoofed 172.20.255.187/:: -> 224.0.0.1/:: 2018/06/06 15:00:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0x11}]}, 0x18}, 0x1}, 0x0) 2018/06/06 15:00:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3f00], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 539.122552] device veth0_to_bridge entered promiscuous mode 2018/06/06 15:00:16 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c9924") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:16 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 539.336526] device veth0_to_bridge left promiscuous mode [ 539.358742] FAULT_INJECTION: forcing a failure. [ 539.358742] name failslab, interval 1, probability 0, space 0, times 0 [ 539.370215] CPU: 1 PID: 12794 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 539.377500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.386859] Call Trace: [ 539.389458] dump_stack+0x1b9/0x294 [ 539.393102] ? dump_stack_print_info.cold.2+0x52/0x52 [ 539.398305] ? lock_downgrade+0x8e0/0x8e0 [ 539.402484] should_fail.cold.4+0xa/0x1a [ 539.406569] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 539.411685] ? __local_bh_enable_ip+0x161/0x230 [ 539.416388] ? _raw_spin_unlock_bh+0x30/0x40 [ 539.420817] ? release_sock+0x1e2/0x2b0 [ 539.424816] ? rcu_is_watching+0x85/0x140 [ 539.428986] ? __local_bh_enable_ip+0x161/0x230 [ 539.433670] ? __release_sock+0x3a0/0x3a0 [ 539.437836] ? find_held_lock+0x36/0x1c0 [ 539.441927] ? check_same_owner+0x320/0x320 [ 539.446264] ? rcu_note_context_switch+0x710/0x710 [ 539.451204] ? __netlink_lookup+0x5cf/0xaa0 [ 539.455536] __should_failslab+0x124/0x180 [ 539.459778] should_failslab+0x9/0x14 [ 539.463588] kmem_cache_alloc_node+0x272/0x780 [ 539.468180] ? find_held_lock+0x36/0x1c0 [ 539.472255] __alloc_skb+0x111/0x780 [ 539.475982] ? skb_scrub_packet+0x580/0x580 [ 539.480318] ? rcu_is_watching+0x85/0x140 [ 539.484477] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 539.489693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 539.495240] ? netlink_autobind.isra.34+0x240/0x330 [ 539.500275] netlink_sendmsg+0xb01/0xfa0 [ 539.504355] ? netlink_unicast+0x740/0x740 [ 539.508604] ? security_socket_sendmsg+0x94/0xc0 [ 539.513372] ? netlink_unicast+0x740/0x740 [ 539.517624] sock_sendmsg+0xd5/0x120 [ 539.521351] ___sys_sendmsg+0x805/0x940 [ 539.525345] ? copy_msghdr_from_user+0x560/0x560 [ 539.530128] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 539.535678] ? proc_fail_nth_write+0x96/0x1f0 [ 539.540187] ? __fget_light+0x2ef/0x430 [ 539.544167] ? fget_raw+0x20/0x20 [ 539.547626] ? find_held_lock+0x36/0x1c0 [ 539.551699] ? kasan_check_write+0x14/0x20 [ 539.555939] ? wait_for_completion+0x870/0x870 [ 539.560548] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 539.566094] ? sockfd_lookup_light+0xc5/0x160 [ 539.570604] __sys_sendmsg+0x115/0x270 [ 539.574501] ? __ia32_sys_shutdown+0x80/0x80 [ 539.578918] ? __sb_end_write+0xac/0xe0 [ 539.582893] ? fput+0x130/0x1a0 [ 539.586176] ? ksys_write+0x1a6/0x250 [ 539.590021] __x64_sys_sendmsg+0x78/0xb0 [ 539.594090] do_syscall_64+0x1b1/0x800 [ 539.597982] ? finish_task_switch+0x1ca/0x840 [ 539.602489] ? syscall_return_slowpath+0x5c0/0x5c0 [ 539.607414] ? syscall_return_slowpath+0x30f/0x5c0 [ 539.612329] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 539.617678] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 539.622509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.627681] RIP: 0033:0x455a09 2018/06/06 15:00:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x800600}, 0x0) 2018/06/06 15:00:16 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c9924") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:16 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x20003980, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:16 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:16 executing program 3 (fault-call:1 fault-nth:1): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r5, 0x29, 0x19, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0xa) write(r6, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r7 = accept$netrom(0xffffffffffffff9c, 0x0, &(0x7f00000003c0)) ioctl$sock_netrom_TIOCOUTQ(r7, 0x5411, &(0x7f0000000400)) recvmsg$kcm(r4, &(0x7f0000003880)={&(0x7f0000003640)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000036c0)=""/143, 0x8f}, {&(0x7f0000003780)=""/147, 0x93}], 0x2, 0x0, 0x0, 0x1}, 0x10142) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r8, 0x111, 0x3, 0x0, 0x4) socketpair(0x5, 0x80000, 0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000240)={0xfffffffffffffff7, 0xce54, 0x2, 0xff, 0xfffffffffffffffb, 0xa8, 0x4, 0x7, r2}, 0x20) [ 539.630853] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 539.638545] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 539.645801] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 539.653059] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 539.660319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 539.667594] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000000 [ 539.703792] device veth0_to_bridge entered promiscuous mode [ 539.744815] FAULT_INJECTION: forcing a failure. [ 539.744815] name failslab, interval 1, probability 0, space 0, times 0 [ 539.756120] CPU: 0 PID: 12835 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 539.763391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.772746] Call Trace: [ 539.775346] dump_stack+0x1b9/0x294 [ 539.778986] ? dump_stack_print_info.cold.2+0x52/0x52 [ 539.784194] ? is_bpf_text_address+0xd7/0x170 [ 539.788700] ? kernel_text_address+0x79/0xf0 2018/06/06 15:00:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 539.793120] ? __unwind_start+0x166/0x330 [ 539.797286] should_fail.cold.4+0xa/0x1a [ 539.801365] ? __save_stack_trace+0x7e/0xd0 [ 539.805698] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 539.810812] ? save_stack+0xa9/0xd0 [ 539.814442] ? save_stack+0x43/0xd0 [ 539.818071] ? kasan_kmalloc+0xc4/0xe0 [ 539.821959] ? kasan_slab_alloc+0x12/0x20 [ 539.826114] ? find_held_lock+0x36/0x1c0 [ 539.830203] ? check_same_owner+0x320/0x320 [ 539.834534] ? rcu_note_context_switch+0x710/0x710 [ 539.839474] __should_failslab+0x124/0x180 2018/06/06 15:00:16 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c992409") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 539.843714] should_failslab+0x9/0x14 [ 539.847526] kmem_cache_alloc_node_trace+0x26f/0x770 [ 539.852648] __kmalloc_node_track_caller+0x33/0x70 [ 539.857588] __kmalloc_reserve.isra.39+0x3a/0xe0 [ 539.862353] __alloc_skb+0x14d/0x780 [ 539.866076] ? skb_scrub_packet+0x580/0x580 [ 539.870410] ? rcu_is_watching+0x85/0x140 [ 539.874565] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 539.879776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 539.885319] ? netlink_autobind.isra.34+0x240/0x330 [ 539.890349] netlink_sendmsg+0xb01/0xfa0 2018/06/06 15:00:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 539.894417] ? netlink_unicast+0x740/0x740 [ 539.898659] ? security_socket_sendmsg+0x94/0xc0 [ 539.903425] ? netlink_unicast+0x740/0x740 [ 539.907668] sock_sendmsg+0xd5/0x120 [ 539.911389] ___sys_sendmsg+0x805/0x940 [ 539.915380] ? copy_msghdr_from_user+0x560/0x560 [ 539.920155] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 539.925701] ? proc_fail_nth_write+0x96/0x1f0 [ 539.930204] ? __fget_light+0x2ef/0x430 [ 539.934180] ? fget_raw+0x20/0x20 [ 539.934196] ? find_held_lock+0x36/0x1c0 [ 539.934218] ? kasan_check_write+0x14/0x20 [ 539.934241] ? wait_for_completion+0x870/0x870 [ 539.934264] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 539.934283] ? sockfd_lookup_light+0xc5/0x160 [ 539.960570] __sys_sendmsg+0x115/0x270 [ 539.963784] device veth0_to_bridge left promiscuous mode [ 539.964464] ? __ia32_sys_shutdown+0x80/0x80 [ 539.964483] ? __sb_end_write+0xac/0xe0 [ 539.964502] ? fput+0x130/0x1a0 [ 539.981561] ? ksys_write+0x1a6/0x250 [ 539.985381] __x64_sys_sendmsg+0x78/0xb0 [ 539.989451] do_syscall_64+0x1b1/0x800 [ 539.993345] ? finish_task_switch+0x1ca/0x840 [ 539.997843] ? syscall_return_slowpath+0x5c0/0x5c0 [ 540.002776] ? syscall_return_slowpath+0x30f/0x5c0 [ 540.007716] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 540.013082] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 540.017933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.023119] RIP: 0033:0x455a09 [ 540.026315] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 540.034030] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 2018/06/06 15:00:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:17 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c992409") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 540.041302] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 540.048574] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 540.055849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 540.063131] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000001 2018/06/06 15:00:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r5, 0x29, 0x19, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0xa) write(r6, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r7 = accept$netrom(0xffffffffffffff9c, 0x0, &(0x7f00000003c0)) ioctl$sock_netrom_TIOCOUTQ(r7, 0x5411, &(0x7f0000000400)) recvmsg$kcm(r4, &(0x7f0000003880)={&(0x7f0000003640)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000036c0)=""/143, 0x8f}, {&(0x7f0000003780)=""/147, 0x93}], 0x2, 0x0, 0x0, 0x1}, 0x10142) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r8, 0x111, 0x3, 0x0, 0x4) socketpair(0x5, 0x80000, 0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000240)={0xfffffffffffffff7, 0xce54, 0x2, 0xff, 0xfffffffffffffffb, 0xa8, 0x4, 0x7, r2}, 0x20) 2018/06/06 15:00:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3f000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 2018/06/06 15:00:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:17 executing program 3 (fault-call:1 fault-nth:2): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r4, &(0x7f0000000380)=""/235, 0x4a) r6 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r7, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r2, 0x1, 0x1}, 0x10) write(r6, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r8, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r6, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:17 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c992409") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 540.273106] device veth0_to_bridge entered promiscuous mode 2018/06/06 15:00:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r4, &(0x7f0000000380)=""/235, 0x4a) r6 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r7, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r2, 0x1, 0x1}, 0x10) write(r6, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r8, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r6, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x68000}, 0x0) 2018/06/06 15:00:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x4000000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 540.412302] device veth0_to_bridge left promiscuous mode [ 540.431690] FAULT_INJECTION: forcing a failure. [ 540.431690] name failslab, interval 1, probability 0, space 0, times 0 [ 540.443127] CPU: 0 PID: 12908 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 540.450407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.459766] Call Trace: [ 540.462370] dump_stack+0x1b9/0x294 [ 540.466018] ? dump_stack_print_info.cold.2+0x52/0x52 [ 540.471405] should_fail.cold.4+0xa/0x1a [ 540.475492] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 540.480613] ? print_usage_bug+0xc0/0xc0 [ 540.484692] ? graph_lock+0x170/0x170 [ 540.488509] ? find_held_lock+0x36/0x1c0 [ 540.492586] ? __lock_is_held+0xb5/0x140 [ 540.496670] ? check_same_owner+0x320/0x320 [ 540.501010] ? rcu_note_context_switch+0x710/0x710 [ 540.505953] __should_failslab+0x124/0x180 [ 540.510193] should_failslab+0x9/0x14 [ 540.514006] __kmalloc_track_caller+0x2c4/0x760 [ 540.518684] ? pointer+0xa10/0xa10 [ 540.522232] ? rcu_note_context_switch+0x710/0x710 [ 540.527169] ? __lock_acquire+0x7f5/0x5140 [ 540.531413] ? kasprintf+0xa2/0xc0 [ 540.534964] kvasprintf+0xa9/0x130 [ 540.538541] ? bust_spinlocks+0xe0/0xe0 [ 540.542530] kasprintf+0xa2/0xc0 [ 540.545908] ? kvasprintf_const+0x190/0x190 [ 540.550235] ? graph_lock+0x170/0x170 [ 540.554051] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 540.559255] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 540.564808] hwsim_new_radio_nl+0x3cd/0xa60 [ 540.569133] ? nla_parse+0x358/0x4a0 [ 540.572838] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 540.578028] ? __netlink_ns_capable+0x100/0x130 [ 540.582689] genl_family_rcv_msg+0x889/0x1120 [ 540.587187] ? genl_rcv+0x40/0x40 [ 540.590632] ? lock_downgrade+0x8e0/0x8e0 [ 540.594769] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 540.599780] ? kasan_check_read+0x11/0x20 [ 540.603916] ? lock_acquire+0x1dc/0x520 [ 540.607875] ? genl_rcv+0x19/0x40 [ 540.611325] genl_rcv_msg+0xc6/0x170 [ 540.615039] netlink_rcv_skb+0x172/0x440 [ 540.619082] ? genl_family_rcv_msg+0x1120/0x1120 [ 540.623837] ? netlink_ack+0xbc0/0xbc0 [ 540.627716] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 540.632914] ? netlink_skb_destructor+0x210/0x210 [ 540.637752] genl_rcv+0x28/0x40 [ 540.641023] netlink_unicast+0x58b/0x740 [ 540.645071] ? netlink_attachskb+0x970/0x970 [ 540.649462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 540.654983] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 540.659985] ? security_netlink_send+0x88/0xb0 [ 540.664566] netlink_sendmsg+0x9f0/0xfa0 [ 540.668620] ? netlink_unicast+0x740/0x740 [ 540.672846] ? security_socket_sendmsg+0x94/0xc0 [ 540.677584] ? netlink_unicast+0x740/0x740 [ 540.681813] sock_sendmsg+0xd5/0x120 [ 540.685510] ___sys_sendmsg+0x805/0x940 [ 540.689467] ? copy_msghdr_from_user+0x560/0x560 [ 540.694219] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 540.699737] ? proc_fail_nth_write+0x96/0x1f0 [ 540.704214] ? __fget_light+0x2ef/0x430 [ 540.708167] ? fget_raw+0x20/0x20 [ 540.711607] ? find_held_lock+0x36/0x1c0 [ 540.715659] ? kasan_check_write+0x14/0x20 [ 540.719889] ? wait_for_completion+0x870/0x870 [ 540.724458] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 540.729978] ? sockfd_lookup_light+0xc5/0x160 [ 540.734457] __sys_sendmsg+0x115/0x270 [ 540.738326] ? __ia32_sys_shutdown+0x80/0x80 [ 540.742714] ? __sb_end_write+0xac/0xe0 [ 540.746671] ? fput+0x130/0x1a0 [ 540.749945] ? ksys_write+0x1a6/0x250 [ 540.753734] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 540.758560] __x64_sys_sendmsg+0x78/0xb0 [ 540.762602] do_syscall_64+0x1b1/0x800 [ 540.766470] ? finish_task_switch+0x1ca/0x840 [ 540.770957] ? syscall_return_slowpath+0x5c0/0x5c0 [ 540.775873] ? syscall_return_slowpath+0x30f/0x5c0 [ 540.780786] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 540.786136] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 540.790972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.796140] RIP: 0033:0x455a09 [ 540.799309] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 540.806996] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 2018/06/06 15:00:17 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r4, &(0x7f0000000380)=""/235, 0x4a) r6 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r7, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r2, 0x1, 0x1}, 0x10) write(r6, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r8, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r6, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:17 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r5, 0x29, 0x19, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0xa) write(r6, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r7 = accept$netrom(0xffffffffffffff9c, 0x0, &(0x7f00000003c0)) ioctl$sock_netrom_TIOCOUTQ(r7, 0x5411, &(0x7f0000000400)) recvmsg$kcm(r4, &(0x7f0000003880)={&(0x7f0000003640)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000036c0)=""/143, 0x8f}, {&(0x7f0000003780)=""/147, 0x93}], 0x2, 0x0, 0x0, 0x1}, 0x10142) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r8, 0x111, 0x3, 0x0, 0x4) socketpair(0x5, 0x80000, 0x8, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000240)={0xfffffffffffffff7, 0xce54, 0x2, 0xff, 0xfffffffffffffffb, 0xa8, 0x4, 0x7, r2}, 0x20) 2018/06/06 15:00:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) 2018/06/06 15:00:17 executing program 3 (fault-call:1 fault-nth:3): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 540.814263] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 540.821526] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 540.828774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 540.836030] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000002 [ 540.880418] FAULT_INJECTION: forcing a failure. [ 540.880418] name failslab, interval 1, probability 0, space 0, times 0 [ 540.891746] CPU: 0 PID: 12916 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 540.899030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.908405] Call Trace: [ 540.911018] dump_stack+0x1b9/0x294 [ 540.914662] ? dump_stack_print_info.cold.2+0x52/0x52 [ 540.919877] should_fail.cold.4+0xa/0x1a [ 540.923953] ? check_noncircular+0x20/0x20 [ 540.928203] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 540.933321] ? mark_held_locks+0xc9/0x160 [ 540.937484] ? graph_lock+0x170/0x170 [ 540.941296] ? attach_entity_load_avg+0x850/0x850 [ 540.946146] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 540.951172] ? find_held_lock+0x36/0x1c0 [ 540.955247] ? __lock_is_held+0xb5/0x140 [ 540.959328] ? check_same_owner+0x320/0x320 [ 540.963664] ? rcu_note_context_switch+0x710/0x710 [ 540.968603] ? __lock_acquire+0x7f5/0x5140 [ 540.972853] __should_failslab+0x124/0x180 [ 540.977097] should_failslab+0x9/0x14 [ 540.980907] __kmalloc+0x2c8/0x760 [ 540.984458] ? print_usage_bug+0xc0/0xc0 [ 540.988527] ? debug_check_no_locks_freed+0x310/0x310 [ 540.993731] ? wiphy_new_nm+0x819/0x2290 [ 540.997811] wiphy_new_nm+0x819/0x2290 [ 541.001706] ? print_usage_bug+0xc0/0xc0 [ 541.005781] ? cfg80211_dev_check_name.isra.7+0x420/0x420 [ 541.011331] ? __lock_acquire+0x7f5/0x5140 [ 541.015574] ? __lock_acquire+0x7f5/0x5140 [ 541.019823] ? __lock_acquire+0x7f5/0x5140 [ 541.024064] ? print_usage_bug+0xc0/0xc0 [ 541.028146] ? debug_check_no_locks_freed+0x310/0x310 [ 541.033344] ? print_usage_bug+0xc0/0xc0 [ 541.037418] ? print_usage_bug+0xc0/0xc0 [ 541.041486] ? print_usage_bug+0xc0/0xc0 [ 541.045556] ? print_usage_bug+0xc0/0xc0 [ 541.049626] ? __lock_acquire+0x7f5/0x5140 [ 541.053869] ? check_noncircular+0x20/0x20 [ 541.058114] ? __lock_acquire+0x7f5/0x5140 [ 541.062350] ? graph_lock+0x170/0x170 [ 541.066159] ? debug_check_no_locks_freed+0x310/0x310 [ 541.071363] ? debug_check_no_locks_freed+0x310/0x310 [ 541.076559] ? find_held_lock+0x36/0x1c0 [ 541.080634] ieee80211_alloc_hw_nm+0x4c9/0x20d0 [ 541.085312] ? ieee80211_restart_work+0x1a0/0x1a0 [ 541.090170] ? kasan_check_read+0x11/0x20 [ 541.094411] ? rcu_is_watching+0x85/0x140 [ 541.098570] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 541.103776] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 541.108992] ? graph_lock+0x170/0x170 [ 541.112819] ? kernel_text_address+0x79/0xf0 [ 541.117235] ? __unwind_start+0x166/0x330 [ 541.121389] ? __kernel_text_address+0xd/0x40 [ 541.125903] ? unwind_get_return_address+0x61/0xa0 [ 541.130840] ? __save_stack_trace+0x7e/0xd0 [ 541.135169] ? print_usage_bug+0xc0/0xc0 [ 541.139241] ? find_held_lock+0x36/0x1c0 [ 541.143318] ? lock_downgrade+0x8e0/0x8e0 [ 541.147472] ? genl_family_rcv_msg+0x889/0x1120 [ 541.152151] ? mark_held_locks+0xc9/0x160 [ 541.156304] ? kasan_check_read+0x11/0x20 [ 541.160458] ? __local_bh_enable_ip+0x161/0x230 [ 541.165132] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 541.170252] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 541.175362] ? trace_hardirqs_on+0xd/0x10 [ 541.179523] ? __local_bh_enable_ip+0x161/0x230 [ 541.184209] mac80211_hwsim_new_radio+0x235/0x33b0 [ 541.189147] ? string+0x21d/0x2c0 [ 541.192644] ? widen_string+0x2d0/0x2d0 [ 541.196629] ? __lock_is_held+0xb5/0x140 [ 541.200705] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 541.206864] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 541.212406] ? vsnprintf+0x242/0x1b40 [ 541.216217] ? pointer+0xa10/0xa10 [ 541.219763] ? rcu_note_context_switch+0x710/0x710 [ 541.224702] ? __lock_acquire+0x7f5/0x5140 2018/06/06 15:00:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ed], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 541.228943] ? kasprintf+0xa2/0xc0 [ 541.232486] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 541.237495] ? kvasprintf+0xe2/0x130 [ 541.241213] ? bust_spinlocks+0xe0/0xe0 [ 541.245201] ? kasprintf+0xa2/0xc0 [ 541.248750] ? kvasprintf_const+0x190/0x190 [ 541.253100] ? graph_lock+0x170/0x170 [ 541.256908] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 541.262114] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 541.267664] hwsim_new_radio_nl+0x7b8/0xa60 [ 541.271990] ? nla_parse+0x358/0x4a0 [ 541.275716] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 541.280918] ? __netlink_ns_capable+0x100/0x130 [ 541.285600] genl_family_rcv_msg+0x889/0x1120 [ 541.290110] ? genl_rcv+0x40/0x40 [ 541.293572] ? lock_downgrade+0x8e0/0x8e0 [ 541.297726] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 541.302757] ? kasan_check_read+0x11/0x20 [ 541.306922] ? lock_acquire+0x1dc/0x520 [ 541.310897] ? genl_rcv+0x19/0x40 [ 541.314381] genl_rcv_msg+0xc6/0x170 [ 541.318111] netlink_rcv_skb+0x172/0x440 [ 541.319105] device veth0_to_bridge entered promiscuous mode [ 541.322174] ? genl_family_rcv_msg+0x1120/0x1120 [ 541.322190] ? netlink_ack+0xbc0/0xbc0 [ 541.322211] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 541.341701] ? netlink_skb_destructor+0x210/0x210 [ 541.346551] genl_rcv+0x28/0x40 [ 541.349835] netlink_unicast+0x58b/0x740 [ 541.353907] ? netlink_attachskb+0x970/0x970 [ 541.358326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 541.363870] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 541.368888] ? security_netlink_send+0x88/0xb0 [ 541.373474] netlink_sendmsg+0x9f0/0xfa0 [ 541.375427] device veth0_to_bridge left promiscuous mode [ 541.377537] ? netlink_unicast+0x740/0x740 [ 541.377557] ? security_socket_sendmsg+0x94/0xc0 [ 541.377567] ? netlink_unicast+0x740/0x740 [ 541.377585] sock_sendmsg+0xd5/0x120 [ 541.399921] ___sys_sendmsg+0x805/0x940 [ 541.403915] ? copy_msghdr_from_user+0x560/0x560 [ 541.408689] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 541.414260] ? proc_fail_nth_write+0x96/0x1f0 [ 541.418782] ? __fget_light+0x2ef/0x430 [ 541.422755] ? fget_raw+0x20/0x20 [ 541.426207] ? find_held_lock+0x36/0x1c0 [ 541.430252] ? kasan_check_write+0x14/0x20 [ 541.434575] ? wait_for_completion+0x870/0x870 [ 541.439145] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 541.444665] ? sockfd_lookup_light+0xc5/0x160 [ 541.449150] __sys_sendmsg+0x115/0x270 [ 541.453029] ? __ia32_sys_shutdown+0x80/0x80 [ 541.457425] ? __sb_end_write+0xac/0xe0 [ 541.461382] ? fput+0x130/0x1a0 [ 541.464642] ? ksys_write+0x1a6/0x250 [ 541.468437] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 541.473262] __x64_sys_sendmsg+0x78/0xb0 [ 541.477306] do_syscall_64+0x1b1/0x800 [ 541.481174] ? finish_task_switch+0x1ca/0x840 [ 541.485653] ? syscall_return_slowpath+0x5c0/0x5c0 [ 541.490564] ? syscall_return_slowpath+0x30f/0x5c0 [ 541.495478] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 541.500838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 541.505681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.510868] RIP: 0033:0x455a09 [ 541.514041] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 541.521729] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 2018/06/06 15:00:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:18 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:18 executing program 3 (fault-call:1 fault-nth:4): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r5, 0x29, 0x19, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0xa) write(r6, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r7 = accept$netrom(0xffffffffffffff9c, 0x0, &(0x7f00000003c0)) ioctl$sock_netrom_TIOCOUTQ(r7, 0x5411, &(0x7f0000000400)) recvmsg$kcm(r4, &(0x7f0000003880)={&(0x7f0000003640)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000036c0)=""/143, 0x8f}, {&(0x7f0000003780)=""/147, 0x93}], 0x2, 0x0, 0x0, 0x1}, 0x10142) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r8, 0x111, 0x3, 0x0, 0x4) socketpair(0x5, 0x80000, 0x8, &(0x7f0000000100)) 2018/06/06 15:00:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x9}, 0x0) [ 541.528977] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 541.536226] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 541.543478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 541.550734] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000003 2018/06/06 15:00:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 541.631754] device veth0_to_bridge entered promiscuous mode [ 541.641180] FAULT_INJECTION: forcing a failure. [ 541.641180] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 541.653029] CPU: 0 PID: 12979 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 541.660305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.669667] Call Trace: [ 541.672269] dump_stack+0x1b9/0x294 [ 541.675999] ? dump_stack_print_info.cold.2+0x52/0x52 2018/06/06 15:00:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 541.681207] ? print_usage_bug+0xc0/0xc0 [ 541.685282] ? rb_erase_cached+0xc6a/0x32a0 [ 541.689625] should_fail.cold.4+0xa/0x1a [ 541.693700] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 541.698819] ? debug_check_no_locks_freed+0x310/0x310 [ 541.704030] ? debug_check_no_locks_freed+0x310/0x310 [ 541.709239] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 541.714796] ? kernel_poison_pages+0x136/0x220 [ 541.719392] ? kasan_unpoison_shadow+0x35/0x50 [ 541.723982] ? kasan_alloc_pages+0x38/0x40 2018/06/06 15:00:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xed070000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 541.728244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 541.733796] ? should_fail+0x21b/0xbcd [ 541.737701] __alloc_pages_nodemask+0x34e/0xd70 [ 541.742376] ? print_usage_bug+0xc0/0xc0 [ 541.746449] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 541.751475] ? __isolate_free_page+0x7c0/0x7c0 [ 541.756072] ? find_held_lock+0x36/0x1c0 [ 541.760149] ? __lock_is_held+0xb5/0x140 [ 541.764231] ? check_same_owner+0x320/0x320 [ 541.768569] cache_grow_begin+0x6e/0x6c0 [ 541.772646] __kmalloc+0x688/0x760 [ 541.776209] ? print_usage_bug+0xc0/0xc0 2018/06/06 15:00:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:18 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 541.780277] ? wiphy_new_nm+0x819/0x2290 [ 541.784351] wiphy_new_nm+0x819/0x2290 [ 541.788246] ? print_usage_bug+0xc0/0xc0 [ 541.792323] ? cfg80211_dev_check_name.isra.7+0x420/0x420 [ 541.797885] ? __lock_acquire+0x7f5/0x5140 [ 541.802130] ? __lock_acquire+0x7f5/0x5140 [ 541.806378] ? __lock_acquire+0x7f5/0x5140 [ 541.810622] ? print_usage_bug+0xc0/0xc0 [ 541.814702] ? debug_check_no_locks_freed+0x310/0x310 [ 541.819901] ? print_usage_bug+0xc0/0xc0 [ 541.823976] ? print_usage_bug+0xc0/0xc0 [ 541.828042] ? print_usage_bug+0xc0/0xc0 2018/06/06 15:00:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 541.832108] ? print_usage_bug+0xc0/0xc0 [ 541.836262] ? __lock_acquire+0x7f5/0x5140 [ 541.840503] ? check_noncircular+0x20/0x20 [ 541.844755] ? __lock_acquire+0x7f5/0x5140 [ 541.848995] ? graph_lock+0x170/0x170 [ 541.852800] ? debug_check_no_locks_freed+0x310/0x310 [ 541.858006] ? debug_check_no_locks_freed+0x310/0x310 [ 541.863204] ? find_held_lock+0x36/0x1c0 [ 541.867281] ieee80211_alloc_hw_nm+0x4c9/0x20d0 [ 541.871959] ? ieee80211_restart_work+0x1a0/0x1a0 [ 541.876817] ? kasan_check_read+0x11/0x20 [ 541.880982] ? rcu_is_watching+0x85/0x140 [ 541.885145] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 541.890345] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 541.895552] ? graph_lock+0x170/0x170 [ 541.899366] ? kernel_text_address+0x79/0xf0 [ 541.903799] ? __unwind_start+0x166/0x330 [ 541.907963] ? __kernel_text_address+0xd/0x40 [ 541.912478] ? unwind_get_return_address+0x61/0xa0 [ 541.917418] ? __save_stack_trace+0x7e/0xd0 [ 541.921753] ? print_usage_bug+0xc0/0xc0 [ 541.925819] ? find_held_lock+0x36/0x1c0 [ 541.929890] ? lock_downgrade+0x8e0/0x8e0 [ 541.934043] ? genl_family_rcv_msg+0x889/0x1120 [ 541.938721] ? mark_held_locks+0xc9/0x160 [ 541.942881] ? kasan_check_read+0x11/0x20 [ 541.947039] ? __local_bh_enable_ip+0x161/0x230 [ 541.951714] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 541.956745] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 541.961857] ? trace_hardirqs_on+0xd/0x10 [ 541.966012] ? __local_bh_enable_ip+0x161/0x230 [ 541.970695] mac80211_hwsim_new_radio+0x235/0x33b0 [ 541.975631] ? string+0x21d/0x2c0 [ 541.979094] ? widen_string+0x2d0/0x2d0 [ 541.983077] ? __lock_is_held+0xb5/0x140 [ 541.987148] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 541.993300] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 541.998865] ? vsnprintf+0x242/0x1b40 [ 542.002683] ? pointer+0xa10/0xa10 [ 542.006233] ? rcu_note_context_switch+0x710/0x710 [ 542.011173] ? __lock_acquire+0x7f5/0x5140 [ 542.015414] ? kasprintf+0xa2/0xc0 [ 542.018967] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 542.023989] ? kvasprintf+0xe2/0x130 [ 542.027711] ? bust_spinlocks+0xe0/0xe0 [ 542.031702] ? kasprintf+0xa2/0xc0 [ 542.035252] ? kvasprintf_const+0x190/0x190 [ 542.039583] ? graph_lock+0x170/0x170 [ 542.043393] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 542.048598] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 542.054163] hwsim_new_radio_nl+0x7b8/0xa60 [ 542.058497] ? nla_parse+0x358/0x4a0 [ 542.062227] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 542.067433] ? __netlink_ns_capable+0x100/0x130 [ 542.072119] genl_family_rcv_msg+0x889/0x1120 [ 542.076623] ? genl_rcv+0x40/0x40 [ 542.080078] ? lock_downgrade+0x8e0/0x8e0 [ 542.084229] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 542.089257] ? kasan_check_read+0x11/0x20 [ 542.093412] ? lock_acquire+0x1dc/0x520 [ 542.097395] ? genl_rcv+0x19/0x40 [ 542.100866] genl_rcv_msg+0xc6/0x170 [ 542.104587] netlink_rcv_skb+0x172/0x440 [ 542.108654] ? genl_family_rcv_msg+0x1120/0x1120 [ 542.113399] ? netlink_ack+0xbc0/0xbc0 [ 542.117269] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 542.122451] ? netlink_skb_destructor+0x210/0x210 [ 542.127281] genl_rcv+0x28/0x40 [ 542.130554] netlink_unicast+0x58b/0x740 [ 542.134609] ? netlink_attachskb+0x970/0x970 [ 542.139006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 542.144543] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 542.149541] ? security_netlink_send+0x88/0xb0 [ 542.154117] netlink_sendmsg+0x9f0/0xfa0 [ 542.158163] ? netlink_unicast+0x740/0x740 [ 542.162378] ? security_socket_sendmsg+0x94/0xc0 [ 542.167121] ? netlink_unicast+0x740/0x740 [ 542.171340] sock_sendmsg+0xd5/0x120 [ 542.175056] ___sys_sendmsg+0x805/0x940 [ 542.179024] ? copy_msghdr_from_user+0x560/0x560 [ 542.183787] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 542.189325] ? proc_fail_nth_write+0x96/0x1f0 [ 542.193814] ? __fget_light+0x2ef/0x430 [ 542.197779] ? fget_raw+0x20/0x20 [ 542.201212] ? find_held_lock+0x36/0x1c0 [ 542.205259] ? kasan_check_write+0x14/0x20 [ 542.209477] ? wait_for_completion+0x870/0x870 [ 542.214049] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 542.219573] ? sockfd_lookup_light+0xc5/0x160 [ 542.224053] __sys_sendmsg+0x115/0x270 [ 542.227933] ? __ia32_sys_shutdown+0x80/0x80 [ 542.232326] ? __sb_end_write+0xac/0xe0 [ 542.236281] ? fput+0x130/0x1a0 [ 542.239552] ? ksys_write+0x1a6/0x250 [ 542.243340] __x64_sys_sendmsg+0x78/0xb0 [ 542.247383] do_syscall_64+0x1b1/0x800 [ 542.251251] ? finish_task_switch+0x1ca/0x840 [ 542.255731] ? syscall_return_slowpath+0x5c0/0x5c0 [ 542.260642] ? syscall_return_slowpath+0x30f/0x5c0 [ 542.265554] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 542.270904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 542.275738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 542.280906] RIP: 0033:0x455a09 [ 542.284084] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 542.291774] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 542.299036] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 542.306288] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 542.313543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 542.320809] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000004 2018/06/06 15:00:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:19 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r5, 0x29, 0x19, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0xa) write(r6, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r7 = accept$netrom(0xffffffffffffff9c, 0x0, &(0x7f00000003c0)) ioctl$sock_netrom_TIOCOUTQ(r7, 0x5411, &(0x7f0000000400)) recvmsg$kcm(r4, &(0x7f0000003880)={&(0x7f0000003640)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000036c0)=""/143, 0x8f}, {&(0x7f0000003780)=""/147, 0x93}], 0x2, 0x0, 0x0, 0x1}, 0x10142) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r8, 0x111, 0x3, 0x0, 0x4) 2018/06/06 15:00:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 2018/06/06 15:00:19 executing program 3 (fault-call:1 fault-nth:5): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 542.371367] device veth0_to_bridge left promiscuous mode [ 542.407520] device veth0_to_bridge entered promiscuous mode [ 542.422946] FAULT_INJECTION: forcing a failure. [ 542.422946] name failslab, interval 1, probability 0, space 0, times 0 [ 542.434284] CPU: 1 PID: 13034 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 542.441565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.450925] Call Trace: [ 542.453534] dump_stack+0x1b9/0x294 [ 542.457176] ? dump_stack_print_info.cold.2+0x52/0x52 [ 542.462410] ? lock_acquire+0x1dc/0x520 [ 542.466401] should_fail.cold.4+0xa/0x1a 2018/06/06 15:00:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 542.471051] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 542.476169] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 542.478084] device veth0_to_bridge left promiscuous mode [ 542.481113] ? graph_lock+0x170/0x170 [ 542.481137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 542.481151] ? put_dec_trunc8+0x273/0x300 [ 542.481168] ? find_held_lock+0x36/0x1c0 [ 542.504120] ? __lock_is_held+0xb5/0x140 [ 542.508216] ? check_same_owner+0x320/0x320 [ 542.512555] ? netdev_run_todo+0x747/0xa50 [ 542.516802] ? rcu_note_context_switch+0x710/0x710 2018/06/06 15:00:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 542.521746] __should_failslab+0x124/0x180 [ 542.525989] should_failslab+0x9/0x14 [ 542.529799] __kmalloc_track_caller+0x2c4/0x760 [ 542.534488] ? pointer+0xa10/0xa10 [ 542.538083] ? print_usage_bug+0xc0/0xc0 [ 542.542157] ? kvasprintf_const+0x67/0x190 [ 542.546492] kvasprintf+0xa9/0x130 [ 542.550040] ? bust_spinlocks+0xe0/0xe0 [ 542.554026] ? rtnl_trylock+0x20/0x20 [ 542.557836] kvasprintf_const+0x67/0x190 [ 542.561910] kobject_set_name_vargs+0x5b/0x150 [ 542.566504] dev_set_name+0xa4/0xc0 2018/06/06 15:00:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 542.570139] ? device_initialize+0x5d0/0x5d0 [ 542.574576] wiphy_new_nm+0x94e/0x2290 [ 542.578482] ? cfg80211_dev_check_name.isra.7+0x420/0x420 [ 542.584028] ? __lock_acquire+0x7f5/0x5140 [ 542.588266] ? __lock_acquire+0x7f5/0x5140 [ 542.592511] ? __lock_acquire+0x7f5/0x5140 [ 542.596755] ? print_usage_bug+0xc0/0xc0 [ 542.600830] ? debug_check_no_locks_freed+0x310/0x310 [ 542.606024] ? print_usage_bug+0xc0/0xc0 [ 542.610104] ? print_usage_bug+0xc0/0xc0 [ 542.614173] ? print_usage_bug+0xc0/0xc0 [ 542.618244] ? print_usage_bug+0xc0/0xc0 2018/06/06 15:00:19 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x0, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 542.622314] ? __lock_acquire+0x7f5/0x5140 [ 542.626556] ? check_noncircular+0x20/0x20 [ 542.630817] ? __lock_acquire+0x7f5/0x5140 [ 542.635060] ? graph_lock+0x170/0x170 [ 542.638865] ? debug_check_no_locks_freed+0x310/0x310 [ 542.644071] ? debug_check_no_locks_freed+0x310/0x310 [ 542.649268] ? find_held_lock+0x36/0x1c0 [ 542.653348] ieee80211_alloc_hw_nm+0x4c9/0x20d0 [ 542.658027] ? ieee80211_restart_work+0x1a0/0x1a0 [ 542.662885] ? kasan_check_read+0x11/0x20 [ 542.667040] ? rcu_is_watching+0x85/0x140 2018/06/06 15:00:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 542.671218] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 542.676432] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 542.681638] ? graph_lock+0x170/0x170 [ 542.685445] ? kernel_text_address+0x79/0xf0 [ 542.689861] ? __unwind_start+0x166/0x330 [ 542.694018] ? __kernel_text_address+0xd/0x40 [ 542.698521] ? unwind_get_return_address+0x61/0xa0 [ 542.703460] ? __save_stack_trace+0x7e/0xd0 [ 542.707793] ? print_usage_bug+0xc0/0xc0 [ 542.711864] ? find_held_lock+0x36/0x1c0 [ 542.715943] ? lock_downgrade+0x8e0/0x8e0 2018/06/06 15:00:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 542.720095] ? genl_family_rcv_msg+0x889/0x1120 [ 542.724776] ? mark_held_locks+0xc9/0x160 [ 542.728934] ? kasan_check_read+0x11/0x20 [ 542.733095] ? __local_bh_enable_ip+0x161/0x230 [ 542.737773] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 542.742799] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 542.747912] ? trace_hardirqs_on+0xd/0x10 [ 542.752066] ? __local_bh_enable_ip+0x161/0x230 [ 542.756752] mac80211_hwsim_new_radio+0x235/0x33b0 [ 542.761692] ? string+0x21d/0x2c0 [ 542.765163] ? widen_string+0x2d0/0x2d0 [ 542.769150] ? __lock_is_held+0xb5/0x140 2018/06/06 15:00:19 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x0, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 542.773221] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 542.779381] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 542.784930] ? vsnprintf+0x242/0x1b40 [ 542.788749] ? pointer+0xa10/0xa10 [ 542.792302] ? rcu_note_context_switch+0x710/0x710 [ 542.797241] ? __lock_acquire+0x7f5/0x5140 [ 542.801483] ? kasprintf+0xa2/0xc0 [ 542.805049] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 542.810073] ? kvasprintf+0xe2/0x130 [ 542.813796] ? bust_spinlocks+0xe0/0xe0 [ 542.817785] ? kasprintf+0xa2/0xc0 2018/06/06 15:00:19 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 542.821334] ? kvasprintf_const+0x190/0x190 [ 542.825661] ? graph_lock+0x170/0x170 [ 542.829470] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 542.834674] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 542.840226] hwsim_new_radio_nl+0x7b8/0xa60 [ 542.844552] ? nla_parse+0x358/0x4a0 [ 542.848272] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 542.853475] ? __netlink_ns_capable+0x100/0x130 [ 542.858158] genl_family_rcv_msg+0x889/0x1120 [ 542.862673] ? genl_rcv+0x40/0x40 [ 542.866147] ? lock_downgrade+0x8e0/0x8e0 [ 542.870317] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 542.875348] ? kasan_check_read+0x11/0x20 [ 542.879516] ? lock_acquire+0x1dc/0x520 [ 542.883499] ? genl_rcv+0x19/0x40 [ 542.886973] genl_rcv_msg+0xc6/0x170 [ 542.890696] netlink_rcv_skb+0x172/0x440 [ 542.894764] ? genl_family_rcv_msg+0x1120/0x1120 [ 542.899530] ? netlink_ack+0xbc0/0xbc0 [ 542.903424] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 542.908630] ? netlink_skb_destructor+0x210/0x210 [ 542.913482] genl_rcv+0x28/0x40 [ 542.916767] netlink_unicast+0x58b/0x740 [ 542.920837] ? netlink_attachskb+0x970/0x970 2018/06/06 15:00:19 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x0, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 542.925253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 542.930802] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 542.935825] ? security_netlink_send+0x88/0xb0 [ 542.940415] netlink_sendmsg+0x9f0/0xfa0 [ 542.944490] ? netlink_unicast+0x740/0x740 [ 542.948739] ? security_socket_sendmsg+0x94/0xc0 [ 542.953500] ? netlink_unicast+0x740/0x740 [ 542.957741] sock_sendmsg+0xd5/0x120 [ 542.961460] ___sys_sendmsg+0x805/0x940 [ 542.965444] ? copy_msghdr_from_user+0x560/0x560 [ 542.970221] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 542.975765] ? proc_fail_nth_write+0x96/0x1f0 [ 542.980270] ? __fget_light+0x2ef/0x430 [ 542.984249] ? fget_raw+0x20/0x20 [ 542.987709] ? find_held_lock+0x36/0x1c0 [ 542.991784] ? kasan_check_write+0x14/0x20 [ 542.996044] ? wait_for_completion+0x870/0x870 [ 543.000646] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 543.006192] ? sockfd_lookup_light+0xc5/0x160 [ 543.010698] __sys_sendmsg+0x115/0x270 [ 543.014595] ? __ia32_sys_shutdown+0x80/0x80 [ 543.019007] ? __sb_end_write+0xac/0xe0 [ 543.022992] ? fput+0x130/0x1a0 [ 543.026278] ? ksys_write+0x1a6/0x250 [ 543.030095] __x64_sys_sendmsg+0x78/0xb0 [ 543.034164] do_syscall_64+0x1b1/0x800 [ 543.038059] ? finish_task_switch+0x1ca/0x840 [ 543.042557] ? syscall_return_slowpath+0x5c0/0x5c0 [ 543.047494] ? syscall_return_slowpath+0x30f/0x5c0 [ 543.052431] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 543.057805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 543.062660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 543.067853] RIP: 0033:0x455a09 2018/06/06 15:00:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r5, 0x29, 0x19, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0xa) write(r6, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r7 = accept$netrom(0xffffffffffffff9c, 0x0, &(0x7f00000003c0)) ioctl$sock_netrom_TIOCOUTQ(r7, 0x5411, &(0x7f0000000400)) recvmsg$kcm(r4, &(0x7f0000003880)={&(0x7f0000003640)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000036c0)=""/143, 0x8f}, {&(0x7f0000003780)=""/147, 0x93}], 0x2, 0x0, 0x0, 0x1}, 0x10142) [ 543.071043] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 543.078755] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 543.086027] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 543.093301] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 543.100573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 543.107843] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000005 2018/06/06 15:00:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 2018/06/06 15:00:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:20 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:20 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x0, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:20 executing program 3 (fault-call:1 fault-nth:6): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 543.174929] device veth0_to_bridge entered promiscuous mode [ 543.223279] FAULT_INJECTION: forcing a failure. [ 543.223279] name failslab, interval 1, probability 0, space 0, times 0 [ 543.234716] CPU: 0 PID: 13107 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 543.242079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.251437] Call Trace: [ 543.254040] dump_stack+0x1b9/0x294 [ 543.257689] ? dump_stack_print_info.cold.2+0x52/0x52 [ 543.261916] device veth0_to_bridge left promiscuous mode [ 543.262887] ? print_usage_bug+0xc0/0xc0 [ 543.262911] should_fail.cold.4+0xa/0x1a [ 543.262930] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 543.281595] ? graph_lock+0x170/0x170 [ 543.285406] ? mark_held_locks+0xc9/0x160 [ 543.289564] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 543.294157] ? find_held_lock+0x36/0x1c0 [ 543.298231] ? __lock_is_held+0xb5/0x140 [ 543.302311] ? check_same_owner+0x320/0x320 [ 543.306647] ? rcu_note_context_switch+0x710/0x710 [ 543.311596] __should_failslab+0x124/0x180 [ 543.315837] should_failslab+0x9/0x14 [ 543.319645] __kmalloc+0x2c8/0x760 [ 543.323201] ? lockdep_init_map+0x9/0x10 [ 543.327273] ? rfkill_alloc+0xf2/0x390 [ 543.331171] rfkill_alloc+0xf2/0x390 [ 543.334891] ? rfkill_fop_read+0x710/0x710 [ 543.339140] ? __lockdep_init_map+0x105/0x590 [ 543.343659] wiphy_new_nm+0x1633/0x2290 [ 543.347652] ? cfg80211_dev_check_name.isra.7+0x420/0x420 [ 543.353196] ? __lock_acquire+0x7f5/0x5140 [ 543.357434] ? __lock_acquire+0x7f5/0x5140 [ 543.361687] ? __lock_acquire+0x7f5/0x5140 [ 543.365929] ? print_usage_bug+0xc0/0xc0 [ 543.370003] ? debug_check_no_locks_freed+0x310/0x310 [ 543.375194] ? print_usage_bug+0xc0/0xc0 [ 543.379264] ? print_usage_bug+0xc0/0xc0 [ 543.383330] ? print_usage_bug+0xc0/0xc0 [ 543.387386] ? print_usage_bug+0xc0/0xc0 [ 543.391431] ? __lock_acquire+0x7f5/0x5140 [ 543.395650] ? check_noncircular+0x20/0x20 [ 543.399867] ? __lock_acquire+0x7f5/0x5140 [ 543.404092] ? graph_lock+0x170/0x170 [ 543.407888] ? debug_check_no_locks_freed+0x310/0x310 [ 543.413062] ? find_held_lock+0x36/0x1c0 [ 543.417115] ieee80211_alloc_hw_nm+0x4c9/0x20d0 [ 543.421775] ? ieee80211_restart_work+0x1a0/0x1a0 [ 543.426606] ? kasan_check_read+0x11/0x20 [ 543.430743] ? rcu_is_watching+0x85/0x140 [ 543.434887] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 543.440073] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 543.445446] ? graph_lock+0x170/0x170 [ 543.449232] ? kernel_text_address+0x79/0xf0 [ 543.453623] ? __unwind_start+0x166/0x330 [ 543.457754] ? __kernel_text_address+0xd/0x40 [ 543.462242] ? unwind_get_return_address+0x61/0xa0 [ 543.467165] ? __save_stack_trace+0x7e/0xd0 [ 543.471477] ? print_usage_bug+0xc0/0xc0 [ 543.475520] ? find_held_lock+0x36/0x1c0 [ 543.479573] ? lock_downgrade+0x8e0/0x8e0 [ 543.483706] ? genl_family_rcv_msg+0x889/0x1120 [ 543.488366] ? mark_held_locks+0xc9/0x160 [ 543.492496] ? kasan_check_read+0x11/0x20 [ 543.496627] ? __local_bh_enable_ip+0x161/0x230 [ 543.501282] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 543.506279] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 543.511361] ? trace_hardirqs_on+0xd/0x10 [ 543.515494] ? __local_bh_enable_ip+0x161/0x230 [ 543.520173] mac80211_hwsim_new_radio+0x235/0x33b0 [ 543.525095] ? string+0x21d/0x2c0 [ 543.528539] ? widen_string+0x2d0/0x2d0 [ 543.532496] ? __lock_is_held+0xb5/0x140 [ 543.536545] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 543.542684] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 543.548203] ? vsnprintf+0x242/0x1b40 [ 543.551987] ? pointer+0xa10/0xa10 [ 543.555511] ? rcu_note_context_switch+0x710/0x710 [ 543.560424] ? __lock_acquire+0x7f5/0x5140 [ 543.564643] ? kasprintf+0xa2/0xc0 [ 543.568168] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 543.573167] ? kvasprintf+0xe2/0x130 [ 543.576862] ? bust_spinlocks+0xe0/0xe0 [ 543.580822] ? kasprintf+0xa2/0xc0 [ 543.584351] ? kvasprintf_const+0x190/0x190 [ 543.588656] ? graph_lock+0x170/0x170 [ 543.592453] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 543.597636] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 543.603164] hwsim_new_radio_nl+0x7b8/0xa60 [ 543.607475] ? nla_parse+0x358/0x4a0 [ 543.611191] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 543.616366] ? __netlink_ns_capable+0x100/0x130 [ 543.621027] genl_family_rcv_msg+0x889/0x1120 [ 543.625512] ? genl_rcv+0x40/0x40 [ 543.628948] ? lock_downgrade+0x8e0/0x8e0 [ 543.633079] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 543.638742] ? kasan_check_read+0x11/0x20 [ 543.642877] ? lock_acquire+0x1dc/0x520 [ 543.646847] ? genl_rcv+0x19/0x40 [ 543.650295] genl_rcv_msg+0xc6/0x170 [ 543.653994] netlink_rcv_skb+0x172/0x440 [ 543.658045] ? genl_family_rcv_msg+0x1120/0x1120 [ 543.662785] ? netlink_ack+0xbc0/0xbc0 [ 543.666664] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 543.671842] ? netlink_skb_destructor+0x210/0x210 [ 543.676679] genl_rcv+0x28/0x40 [ 543.679941] netlink_unicast+0x58b/0x740 [ 543.683986] ? netlink_attachskb+0x970/0x970 [ 543.688400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 543.693923] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 543.698924] ? security_netlink_send+0x88/0xb0 [ 543.703490] netlink_sendmsg+0x9f0/0xfa0 [ 543.707537] ? netlink_unicast+0x740/0x740 [ 543.711757] ? security_socket_sendmsg+0x94/0xc0 [ 543.716492] ? netlink_unicast+0x740/0x740 [ 543.720717] sock_sendmsg+0xd5/0x120 [ 543.724421] ___sys_sendmsg+0x805/0x940 [ 543.728387] ? copy_msghdr_from_user+0x560/0x560 [ 543.733132] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 543.738655] ? proc_fail_nth_write+0x96/0x1f0 [ 543.743156] ? __fget_light+0x2ef/0x430 [ 543.747131] ? fget_raw+0x20/0x20 [ 543.750575] ? find_held_lock+0x36/0x1c0 [ 543.754629] ? kasan_check_write+0x14/0x20 [ 543.758850] ? wait_for_completion+0x870/0x870 [ 543.763432] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 543.768965] ? sockfd_lookup_light+0xc5/0x160 [ 543.773451] __sys_sendmsg+0x115/0x270 [ 543.777323] ? __ia32_sys_shutdown+0x80/0x80 [ 543.781718] ? __sb_end_write+0xac/0xe0 [ 543.785674] ? fput+0x130/0x1a0 [ 543.788945] ? ksys_write+0x1a6/0x250 [ 543.792749] __x64_sys_sendmsg+0x78/0xb0 [ 543.796813] do_syscall_64+0x1b1/0x800 [ 543.800693] ? finish_task_switch+0x1ca/0x840 [ 543.805182] ? syscall_return_slowpath+0x5c0/0x5c0 [ 543.810092] ? syscall_return_slowpath+0x30f/0x5c0 [ 543.815032] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 543.820383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 543.825229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 543.830407] RIP: 0033:0x455a09 [ 543.833578] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 543.841279] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 543.848527] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 543.855778] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 543.863032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 543.870282] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000006 2018/06/06 15:00:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r1 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r1, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r1, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r4, &(0x7f0000000380)=""/235, 0x4a) r6 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r7, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r2, 0x1, 0x1}, 0x10) write(r6, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r8, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r6, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:20 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xed07], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:20 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r5, 0x29, 0x19, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0xa) write(r6, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r7 = accept$netrom(0xffffffffffffff9c, 0x0, &(0x7f00000003c0)) ioctl$sock_netrom_TIOCOUTQ(r7, 0x5411, &(0x7f0000000400)) 2018/06/06 15:00:20 executing program 3 (fault-call:1 fault-nth:7): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 543.947430] device veth0_to_bridge entered promiscuous mode [ 543.973675] FAULT_INJECTION: forcing a failure. [ 543.973675] name failslab, interval 1, probability 0, space 0, times 0 [ 543.984999] CPU: 0 PID: 13138 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 543.992286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.001647] Call Trace: [ 544.004245] dump_stack+0x1b9/0x294 [ 544.007887] ? dump_stack_print_info.cold.2+0x52/0x52 [ 544.013092] ? debug_object_free+0x5f0/0x5f0 [ 544.017517] should_fail.cold.4+0xa/0x1a [ 544.021587] ? __lock_is_held+0xb5/0x140 [ 544.025679] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 544.030797] ? mark_held_locks+0xc9/0x160 [ 544.034958] ? graph_lock+0x170/0x170 [ 544.038774] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 544.043811] ? find_held_lock+0x36/0x1c0 [ 544.047891] ? __lock_is_held+0xb5/0x140 [ 544.051982] ? check_same_owner+0x320/0x320 [ 544.056320] ? rcu_note_context_switch+0x710/0x710 [ 544.061272] __should_failslab+0x124/0x180 [ 544.065529] should_failslab+0x9/0x14 [ 544.069331] kmem_cache_alloc_node_trace+0x26f/0x770 [ 544.074436] ? __lockdep_init_map+0x105/0x590 [ 544.078955] __kmalloc_node+0x33/0x70 [ 544.082791] kvmalloc_node+0x6b/0x100 [ 544.086598] bucket_table_alloc+0x4c4/0x5d0 [ 544.090722] device veth0_to_bridge left promiscuous mode [ 544.090946] ? __raw_spin_lock_init+0x1c/0x100 [ 544.100955] ? rhashtable_insert_one+0xb20/0xb20 [ 544.105729] ? __lockdep_init_map+0x105/0x590 [ 544.110234] rhashtable_init+0x5ba/0xaa0 [ 544.114303] ? rhashtable_rehash_alloc+0x100/0x100 [ 544.119244] ? check_noncircular+0x20/0x20 [ 544.123491] ? __lock_acquire+0x7f5/0x5140 [ 544.127738] ? graph_lock+0x170/0x170 [ 544.131553] rhltable_init+0x58/0xb0 [ 544.135273] sta_info_init+0x75/0x1e0 [ 544.139083] ? sta_info_recalc_tim+0x20/0x20 [ 544.143533] ieee80211_alloc_hw_nm+0x796/0x20d0 [ 544.148214] ? ieee80211_restart_work+0x1a0/0x1a0 [ 544.153070] ? kasan_check_read+0x11/0x20 [ 544.157228] ? rcu_is_watching+0x85/0x140 [ 544.161385] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 544.166599] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 544.171803] ? graph_lock+0x170/0x170 [ 544.175616] ? kernel_text_address+0x79/0xf0 [ 544.180038] ? __unwind_start+0x166/0x330 [ 544.184192] ? __kernel_text_address+0xd/0x40 [ 544.188701] ? unwind_get_return_address+0x61/0xa0 [ 544.193643] ? __save_stack_trace+0x7e/0xd0 2018/06/06 15:00:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r1 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r1, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r1, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r4, &(0x7f0000000380)=""/235, 0x4a) r6 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r7, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r2, 0x1, 0x1}, 0x10) write(r6, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r8, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r6, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:21 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 544.197974] ? print_usage_bug+0xc0/0xc0 [ 544.202043] ? find_held_lock+0x36/0x1c0 [ 544.206117] ? lock_downgrade+0x8e0/0x8e0 [ 544.210270] ? genl_family_rcv_msg+0x889/0x1120 [ 544.214952] ? mark_held_locks+0xc9/0x160 [ 544.219112] ? kasan_check_read+0x11/0x20 [ 544.223273] ? __local_bh_enable_ip+0x161/0x230 [ 544.227947] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 544.232972] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 544.238080] ? trace_hardirqs_on+0xd/0x10 [ 544.242240] ? __local_bh_enable_ip+0x161/0x230 [ 544.246924] mac80211_hwsim_new_radio+0x235/0x33b0 [ 544.251858] ? string+0x21d/0x2c0 [ 544.255321] ? widen_string+0x2d0/0x2d0 [ 544.259305] ? __lock_is_held+0xb5/0x140 [ 544.263374] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 544.269530] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 544.275078] ? vsnprintf+0x242/0x1b40 [ 544.278894] ? pointer+0xa10/0xa10 [ 544.282443] ? rcu_note_context_switch+0x710/0x710 [ 544.287379] ? __lock_acquire+0x7f5/0x5140 [ 544.291628] ? kasprintf+0xa2/0xc0 [ 544.295183] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 544.300208] ? kvasprintf+0xe2/0x130 [ 544.303936] ? bust_spinlocks+0xe0/0xe0 [ 544.307924] ? kasprintf+0xa2/0xc0 [ 544.311475] ? kvasprintf_const+0x190/0x190 [ 544.315801] ? graph_lock+0x170/0x170 [ 544.319616] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 544.324821] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 544.330376] hwsim_new_radio_nl+0x7b8/0xa60 [ 544.334706] ? nla_parse+0x358/0x4a0 [ 544.338432] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 544.343639] ? __netlink_ns_capable+0x100/0x130 [ 544.348323] genl_family_rcv_msg+0x889/0x1120 [ 544.352834] ? genl_rcv+0x40/0x40 [ 544.356288] ? lock_downgrade+0x8e0/0x8e0 [ 544.360430] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 544.365445] ? kasan_check_read+0x11/0x20 [ 544.369580] ? lock_acquire+0x1dc/0x520 [ 544.373547] ? genl_rcv+0x19/0x40 [ 544.377018] genl_rcv_msg+0xc6/0x170 [ 544.380726] netlink_rcv_skb+0x172/0x440 [ 544.384771] ? genl_family_rcv_msg+0x1120/0x1120 [ 544.389521] ? netlink_ack+0xbc0/0xbc0 [ 544.393393] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 544.398572] ? netlink_skb_destructor+0x210/0x210 [ 544.403409] genl_rcv+0x28/0x40 [ 544.406685] netlink_unicast+0x58b/0x740 [ 544.410741] ? netlink_attachskb+0x970/0x970 [ 544.415145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 544.420665] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 544.425666] ? security_netlink_send+0x88/0xb0 [ 544.430243] netlink_sendmsg+0x9f0/0xfa0 [ 544.434289] ? netlink_unicast+0x740/0x740 [ 544.438506] ? security_socket_sendmsg+0x94/0xc0 [ 544.443249] ? netlink_unicast+0x740/0x740 [ 544.447468] sock_sendmsg+0xd5/0x120 [ 544.451165] ___sys_sendmsg+0x805/0x940 [ 544.455140] ? copy_msghdr_from_user+0x560/0x560 [ 544.459893] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 544.465422] ? proc_fail_nth_write+0x96/0x1f0 [ 544.469903] ? __fget_light+0x2ef/0x430 [ 544.473870] ? fget_raw+0x20/0x20 [ 544.477318] ? find_held_lock+0x36/0x1c0 [ 544.481366] ? kasan_check_write+0x14/0x20 [ 544.485604] ? wait_for_completion+0x870/0x870 [ 544.490193] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 544.495721] ? sockfd_lookup_light+0xc5/0x160 [ 544.500198] __sys_sendmsg+0x115/0x270 [ 544.504067] ? __ia32_sys_shutdown+0x80/0x80 [ 544.508469] ? __sb_end_write+0xac/0xe0 [ 544.512435] ? fput+0x130/0x1a0 [ 544.515708] ? ksys_write+0x1a6/0x250 [ 544.519515] __x64_sys_sendmsg+0x78/0xb0 [ 544.523580] do_syscall_64+0x1b1/0x800 [ 544.527451] ? finish_task_switch+0x1ca/0x840 [ 544.531929] ? syscall_return_slowpath+0x5c0/0x5c0 [ 544.536851] ? syscall_return_slowpath+0x30f/0x5c0 [ 544.541767] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 544.547127] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 544.551960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 544.557129] RIP: 0033:0x455a09 [ 544.560306] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 544.567998] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 544.575259] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 544.582511] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 544.589775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/06/06 15:00:21 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:21 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r1 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r1, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r1, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r4, &(0x7f0000000380)=""/235, 0x4a) r6 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r7, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r2, 0x1, 0x1}, 0x10) write(r6, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r8, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r6, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r5, 0x29, 0x19, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0xa) write(r6, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) accept$netrom(0xffffffffffffff9c, 0x0, &(0x7f00000003c0)) 2018/06/06 15:00:21 executing program 3 (fault-call:1 fault-nth:8): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x2}, 0x0) [ 544.597032] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000007 [ 544.681013] device veth0_to_bridge entered promiscuous mode [ 544.690173] FAULT_INJECTION: forcing a failure. [ 544.690173] name failslab, interval 1, probability 0, space 0, times 0 [ 544.701490] CPU: 0 PID: 13170 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 544.708772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.718136] Call Trace: [ 544.720738] dump_stack+0x1b9/0x294 [ 544.724380] ? dump_stack_print_info.cold.2+0x52/0x52 [ 544.729593] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 544.734803] should_fail.cold.4+0xa/0x1a [ 544.738885] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 544.744009] ? unwind_get_return_address+0x61/0xa0 [ 544.748953] ? __save_stack_trace+0x7e/0xd0 [ 544.753291] ? graph_lock+0x170/0x170 [ 544.757109] ? find_held_lock+0x36/0x1c0 [ 544.761187] ? __lock_is_held+0xb5/0x140 [ 544.765270] ? check_same_owner+0x320/0x320 [ 544.769604] ? rcu_note_context_switch+0x710/0x710 [ 544.771346] device veth0_to_bridge left promiscuous mode [ 544.774547] __should_failslab+0x124/0x180 [ 544.774570] should_failslab+0x9/0x14 [ 544.774589] kmem_cache_alloc_node_trace+0x26f/0x770 [ 544.774603] ? __kmalloc_node+0x33/0x70 [ 544.774620] ? __kmalloc_node+0x33/0x70 [ 544.801085] ? rcu_read_lock_sched_held+0x108/0x120 [ 544.806133] __kmalloc_node+0x33/0x70 [ 544.809952] kvmalloc_node+0x6b/0x100 [ 544.813768] alloc_bucket_spinlocks+0x92/0x1a0 [ 544.818382] bucket_table_alloc+0x17e/0x5d0 [ 544.822716] ? __raw_spin_lock_init+0x1c/0x100 [ 544.827312] ? rhashtable_insert_one+0xb20/0xb20 [ 544.832074] ? __lockdep_init_map+0x105/0x590 [ 544.836590] rhashtable_init+0x5ba/0xaa0 [ 544.840662] ? rhashtable_rehash_alloc+0x100/0x100 [ 544.845609] ? check_noncircular+0x20/0x20 [ 544.849853] ? __lock_acquire+0x7f5/0x5140 [ 544.854096] ? graph_lock+0x170/0x170 [ 544.857911] rhltable_init+0x58/0xb0 [ 544.861633] sta_info_init+0x75/0x1e0 [ 544.865434] ? sta_info_recalc_tim+0x20/0x20 [ 544.869858] ieee80211_alloc_hw_nm+0x796/0x20d0 [ 544.874536] ? ieee80211_restart_work+0x1a0/0x1a0 [ 544.879397] ? kasan_check_read+0x11/0x20 [ 544.883559] ? rcu_is_watching+0x85/0x140 [ 544.887718] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 544.892927] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 544.898124] ? graph_lock+0x170/0x170 [ 544.901930] ? kernel_text_address+0x79/0xf0 [ 544.906348] ? __unwind_start+0x166/0x330 [ 544.910512] ? __kernel_text_address+0xd/0x40 [ 544.915020] ? unwind_get_return_address+0x61/0xa0 [ 544.919961] ? __save_stack_trace+0x7e/0xd0 [ 544.924294] ? print_usage_bug+0xc0/0xc0 [ 544.928369] ? find_held_lock+0x36/0x1c0 [ 544.932448] ? lock_downgrade+0x8e0/0x8e0 [ 544.936603] ? genl_family_rcv_msg+0x889/0x1120 [ 544.941287] ? mark_held_locks+0xc9/0x160 [ 544.945447] ? kasan_check_read+0x11/0x20 [ 544.949612] ? __local_bh_enable_ip+0x161/0x230 [ 544.954294] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 544.959324] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 544.964435] ? trace_hardirqs_on+0xd/0x10 [ 544.968592] ? __local_bh_enable_ip+0x161/0x230 [ 544.973271] mac80211_hwsim_new_radio+0x235/0x33b0 [ 544.978201] ? string+0x21d/0x2c0 [ 544.981659] ? widen_string+0x2d0/0x2d0 [ 544.985642] ? __lock_is_held+0xb5/0x140 [ 544.989801] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 544.995958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 545.001511] ? vsnprintf+0x242/0x1b40 [ 545.005326] ? pointer+0xa10/0xa10 [ 545.008875] ? rcu_note_context_switch+0x710/0x710 [ 545.013814] ? __lock_acquire+0x7f5/0x5140 [ 545.018061] ? kasprintf+0xa2/0xc0 [ 545.021615] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 545.026640] ? kvasprintf+0xe2/0x130 [ 545.030362] ? bust_spinlocks+0xe0/0xe0 [ 545.034353] ? kasprintf+0xa2/0xc0 [ 545.037900] ? kvasprintf_const+0x190/0x190 [ 545.042222] ? graph_lock+0x170/0x170 [ 545.046034] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 545.051241] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 545.056795] hwsim_new_radio_nl+0x7b8/0xa60 [ 545.061130] ? nla_parse+0x358/0x4a0 [ 545.064859] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 545.070066] ? __netlink_ns_capable+0x100/0x130 [ 545.074747] genl_family_rcv_msg+0x889/0x1120 [ 545.079251] ? genl_rcv+0x40/0x40 [ 545.082707] ? lock_downgrade+0x8e0/0x8e0 [ 545.086864] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 545.091896] ? kasan_check_read+0x11/0x20 [ 545.096057] ? lock_acquire+0x1dc/0x520 [ 545.100039] ? genl_rcv+0x19/0x40 [ 545.103527] genl_rcv_msg+0xc6/0x170 [ 545.107255] netlink_rcv_skb+0x172/0x440 [ 545.111325] ? genl_family_rcv_msg+0x1120/0x1120 [ 545.116089] ? netlink_ack+0xbc0/0xbc0 [ 545.119988] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 545.125193] ? netlink_skb_destructor+0x210/0x210 [ 545.130065] genl_rcv+0x28/0x40 [ 545.133353] netlink_unicast+0x58b/0x740 [ 545.137427] ? netlink_attachskb+0x970/0x970 [ 545.141932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 545.147482] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 545.152510] ? security_netlink_send+0x88/0xb0 [ 545.157196] netlink_sendmsg+0x9f0/0xfa0 [ 545.161273] ? netlink_unicast+0x740/0x740 [ 545.165541] ? security_socket_sendmsg+0x94/0xc0 [ 545.170314] ? netlink_unicast+0x740/0x740 [ 545.174572] sock_sendmsg+0xd5/0x120 [ 545.178300] ___sys_sendmsg+0x805/0x940 2018/06/06 15:00:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:21 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:21 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xed070000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:21 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:22 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:22 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:22 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 545.182290] ? copy_msghdr_from_user+0x560/0x560 [ 545.187071] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 545.192620] ? proc_fail_nth_write+0x96/0x1f0 [ 545.197126] ? __fget_light+0x2ef/0x430 [ 545.201111] ? fget_raw+0x20/0x20 [ 545.204568] ? find_held_lock+0x36/0x1c0 [ 545.208641] ? kasan_check_write+0x14/0x20 [ 545.212894] ? wait_for_completion+0x870/0x870 [ 545.217487] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 545.223033] ? sockfd_lookup_light+0xc5/0x160 [ 545.227546] __sys_sendmsg+0x115/0x270 [ 545.231445] ? __ia32_sys_shutdown+0x80/0x80 [ 545.235861] ? __sb_end_write+0xac/0xe0 [ 545.239847] ? fput+0x130/0x1a0 [ 545.243132] ? ksys_write+0x1a6/0x250 [ 545.246948] __x64_sys_sendmsg+0x78/0xb0 [ 545.251015] do_syscall_64+0x1b1/0x800 [ 545.254908] ? finish_task_switch+0x1ca/0x840 [ 545.259410] ? syscall_return_slowpath+0x5c0/0x5c0 [ 545.264351] ? syscall_return_slowpath+0x30f/0x5c0 [ 545.269302] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 545.274663] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/06/06 15:00:22 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:22 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r5, 0x29, 0x19, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0xa) write(r6, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 2018/06/06 15:00:22 executing program 3 (fault-call:1 fault-nth:9): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 545.279517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.284721] RIP: 0033:0x455a09 [ 545.287915] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 545.295640] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 545.302917] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 545.310189] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 545.317466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 545.324755] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000008 [ 545.373562] device veth0_to_bridge entered promiscuous mode [ 545.410878] FAULT_INJECTION: forcing a failure. [ 545.410878] name failslab, interval 1, probability 0, space 0, times 0 [ 545.422183] CPU: 0 PID: 13243 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 545.429461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.432119] device veth0_to_bridge left promiscuous mode [ 545.438810] Call Trace: [ 545.438832] dump_stack+0x1b9/0x294 [ 545.438851] ? dump_stack_print_info.cold.2+0x52/0x52 [ 545.438868] ? print_usage_bug+0xc0/0xc0 [ 545.438889] should_fail.cold.4+0xa/0x1a [ 545.463751] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 545.468861] ? graph_lock+0x170/0x170 [ 545.472651] ? find_held_lock+0x36/0x1c0 [ 545.476704] ? __lock_is_held+0xb5/0x140 [ 545.480761] ? check_same_owner+0x320/0x320 [ 545.485069] ? trace_hardirqs_on+0xd/0x10 [ 545.489211] ? rcu_note_context_switch+0x710/0x710 [ 545.494156] __should_failslab+0x124/0x180 [ 545.498398] should_failslab+0x9/0x14 [ 545.502196] __kmalloc_track_caller+0x2c4/0x760 [ 545.506869] ? pointer+0xa10/0xa10 [ 545.510396] ? print_usage_bug+0xc0/0xc0 [ 545.514451] ? kasprintf+0xa2/0xc0 [ 545.517979] kvasprintf+0xa9/0x130 [ 545.521507] ? bust_spinlocks+0xe0/0xe0 [ 545.525472] ? __lockdep_init_map+0x105/0x590 [ 545.529953] kasprintf+0xa2/0xc0 [ 545.533301] ? kvasprintf_const+0x190/0x190 [ 545.537621] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 545.542639] ieee80211_alloc_led_names+0x85/0x410 [ 545.547475] ieee80211_alloc_hw_nm+0x1b36/0x20d0 [ 545.552216] ? ieee80211_restart_work+0x1a0/0x1a0 [ 545.557055] ? kasan_check_read+0x11/0x20 [ 545.561195] ? rcu_is_watching+0x85/0x140 [ 545.565337] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 545.570536] ? graph_lock+0x170/0x170 [ 545.574323] ? kernel_text_address+0x79/0xf0 [ 545.578713] ? __unwind_start+0x166/0x330 [ 545.582856] ? unwind_get_return_address+0x61/0xa0 [ 545.587779] ? __save_stack_trace+0x7e/0xd0 [ 545.592092] ? print_usage_bug+0xc0/0xc0 [ 545.596136] ? find_held_lock+0x36/0x1c0 [ 545.600193] ? lock_downgrade+0x8e0/0x8e0 [ 545.604331] ? genl_family_rcv_msg+0x889/0x1120 [ 545.608999] ? mark_held_locks+0xc9/0x160 [ 545.613139] ? kasan_check_read+0x11/0x20 [ 545.617272] ? __local_bh_enable_ip+0x161/0x230 [ 545.621929] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 545.627023] ? trace_hardirqs_on+0xd/0x10 [ 545.631160] ? __local_bh_enable_ip+0x161/0x230 [ 545.635826] mac80211_hwsim_new_radio+0x235/0x33b0 [ 545.641372] ? string+0x21d/0x2c0 [ 545.644823] ? widen_string+0x2d0/0x2d0 [ 545.648794] ? __lock_is_held+0xb5/0x140 [ 545.652842] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 545.658978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 545.664497] ? vsnprintf+0x242/0x1b40 [ 545.668287] ? pointer+0xa10/0xa10 [ 545.671821] ? rcu_note_context_switch+0x710/0x710 [ 545.676739] ? __lock_acquire+0x7f5/0x5140 [ 545.680957] ? kasprintf+0xa2/0xc0 [ 545.684485] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 545.689484] ? kvasprintf+0xe2/0x130 [ 545.693182] ? bust_spinlocks+0xe0/0xe0 [ 545.697143] ? kasprintf+0xa2/0xc0 [ 545.700678] ? kvasprintf_const+0x190/0x190 [ 545.704982] ? graph_lock+0x170/0x170 [ 545.708769] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 545.713944] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 545.719479] hwsim_new_radio_nl+0x7b8/0xa60 [ 545.723805] ? nla_parse+0x358/0x4a0 [ 545.727518] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 545.732707] ? __netlink_ns_capable+0x100/0x130 [ 545.737379] genl_family_rcv_msg+0x889/0x1120 [ 545.741879] ? genl_rcv+0x40/0x40 [ 545.745317] ? lock_downgrade+0x8e0/0x8e0 [ 545.749462] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 545.754473] ? kasan_check_read+0x11/0x20 [ 545.758615] ? lock_acquire+0x1dc/0x520 [ 545.762581] ? genl_rcv+0x19/0x40 [ 545.766034] genl_rcv_msg+0xc6/0x170 [ 545.769732] netlink_rcv_skb+0x172/0x440 [ 545.773871] ? genl_family_rcv_msg+0x1120/0x1120 [ 545.778609] ? netlink_ack+0xbc0/0xbc0 [ 545.782499] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 545.787675] ? netlink_skb_destructor+0x210/0x210 [ 545.792509] genl_rcv+0x28/0x40 [ 545.795779] netlink_unicast+0x58b/0x740 [ 545.799826] ? netlink_attachskb+0x970/0x970 [ 545.804219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 545.809740] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 545.814747] ? security_netlink_send+0x88/0xb0 [ 545.819321] netlink_sendmsg+0x9f0/0xfa0 [ 545.823383] ? netlink_unicast+0x740/0x740 [ 545.827602] ? security_socket_sendmsg+0x94/0xc0 [ 545.832349] ? netlink_unicast+0x740/0x740 [ 545.836575] sock_sendmsg+0xd5/0x120 [ 545.840273] ___sys_sendmsg+0x805/0x940 [ 545.844234] ? copy_msghdr_from_user+0x560/0x560 [ 545.848995] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 545.854528] ? proc_fail_nth_write+0x96/0x1f0 [ 545.859012] ? __fget_light+0x2ef/0x430 [ 545.862980] ? fget_raw+0x20/0x20 [ 545.866430] ? find_held_lock+0x36/0x1c0 [ 545.870503] ? kasan_check_write+0x14/0x20 [ 545.874737] ? wait_for_completion+0x870/0x870 [ 545.879311] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 545.884833] ? sockfd_lookup_light+0xc5/0x160 [ 545.889312] __sys_sendmsg+0x115/0x270 [ 545.893183] ? __ia32_sys_shutdown+0x80/0x80 [ 545.897573] ? __sb_end_write+0xac/0xe0 [ 545.901530] ? fput+0x130/0x1a0 [ 545.904793] ? ksys_write+0x1a6/0x250 [ 545.908583] __x64_sys_sendmsg+0x78/0xb0 [ 545.912632] do_syscall_64+0x1b1/0x800 [ 545.916527] ? syscall_return_slowpath+0x5c0/0x5c0 [ 545.921444] ? syscall_return_slowpath+0x30f/0x5c0 [ 545.926369] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 545.931718] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 545.936550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.941720] RIP: 0033:0x455a09 [ 545.944892] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 545.952584] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 545.959833] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 545.967089] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 545.974347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 545.981602] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000009 2018/06/06 15:00:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:23 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 2018/06/06 15:00:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r5, 0x29, 0x19, &(0x7f0000000000), 0x4) socket$netlink(0x10, 0x3, 0xa) 2018/06/06 15:00:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:23 executing program 3 (fault-call:1 fault-nth:10): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 546.073012] device veth0_to_bridge entered promiscuous mode [ 546.120074] FAULT_INJECTION: forcing a failure. [ 546.120074] name failslab, interval 1, probability 0, space 0, times 0 [ 546.131557] CPU: 0 PID: 13263 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 546.138837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 546.148195] Call Trace: [ 546.150806] dump_stack+0x1b9/0x294 [ 546.154452] ? dump_stack_print_info.cold.2+0x52/0x52 [ 546.159661] ? __save_stack_trace+0x7e/0xd0 [ 546.164003] should_fail.cold.4+0xa/0x1a [ 546.168082] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 546.171955] device veth0_to_bridge left promiscuous mode [ 546.173193] ? retint_kernel+0x10/0x10 [ 546.173213] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 546.173229] ? graph_lock+0x170/0x170 [ 546.191349] ? find_held_lock+0x36/0x1c0 [ 546.195427] ? __lock_is_held+0xb5/0x140 [ 546.199521] ? check_same_owner+0x320/0x320 [ 546.203865] ? rcu_note_context_switch+0x710/0x710 [ 546.208812] __should_failslab+0x124/0x180 [ 546.213059] should_failslab+0x9/0x14 2018/06/06 15:00:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xed07000000000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) [ 546.216876] __kmalloc_track_caller+0x2c4/0x760 [ 546.221552] ? pointer+0xa10/0xa10 [ 546.225105] ? print_usage_bug+0xc0/0xc0 [ 546.229171] ? kasprintf+0xa2/0xc0 [ 546.232723] kvasprintf+0xa9/0x130 [ 546.236266] ? bust_spinlocks+0xe0/0xe0 [ 546.240247] ? __lockdep_init_map+0x105/0x590 [ 546.244766] kasprintf+0xa2/0xc0 [ 546.248141] ? kvasprintf_const+0x190/0x190 [ 546.252486] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 546.257519] ieee80211_alloc_led_names+0x118/0x410 [ 546.262465] ieee80211_alloc_hw_nm+0x1b36/0x20d0 2018/06/06 15:00:23 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) [ 546.267230] ? ieee80211_restart_work+0x1a0/0x1a0 [ 546.272086] ? kasan_check_read+0x11/0x20 [ 546.276247] ? rcu_is_watching+0x85/0x140 [ 546.280411] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 546.285611] ? graph_lock+0x170/0x170 [ 546.289418] ? kernel_text_address+0x79/0xf0 [ 546.293832] ? __unwind_start+0x166/0x330 [ 546.297992] ? unwind_get_return_address+0x61/0xa0 [ 546.302929] ? __save_stack_trace+0x7e/0xd0 [ 546.307259] ? print_usage_bug+0xc0/0xc0 [ 546.311342] ? find_held_lock+0x36/0x1c0 [ 546.315421] ? lock_downgrade+0x8e0/0x8e0 2018/06/06 15:00:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 546.319587] ? genl_family_rcv_msg+0x889/0x1120 [ 546.324265] ? mark_held_locks+0xc9/0x160 [ 546.328423] ? kasan_check_read+0x11/0x20 [ 546.332591] ? __local_bh_enable_ip+0x161/0x230 [ 546.347525] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 546.352643] ? trace_hardirqs_on+0xd/0x10 [ 546.356808] ? __local_bh_enable_ip+0x161/0x230 [ 546.361505] mac80211_hwsim_new_radio+0x235/0x33b0 [ 546.366443] ? string+0x21d/0x2c0 [ 546.369914] ? widen_string+0x2d0/0x2d0 [ 546.373898] ? __lock_is_held+0xb5/0x140 [ 546.377973] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 546.384133] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 546.389678] ? vsnprintf+0x242/0x1b40 [ 546.393498] ? pointer+0xa10/0xa10 [ 546.397050] ? kasan_check_write+0x14/0x20 [ 546.401293] ? kasprintf+0xa2/0xc0 [ 546.404850] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 546.409880] ? kvasprintf+0xe2/0x130 [ 546.413623] ? bust_spinlocks+0xe0/0xe0 [ 546.417613] ? kasprintf+0xa2/0xc0 2018/06/06 15:00:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 546.421160] ? kvasprintf_const+0x190/0x190 [ 546.425489] ? graph_lock+0x170/0x170 [ 546.429306] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 546.434545] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 546.440102] hwsim_new_radio_nl+0x7b8/0xa60 [ 546.444435] ? nla_parse+0x358/0x4a0 [ 546.448167] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 546.453375] ? __netlink_ns_capable+0x100/0x130 [ 546.458062] genl_family_rcv_msg+0x889/0x1120 [ 546.462577] ? genl_rcv+0x40/0x40 [ 546.466044] ? lock_downgrade+0x8e0/0x8e0 [ 546.470199] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 546.475233] ? kasan_check_read+0x11/0x20 [ 546.479397] ? lock_acquire+0x1dc/0x520 [ 546.483383] ? genl_rcv+0x19/0x40 [ 546.486864] genl_rcv_msg+0xc6/0x170 [ 546.490611] netlink_rcv_skb+0x172/0x440 [ 546.494721] ? genl_family_rcv_msg+0x1120/0x1120 [ 546.499488] ? netlink_ack+0xbc0/0xbc0 [ 546.503389] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 546.508594] ? netlink_skb_destructor+0x210/0x210 [ 546.513458] genl_rcv+0x28/0x40 [ 546.516743] netlink_unicast+0x58b/0x740 [ 546.520822] ? netlink_attachskb+0x970/0x970 [ 546.525246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 546.530801] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 546.535833] ? security_netlink_send+0x88/0xb0 [ 546.540429] netlink_sendmsg+0x9f0/0xfa0 [ 546.544514] ? netlink_unicast+0x740/0x740 [ 546.548767] ? security_socket_sendmsg+0x94/0xc0 [ 546.553535] ? netlink_unicast+0x740/0x740 [ 546.557786] sock_sendmsg+0xd5/0x120 [ 546.561511] ___sys_sendmsg+0x805/0x940 [ 546.565501] ? copy_msghdr_from_user+0x560/0x560 [ 546.570278] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 546.575825] ? proc_fail_nth_write+0x96/0x1f0 [ 546.580331] ? __fget_light+0x2ef/0x430 [ 546.584316] ? fget_raw+0x20/0x20 [ 546.587778] ? find_held_lock+0x36/0x1c0 [ 546.591854] ? kasan_check_write+0x14/0x20 [ 546.596106] ? wait_for_completion+0x870/0x870 [ 546.600710] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 546.606258] ? sockfd_lookup_light+0xc5/0x160 [ 546.610773] __sys_sendmsg+0x115/0x270 [ 546.614677] ? __ia32_sys_shutdown+0x80/0x80 [ 546.619095] ? __sb_end_write+0xac/0xe0 [ 546.623081] ? fput+0x130/0x1a0 [ 546.626365] ? ksys_write+0x1a6/0x250 [ 546.630177] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 546.635032] __x64_sys_sendmsg+0x78/0xb0 [ 546.639131] do_syscall_64+0x1b1/0x800 [ 546.643030] ? finish_task_switch+0x1ca/0x840 [ 546.647540] ? syscall_return_slowpath+0x5c0/0x5c0 [ 546.652488] ? syscall_return_slowpath+0x30f/0x5c0 [ 546.657433] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 546.662822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 546.667684] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 546.672884] RIP: 0033:0x455a09 [ 546.676066] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 546.683776] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 546.691035] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 546.698290] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 546.705546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 546.712810] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000000a 2018/06/06 15:00:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:23 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 2018/06/06 15:00:23 executing program 3 (fault-call:1 fault-nth:11): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:23 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r5, 0x29, 0x19, &(0x7f0000000000), 0x4) 2018/06/06 15:00:23 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x800, 0x99b) r0 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r1 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r1, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r1, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r4, &(0x7f0000000380)=""/235, 0x4a) r6 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r7, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r2, 0x1, 0x1}, 0x10) write(r6, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r8, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r6, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 546.818534] device veth0_to_bridge entered promiscuous mode [ 546.837891] FAULT_INJECTION: forcing a failure. [ 546.837891] name failslab, interval 1, probability 0, space 0, times 0 [ 546.849254] CPU: 1 PID: 13330 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 546.856619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 546.865984] Call Trace: [ 546.868588] dump_stack+0x1b9/0x294 [ 546.872231] ? dump_stack_print_info.cold.2+0x52/0x52 [ 546.877440] ? __save_stack_trace+0x7e/0xd0 [ 546.877954] device veth0_to_bridge left promiscuous mode [ 546.881770] should_fail.cold.4+0xa/0x1a [ 546.881792] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 546.881809] ? save_stack+0x43/0xd0 [ 546.881822] ? kasan_kmalloc+0xc4/0xe0 [ 546.881834] ? __kmalloc_track_caller+0x14a/0x760 [ 546.881850] ? kvasprintf+0xa9/0x130 [ 546.912479] ? kasprintf+0xa2/0xc0 [ 546.916051] ? ieee80211_alloc_led_names+0x1ab/0x410 [ 546.921168] ? graph_lock+0x170/0x170 [ 546.924980] ? genl_rcv_msg+0xc6/0x170 [ 546.928880] ? netlink_rcv_skb+0x172/0x440 [ 546.933124] ? genl_rcv+0x28/0x40 [ 546.936592] ? netlink_unicast+0x58b/0x740 [ 546.940842] ? netlink_sendmsg+0x9f0/0xfa0 [ 546.945113] ? sock_sendmsg+0xd5/0x120 [ 546.949019] ? find_held_lock+0x36/0x1c0 [ 546.953101] ? __lock_is_held+0xb5/0x140 [ 546.957188] ? check_same_owner+0x320/0x320 [ 546.961526] ? rcu_note_context_switch+0x710/0x710 2018/06/06 15:00:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:23 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x800, 0x99b) r0 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r1 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r1, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r1, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r4, &(0x7f0000000380)=""/235, 0x4a) r6 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r7, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r2, 0x1, 0x1}, 0x10) write(r6, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r8, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r6, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 546.966476] __should_failslab+0x124/0x180 [ 546.970727] should_failslab+0x9/0x14 [ 546.974542] __kmalloc_track_caller+0x2c4/0x760 [ 546.979221] ? pointer+0xa10/0xa10 [ 546.982776] ? print_usage_bug+0xc0/0xc0 [ 546.986846] ? kasprintf+0xa2/0xc0 [ 546.990396] kvasprintf+0xa9/0x130 [ 546.993946] ? bust_spinlocks+0xe0/0xe0 [ 546.997934] ? __lockdep_init_map+0x105/0x590 [ 547.002446] kasprintf+0xa2/0xc0 [ 547.005821] ? kvasprintf_const+0x190/0x190 [ 547.010159] ? trace_hardirqs_on_caller+0x421/0x5c0 2018/06/06 15:00:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:24 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x800, 0x99b) r0 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r1 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r1, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r1, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r4, &(0x7f0000000380)=""/235, 0x4a) r6 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r7, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r2, 0x1, 0x1}, 0x10) write(r6, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r8, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r6, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 547.015188] ieee80211_alloc_led_names+0x240/0x410 [ 547.020125] ieee80211_alloc_hw_nm+0x1b36/0x20d0 [ 547.024892] ? ieee80211_restart_work+0x1a0/0x1a0 [ 547.029746] ? kasan_check_read+0x11/0x20 [ 547.033900] ? rcu_is_watching+0x85/0x140 [ 547.038067] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 547.043272] ? graph_lock+0x170/0x170 [ 547.047079] ? kernel_text_address+0x79/0xf0 [ 547.051499] ? __unwind_start+0x166/0x330 [ 547.055660] ? unwind_get_return_address+0x61/0xa0 [ 547.060607] ? __save_stack_trace+0x7e/0xd0 [ 547.064944] ? print_usage_bug+0xc0/0xc0 [ 547.069014] ? find_held_lock+0x36/0x1c0 [ 547.073098] ? lock_downgrade+0x8e0/0x8e0 [ 547.077254] ? genl_family_rcv_msg+0x889/0x1120 [ 547.081943] ? mark_held_locks+0xc9/0x160 [ 547.086103] ? kasan_check_read+0x11/0x20 [ 547.090268] ? __local_bh_enable_ip+0x161/0x230 [ 547.094956] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 547.100068] ? trace_hardirqs_on+0xd/0x10 [ 547.104226] ? __local_bh_enable_ip+0x161/0x230 [ 547.108915] mac80211_hwsim_new_radio+0x235/0x33b0 [ 547.113852] ? string+0x21d/0x2c0 2018/06/06 15:00:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 547.117317] ? widen_string+0x2d0/0x2d0 [ 547.121302] ? __lock_is_held+0xb5/0x140 [ 547.125376] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 547.131535] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 547.137084] ? vsnprintf+0x242/0x1b40 [ 547.140903] ? pointer+0xa10/0xa10 [ 547.144459] ? rcu_note_context_switch+0x710/0x710 [ 547.149397] ? __lock_acquire+0x7f5/0x5140 [ 547.153641] ? kasprintf+0xa2/0xc0 [ 547.157195] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 547.162216] ? kvasprintf+0xe2/0x130 [ 547.165940] ? bust_spinlocks+0xe0/0xe0 [ 547.169940] ? kasprintf+0xa2/0xc0 [ 547.173495] ? kvasprintf_const+0x190/0x190 [ 547.177820] ? graph_lock+0x170/0x170 [ 547.181641] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 547.186845] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 547.192399] hwsim_new_radio_nl+0x7b8/0xa60 [ 547.196730] ? nla_parse+0x358/0x4a0 [ 547.200458] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 547.205663] ? __netlink_ns_capable+0x100/0x130 [ 547.210355] genl_family_rcv_msg+0x889/0x1120 [ 547.214865] ? genl_rcv+0x40/0x40 [ 547.218330] ? lock_downgrade+0x8e0/0x8e0 [ 547.222488] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 547.227625] ? kasan_check_read+0x11/0x20 [ 547.231790] ? lock_acquire+0x1dc/0x520 [ 547.235775] ? genl_rcv+0x19/0x40 [ 547.239250] genl_rcv_msg+0xc6/0x170 [ 547.242974] netlink_rcv_skb+0x172/0x440 [ 547.247046] ? genl_family_rcv_msg+0x1120/0x1120 [ 547.251813] ? netlink_ack+0xbc0/0xbc0 [ 547.255712] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 547.260923] ? netlink_skb_destructor+0x210/0x210 [ 547.265777] genl_rcv+0x28/0x40 [ 547.269062] netlink_unicast+0x58b/0x740 [ 547.273140] ? netlink_attachskb+0x970/0x970 [ 547.277560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 547.283109] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 547.288135] ? security_netlink_send+0x88/0xb0 [ 547.292731] netlink_sendmsg+0x9f0/0xfa0 [ 547.296814] ? netlink_unicast+0x740/0x740 [ 547.301064] ? security_socket_sendmsg+0x94/0xc0 [ 547.305828] ? netlink_unicast+0x740/0x740 [ 547.310078] sock_sendmsg+0xd5/0x120 [ 547.313803] ___sys_sendmsg+0x805/0x940 [ 547.317796] ? copy_msghdr_from_user+0x560/0x560 [ 547.322573] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 547.328116] ? proc_fail_nth_write+0x96/0x1f0 [ 547.332601] ? __fget_light+0x2ef/0x430 [ 547.336578] ? fget_raw+0x20/0x20 [ 547.340026] ? find_held_lock+0x36/0x1c0 [ 547.344100] ? kasan_check_write+0x14/0x20 [ 547.348338] ? wait_for_completion+0x870/0x870 [ 547.352940] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 547.358498] ? sockfd_lookup_light+0xc5/0x160 [ 547.362997] __sys_sendmsg+0x115/0x270 [ 547.366883] ? __ia32_sys_shutdown+0x80/0x80 [ 547.371280] ? __sb_end_write+0xac/0xe0 [ 547.375258] ? fput+0x130/0x1a0 [ 547.378551] ? ksys_write+0x1a6/0x250 [ 547.382352] __x64_sys_sendmsg+0x78/0xb0 [ 547.386407] do_syscall_64+0x1b1/0x800 [ 547.390283] ? finish_task_switch+0x1ca/0x840 [ 547.394860] ? syscall_return_slowpath+0x5c0/0x5c0 [ 547.399784] ? syscall_return_slowpath+0x30f/0x5c0 [ 547.404708] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 547.410073] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 547.414940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.420113] RIP: 0033:0x455a09 [ 547.423287] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 547.430982] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 547.438239] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 547.445515] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 547.452771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 547.460033] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000000b 2018/06/06 15:00:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:24 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x0, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:24 executing program 3 (fault-call:1 fault-nth:12): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:24 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r0 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r1 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r1, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r1, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r4, &(0x7f0000000380)=""/235, 0x4a) r6 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r7, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r2, 0x1, 0x1}, 0x10) write(r6, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r8, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r6, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff00000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:24 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) [ 547.561083] device veth0_to_bridge entered promiscuous mode [ 547.582138] FAULT_INJECTION: forcing a failure. [ 547.582138] name failslab, interval 1, probability 0, space 0, times 0 [ 547.593544] CPU: 0 PID: 13382 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 547.600826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.610621] Call Trace: [ 547.613220] dump_stack+0x1b9/0x294 [ 547.616863] ? dump_stack_print_info.cold.2+0x52/0x52 [ 547.617687] device veth0_to_bridge left promiscuous mode [ 547.622060] ? __save_stack_trace+0x7e/0xd0 [ 547.622086] should_fail.cold.4+0xa/0x1a [ 547.622106] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 547.622123] ? save_stack+0x43/0xd0 [ 547.645489] ? kasan_kmalloc+0xc4/0xe0 [ 547.649400] ? __kmalloc_track_caller+0x14a/0x760 [ 547.654255] ? kvasprintf+0xa9/0x130 [ 547.657980] ? kasprintf+0xa2/0xc0 [ 547.661536] ? ieee80211_alloc_led_names+0x1ab/0x410 [ 547.666642] ? graph_lock+0x170/0x170 [ 547.670444] ? genl_rcv_msg+0xc6/0x170 [ 547.674334] ? netlink_rcv_skb+0x172/0x440 [ 547.678574] ? genl_rcv+0x28/0x40 [ 547.682036] ? netlink_unicast+0x58b/0x740 [ 547.686279] ? netlink_sendmsg+0x9f0/0xfa0 [ 547.690553] ? sock_sendmsg+0xd5/0x120 [ 547.694453] ? find_held_lock+0x36/0x1c0 [ 547.698535] ? __lock_is_held+0xb5/0x140 [ 547.702631] ? check_same_owner+0x320/0x320 [ 547.706970] ? rcu_note_context_switch+0x710/0x710 [ 547.711911] __should_failslab+0x124/0x180 [ 547.716150] should_failslab+0x9/0x14 [ 547.719962] __kmalloc_track_caller+0x2c4/0x760 [ 547.724633] ? pointer+0xa10/0xa10 [ 547.728184] ? print_usage_bug+0xc0/0xc0 [ 547.732251] ? kasprintf+0xa2/0xc0 [ 547.735798] kvasprintf+0xa9/0x130 [ 547.739343] ? bust_spinlocks+0xe0/0xe0 [ 547.743326] ? __lockdep_init_map+0x105/0x590 [ 547.747828] kasprintf+0xa2/0xc0 [ 547.751199] ? kvasprintf_const+0x190/0x190 [ 547.755536] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 547.760656] ieee80211_alloc_led_names+0x240/0x410 [ 547.765598] ieee80211_alloc_hw_nm+0x1b36/0x20d0 [ 547.770374] ? ieee80211_restart_work+0x1a0/0x1a0 [ 547.775230] ? kasan_check_read+0x11/0x20 [ 547.779396] ? rcu_is_watching+0x85/0x140 [ 547.783625] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 547.788832] ? graph_lock+0x170/0x170 [ 547.792644] ? kernel_text_address+0x79/0xf0 [ 547.797057] ? __unwind_start+0x166/0x330 [ 547.801218] ? unwind_get_return_address+0x61/0xa0 [ 547.806156] ? __save_stack_trace+0x7e/0xd0 [ 547.810494] ? print_usage_bug+0xc0/0xc0 [ 547.814565] ? find_held_lock+0x36/0x1c0 [ 547.818644] ? lock_downgrade+0x8e0/0x8e0 [ 547.822801] ? genl_family_rcv_msg+0x889/0x1120 [ 547.827484] ? mark_held_locks+0xc9/0x160 [ 547.831645] ? kasan_check_read+0x11/0x20 [ 547.835810] ? __local_bh_enable_ip+0x161/0x230 [ 547.840544] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 547.845657] ? trace_hardirqs_on+0xd/0x10 [ 547.849819] ? __local_bh_enable_ip+0x161/0x230 [ 547.854501] mac80211_hwsim_new_radio+0x235/0x33b0 [ 547.859442] ? string+0x21d/0x2c0 [ 547.862905] ? widen_string+0x2d0/0x2d0 [ 547.866888] ? __lock_is_held+0xb5/0x140 [ 547.870953] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 547.877107] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 547.882657] ? vsnprintf+0x242/0x1b40 [ 547.886478] ? pointer+0xa10/0xa10 [ 547.890034] ? rcu_note_context_switch+0x710/0x710 [ 547.894979] ? __lock_acquire+0x7f5/0x5140 [ 547.899229] ? kasprintf+0xa2/0xc0 [ 547.902787] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 547.907817] ? kvasprintf+0xe2/0x130 [ 547.911535] ? bust_spinlocks+0xe0/0xe0 [ 547.915526] ? kasprintf+0xa2/0xc0 [ 547.919071] ? kvasprintf_const+0x190/0x190 [ 547.923398] ? graph_lock+0x170/0x170 [ 547.927205] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 547.932412] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 547.937965] hwsim_new_radio_nl+0x7b8/0xa60 [ 547.942297] ? nla_parse+0x358/0x4a0 [ 547.946025] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 547.951226] ? __netlink_ns_capable+0x100/0x130 [ 547.955904] genl_family_rcv_msg+0x889/0x1120 2018/06/06 15:00:24 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r0 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r1 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r1, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r1, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r4, &(0x7f0000000380)=""/235, 0x4a) r6 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r7, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r2, 0x1, 0x1}, 0x10) write(r6, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r8, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r6, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:24 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r0 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r1 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r1, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r1, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r4, &(0x7f0000000380)=""/235, 0x4a) r6 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r7, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r5, r2, 0x1, 0x1}, 0x10) write(r6, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r8, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r6, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ed], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:24 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:24 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 547.960413] ? genl_rcv+0x40/0x40 [ 547.963881] ? lock_downgrade+0x8e0/0x8e0 [ 547.968044] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 547.973077] ? kasan_check_read+0x11/0x20 [ 547.977235] ? lock_acquire+0x1dc/0x520 [ 547.981219] ? genl_rcv+0x19/0x40 [ 547.984692] genl_rcv_msg+0xc6/0x170 [ 547.988413] netlink_rcv_skb+0x172/0x440 [ 547.992484] ? genl_family_rcv_msg+0x1120/0x1120 [ 547.997246] ? netlink_ack+0xbc0/0xbc0 [ 548.001147] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 548.006353] ? netlink_skb_destructor+0x210/0x210 [ 548.011207] genl_rcv+0x28/0x40 [ 548.014493] netlink_unicast+0x58b/0x740 [ 548.018568] ? netlink_attachskb+0x970/0x970 [ 548.022986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.028541] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 548.033573] ? security_netlink_send+0x88/0xb0 [ 548.039145] netlink_sendmsg+0x9f0/0xfa0 [ 548.043230] ? netlink_unicast+0x740/0x740 [ 548.047481] ? security_socket_sendmsg+0x94/0xc0 [ 548.052239] ? netlink_unicast+0x740/0x740 [ 548.056485] sock_sendmsg+0xd5/0x120 [ 548.060196] ___sys_sendmsg+0x805/0x940 [ 548.064168] ? copy_msghdr_from_user+0x560/0x560 [ 548.068930] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 548.074456] ? proc_fail_nth_write+0x96/0x1f0 [ 548.078937] ? __fget_light+0x2ef/0x430 [ 548.082898] ? fget_raw+0x20/0x20 [ 548.086336] ? find_held_lock+0x36/0x1c0 [ 548.090565] ? kasan_check_write+0x14/0x20 [ 548.094802] ? wait_for_completion+0x870/0x870 [ 548.099399] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 548.104923] ? sockfd_lookup_light+0xc5/0x160 [ 548.109406] __sys_sendmsg+0x115/0x270 [ 548.113282] ? __ia32_sys_shutdown+0x80/0x80 [ 548.117691] ? __sb_end_write+0xac/0xe0 [ 548.121661] ? fput+0x130/0x1a0 [ 548.124923] ? ksys_write+0x1a6/0x250 [ 548.128715] __x64_sys_sendmsg+0x78/0xb0 [ 548.132782] do_syscall_64+0x1b1/0x800 [ 548.136673] ? finish_task_switch+0x1ca/0x840 [ 548.141156] ? syscall_return_slowpath+0x5c0/0x5c0 [ 548.146080] ? syscall_return_slowpath+0x30f/0x5c0 [ 548.151000] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 548.156378] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 548.161219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.166390] RIP: 0033:0x455a09 [ 548.169570] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 548.177288] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 548.184559] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 548.191825] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 548.199082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 548.206347] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000000c 2018/06/06 15:00:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:25 executing program 3 (fault-call:1 fault-nth:13): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:25 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x0, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:25 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:25 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) socket$inet6(0xa, 0x2, 0x0) [ 548.330695] device veth0_to_bridge entered promiscuous mode [ 548.343282] FAULT_INJECTION: forcing a failure. [ 548.343282] name failslab, interval 1, probability 0, space 0, times 0 [ 548.354623] CPU: 0 PID: 13427 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 548.361905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.371265] Call Trace: [ 548.373869] dump_stack+0x1b9/0x294 [ 548.377518] ? dump_stack_print_info.cold.2+0x52/0x52 [ 548.382723] ? ieee80211_roc_setup+0x3b7/0x510 [ 548.387321] ? ieee80211_mgmt_tx_cancel_wait+0x40/0x40 [ 548.392623] should_fail.cold.4+0xa/0x1a [ 548.396721] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 548.401844] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 548.406966] ? graph_lock+0x170/0x170 [ 548.410787] ? ieee80211_alloc_led_names+0x240/0x410 [ 548.415909] ? find_held_lock+0x36/0x1c0 [ 548.419988] ? __lock_is_held+0xb5/0x140 [ 548.424088] ? check_same_owner+0x320/0x320 2018/06/06 15:00:25 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 548.428422] ? graph_lock+0x170/0x170 [ 548.432233] ? rcu_note_context_switch+0x710/0x710 [ 548.437176] __should_failslab+0x124/0x180 [ 548.441424] should_failslab+0x9/0x14 [ 548.445236] kmem_cache_alloc_trace+0x2cb/0x780 [ 548.448107] device veth0_to_bridge left promiscuous mode [ 548.449910] ? find_held_lock+0x36/0x1c0 [ 548.449938] device_create_groups_vargs+0xa7/0x270 [ 548.449959] device_create+0xd3/0x100 [ 548.449978] ? device_create_vargs+0x60/0x60 [ 548.450004] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 2018/06/06 15:00:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 548.477700] ? trace_hardirqs_on+0xd/0x10 [ 548.481868] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 548.486808] ? string+0x21d/0x2c0 [ 548.490278] ? widen_string+0x2d0/0x2d0 [ 548.494270] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 548.500431] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 548.505982] ? vsnprintf+0x242/0x1b40 [ 548.509798] ? pointer+0xa10/0xa10 [ 548.513360] ? rcu_note_context_switch+0x710/0x710 [ 548.518309] ? __lock_acquire+0x7f5/0x5140 [ 548.522562] ? kasprintf+0xa2/0xc0 [ 548.526116] ? __sanitizer_cov_trace_cmp4+0x16/0x20 2018/06/06 15:00:25 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x1f9, 0x0) [ 548.531140] ? kvasprintf+0xe2/0x130 [ 548.534867] ? bust_spinlocks+0xe0/0xe0 [ 548.538859] ? kasprintf+0xa2/0xc0 [ 548.542408] ? kvasprintf_const+0x190/0x190 [ 548.546822] ? graph_lock+0x170/0x170 [ 548.550632] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 548.555918] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 548.561476] hwsim_new_radio_nl+0x7b8/0xa60 [ 548.565806] ? nla_parse+0x358/0x4a0 [ 548.569537] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 548.574747] ? __netlink_ns_capable+0x100/0x130 [ 548.579435] genl_family_rcv_msg+0x889/0x1120 [ 548.583948] ? genl_rcv+0x40/0x40 [ 548.587412] ? lock_downgrade+0x8e0/0x8e0 [ 548.591573] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 548.596604] ? kasan_check_read+0x11/0x20 [ 548.600764] ? lock_acquire+0x1dc/0x520 [ 548.604747] ? genl_rcv+0x19/0x40 [ 548.608219] genl_rcv_msg+0xc6/0x170 [ 548.611942] netlink_rcv_skb+0x172/0x440 [ 548.616537] ? genl_family_rcv_msg+0x1120/0x1120 [ 548.621304] ? netlink_ack+0xbc0/0xbc0 [ 548.625207] ? rcu_bh_force_quiescent_state+0x20/0x20 2018/06/06 15:00:25 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 548.630528] ? netlink_skb_destructor+0x210/0x210 [ 548.635388] genl_rcv+0x28/0x40 [ 548.638677] netlink_unicast+0x58b/0x740 [ 548.642755] ? netlink_attachskb+0x970/0x970 [ 548.647177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.652819] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 548.657843] ? security_netlink_send+0x88/0xb0 [ 548.662543] netlink_sendmsg+0x9f0/0xfa0 [ 548.666623] ? netlink_unicast+0x740/0x740 [ 548.670874] ? security_socket_sendmsg+0x94/0xc0 [ 548.675640] ? netlink_unicast+0x740/0x740 2018/06/06 15:00:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 548.679885] sock_sendmsg+0xd5/0x120 [ 548.683609] ___sys_sendmsg+0x805/0x940 [ 548.687596] ? copy_msghdr_from_user+0x560/0x560 [ 548.692378] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 548.697924] ? proc_fail_nth_write+0x96/0x1f0 [ 548.702431] ? __fget_light+0x2ef/0x430 [ 548.706418] ? fget_raw+0x20/0x20 [ 548.709886] ? find_held_lock+0x36/0x1c0 [ 548.713959] ? kasan_check_write+0x14/0x20 [ 548.718214] ? wait_for_completion+0x870/0x870 [ 548.722818] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 2018/06/06 15:00:25 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 548.728370] ? sockfd_lookup_light+0xc5/0x160 [ 548.732879] __sys_sendmsg+0x115/0x270 [ 548.736780] ? __ia32_sys_shutdown+0x80/0x80 [ 548.741198] ? __sb_end_write+0xac/0xe0 [ 548.745184] ? fput+0x130/0x1a0 [ 548.748472] ? ksys_write+0x1a6/0x250 [ 548.752284] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 548.757141] __x64_sys_sendmsg+0x78/0xb0 [ 548.761212] do_syscall_64+0x1b1/0x800 [ 548.765106] ? finish_task_switch+0x1ca/0x840 [ 548.769611] ? syscall_return_slowpath+0x5c0/0x5c0 [ 548.774555] ? syscall_return_slowpath+0x30f/0x5c0 2018/06/06 15:00:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0xf801000000000000, &(0x7f0000003bc0)}}], 0x1f9, 0x0) [ 548.779500] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 548.784879] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 548.789738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.794934] RIP: 0033:0x455a09 [ 548.798126] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 548.805841] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 548.813118] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 548.820398] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 548.827683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 548.834964] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000000d 2018/06/06 15:00:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:26 executing program 3 (fault-call:1 fault-nth:14): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x5000000, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:26 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x0, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") unshare(0x2000400) [ 549.001652] device veth0_to_bridge entered promiscuous mode [ 549.020730] FAULT_INJECTION: forcing a failure. [ 549.020730] name failslab, interval 1, probability 0, space 0, times 0 [ 549.032127] CPU: 1 PID: 13499 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 549.039408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.048768] Call Trace: [ 549.051372] dump_stack+0x1b9/0x294 [ 549.055022] ? dump_stack_print_info.cold.2+0x52/0x52 [ 549.060236] should_fail.cold.4+0xa/0x1a [ 549.064320] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 549.069439] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 549.070243] device veth0_to_bridge left promiscuous mode [ 549.074498] ? __lockdep_init_map+0x105/0x590 [ 549.074516] ? graph_lock+0x170/0x170 [ 549.074537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.074552] ? put_dec_trunc8+0x273/0x300 [ 549.074569] ? find_held_lock+0x36/0x1c0 [ 549.102019] ? __lock_is_held+0xb5/0x140 [ 549.106108] ? check_same_owner+0x320/0x320 [ 549.110484] ? device_pm_sleep_init+0xe8/0x200 [ 549.115084] ? rcu_note_context_switch+0x710/0x710 [ 549.120034] __should_failslab+0x124/0x180 [ 549.124297] should_failslab+0x9/0x14 [ 549.128110] __kmalloc_track_caller+0x2c4/0x760 [ 549.132830] ? pointer+0xa10/0xa10 [ 549.136386] ? kvasprintf_const+0x67/0x190 [ 549.140638] kvasprintf+0xa9/0x130 [ 549.144192] ? bust_spinlocks+0xe0/0xe0 [ 549.148183] ? rcu_read_lock_sched_held+0x108/0x120 [ 549.153214] kvasprintf_const+0x67/0x190 [ 549.157286] kobject_set_name_vargs+0x5b/0x150 [ 549.161881] device_create_groups_vargs+0x1ce/0x270 [ 549.166913] device_create+0xd3/0x100 [ 549.170728] ? device_create_vargs+0x60/0x60 [ 549.175210] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 549.180351] ? trace_hardirqs_on+0xd/0x10 [ 549.184514] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 549.189455] ? string+0x21d/0x2c0 [ 549.192917] ? widen_string+0x2d0/0x2d0 [ 549.196908] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 549.203065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 549.208630] ? vsnprintf+0x242/0x1b40 [ 549.212445] ? pointer+0xa10/0xa10 [ 549.215996] ? rcu_note_context_switch+0x710/0x710 [ 549.220938] ? __lock_acquire+0x7f5/0x5140 [ 549.225182] ? kasprintf+0xa2/0xc0 [ 549.228734] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 549.233785] ? kvasprintf+0xe2/0x130 [ 549.237607] ? bust_spinlocks+0xe0/0xe0 [ 549.241603] ? kasprintf+0xa2/0xc0 [ 549.245151] ? kvasprintf_const+0x190/0x190 2018/06/06 15:00:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0xf801, &(0x7f0000003bc0)}}], 0x1f9, 0x0) [ 549.249480] ? graph_lock+0x170/0x170 [ 549.253298] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 549.258512] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 549.264070] hwsim_new_radio_nl+0x7b8/0xa60 [ 549.268407] ? nla_parse+0x358/0x4a0 [ 549.272133] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 549.277336] ? __netlink_ns_capable+0x100/0x130 [ 549.282023] genl_family_rcv_msg+0x889/0x1120 [ 549.286542] ? genl_rcv+0x40/0x40 [ 549.290014] ? lock_downgrade+0x8e0/0x8e0 [ 549.294173] ? __sanitizer_cov_trace_cmp4+0x16/0x20 2018/06/06 15:00:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 549.299205] ? kasan_check_read+0x11/0x20 [ 549.303364] ? lock_acquire+0x1dc/0x520 [ 549.307355] ? genl_rcv+0x19/0x40 [ 549.310835] genl_rcv_msg+0xc6/0x170 [ 549.314565] netlink_rcv_skb+0x172/0x440 [ 549.318638] ? genl_family_rcv_msg+0x1120/0x1120 [ 549.323406] ? netlink_ack+0xbc0/0xbc0 [ 549.327304] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 549.332502] ? netlink_skb_destructor+0x210/0x210 [ 549.337360] genl_rcv+0x28/0x40 [ 549.340648] netlink_unicast+0x58b/0x740 [ 549.344720] ? netlink_attachskb+0x970/0x970 [ 549.349144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.354696] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 549.359722] ? security_netlink_send+0x88/0xb0 [ 549.364320] netlink_sendmsg+0x9f0/0xfa0 [ 549.368398] ? netlink_unicast+0x740/0x740 [ 549.372646] ? security_socket_sendmsg+0x94/0xc0 [ 549.377415] ? netlink_unicast+0x740/0x740 [ 549.381662] sock_sendmsg+0xd5/0x120 [ 549.385388] ___sys_sendmsg+0x805/0x940 [ 549.389379] ? copy_msghdr_from_user+0x560/0x560 [ 549.394151] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 549.399693] ? proc_fail_nth_write+0x96/0x1f0 [ 549.404203] ? __fget_light+0x2ef/0x430 [ 549.408188] ? fget_raw+0x20/0x20 [ 549.411657] ? find_held_lock+0x36/0x1c0 [ 549.415738] ? kasan_check_write+0x14/0x20 [ 549.419997] ? wait_for_completion+0x870/0x870 [ 549.424601] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 549.430149] ? sockfd_lookup_light+0xc5/0x160 [ 549.434656] __sys_sendmsg+0x115/0x270 [ 549.438554] ? __ia32_sys_shutdown+0x80/0x80 [ 549.442974] ? __sb_end_write+0xac/0xe0 [ 549.446963] ? fput+0x130/0x1a0 [ 549.450250] ? ksys_write+0x1a6/0x250 [ 549.454069] __x64_sys_sendmsg+0x78/0xb0 [ 549.458139] do_syscall_64+0x1b1/0x800 [ 549.462036] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 549.466891] ? syscall_return_slowpath+0x5c0/0x5c0 [ 549.471828] ? syscall_return_slowpath+0x30f/0x5c0 [ 549.476780] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 549.482161] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 549.487016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.492216] RIP: 0033:0x455a09 [ 549.495410] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 549.503130] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 549.510406] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 549.517686] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 549.524965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 549.532234] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000000e 2018/06/06 15:00:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0xf8010000, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:26 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0x11}]}, 0x18}, 0x1}, 0x0) 2018/06/06 15:00:26 executing program 3 (fault-call:1 fault-nth:15): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") [ 549.649712] device veth0_to_bridge entered promiscuous mode [ 549.667588] FAULT_INJECTION: forcing a failure. [ 549.667588] name failslab, interval 1, probability 0, space 0, times 0 [ 549.678896] CPU: 1 PID: 13569 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 549.686181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.695542] Call Trace: [ 549.698144] dump_stack+0x1b9/0x294 [ 549.701793] ? dump_stack_print_info.cold.2+0x52/0x52 [ 549.706996] ? is_bpf_text_address+0xd7/0x170 [ 549.711502] ? kernel_text_address+0x79/0xf0 [ 549.715931] should_fail.cold.4+0xa/0x1a [ 549.716411] device veth0_to_bridge left promiscuous mode [ 549.720010] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 549.720035] ? graph_lock+0x170/0x170 [ 549.720050] ? save_stack+0xa9/0xd0 [ 549.720064] ? save_stack+0x43/0xd0 [ 549.720077] ? kasan_kmalloc+0xc4/0xe0 [ 549.720093] ? find_held_lock+0x36/0x1c0 [ 549.720110] ? __lock_is_held+0xb5/0x140 [ 549.753644] ? check_same_owner+0x320/0x320 [ 549.757980] ? put_dec+0xf0/0xf0 [ 549.761369] ? rcu_note_context_switch+0x710/0x710 [ 549.766317] __should_failslab+0x124/0x180 [ 549.770566] should_failslab+0x9/0x14 [ 549.774382] kmem_cache_alloc_trace+0x2cb/0x780 [ 549.779068] ? refcount_add_not_zero+0x320/0x320 [ 549.783843] device_private_init+0x98/0x230 [ 549.788181] ? virtual_device_parent+0x60/0x60 [ 549.792787] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 2018/06/06 15:00:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)) socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:26 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0x11}]}, 0x18}, 0x1}, 0x0) 2018/06/06 15:00:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 549.798331] ? refcount_inc+0x29/0x70 [ 549.802141] device_add+0xe98/0x16d0 [ 549.805868] ? device_private_init+0x230/0x230 [ 549.810456] ? kfree+0x1e9/0x260 [ 549.813926] ? kfree_const+0x5e/0x70 [ 549.817650] device_create_groups_vargs+0x1ff/0x270 [ 549.822674] device_create+0xd3/0x100 [ 549.826479] ? device_create_vargs+0x60/0x60 [ 549.830899] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 549.836008] ? trace_hardirqs_on+0xd/0x10 [ 549.840174] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 549.845111] ? string+0x21d/0x2c0 2018/06/06 15:00:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 549.848576] ? widen_string+0x2d0/0x2d0 [ 549.852567] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 549.858723] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 549.864271] ? vsnprintf+0x242/0x1b40 [ 549.868081] ? pointer+0xa10/0xa10 [ 549.871628] ? rcu_note_context_switch+0x710/0x710 [ 549.876574] ? __lock_acquire+0x7f5/0x5140 [ 549.880816] ? kasprintf+0xa2/0xc0 [ 549.884365] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 549.889386] ? kvasprintf+0xe2/0x130 [ 549.893107] ? bust_spinlocks+0xe0/0xe0 [ 549.897094] ? kasprintf+0xa2/0xc0 2018/06/06 15:00:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xed07], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 549.900641] ? kvasprintf_const+0x190/0x190 [ 549.904970] ? graph_lock+0x170/0x170 [ 549.908778] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 549.913981] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 549.921363] hwsim_new_radio_nl+0x7b8/0xa60 [ 549.925694] ? nla_parse+0x358/0x4a0 [ 549.929423] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 549.934805] ? __netlink_ns_capable+0x100/0x130 [ 549.939488] genl_family_rcv_msg+0x889/0x1120 [ 549.944000] ? genl_rcv+0x40/0x40 2018/06/06 15:00:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 549.947461] ? lock_downgrade+0x8e0/0x8e0 [ 549.951622] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 549.956655] ? kasan_check_read+0x11/0x20 [ 549.960815] ? lock_acquire+0x1dc/0x520 [ 549.964799] ? genl_rcv+0x19/0x40 [ 549.968278] genl_rcv_msg+0xc6/0x170 [ 549.972005] netlink_rcv_skb+0x172/0x440 [ 549.976075] ? genl_family_rcv_msg+0x1120/0x1120 [ 549.980841] ? netlink_ack+0xbc0/0xbc0 [ 549.984741] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 549.989945] ? netlink_skb_destructor+0x210/0x210 [ 549.994805] genl_rcv+0x28/0x40 2018/06/06 15:00:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0xc3ff, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 549.998096] netlink_unicast+0x58b/0x740 [ 550.002172] ? netlink_attachskb+0x970/0x970 [ 550.006596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 550.012154] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 550.017181] ? security_netlink_send+0x88/0xb0 [ 550.021780] netlink_sendmsg+0x9f0/0xfa0 [ 550.025861] ? netlink_unicast+0x740/0x740 [ 550.030112] ? security_socket_sendmsg+0x94/0xc0 [ 550.034883] ? netlink_unicast+0x740/0x740 [ 550.039131] sock_sendmsg+0xd5/0x120 [ 550.042857] ___sys_sendmsg+0x805/0x940 [ 550.046849] ? copy_msghdr_from_user+0x560/0x560 [ 550.051628] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 550.057265] ? proc_fail_nth_write+0x96/0x1f0 [ 550.061774] ? __fget_light+0x2ef/0x430 [ 550.065760] ? fget_raw+0x20/0x20 [ 550.069227] ? find_held_lock+0x36/0x1c0 [ 550.073304] ? kasan_check_write+0x14/0x20 [ 550.077560] ? wait_for_completion+0x870/0x870 [ 550.082189] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 550.087747] ? sockfd_lookup_light+0xc5/0x160 [ 550.092262] __sys_sendmsg+0x115/0x270 [ 550.096166] ? __ia32_sys_shutdown+0x80/0x80 [ 550.100591] ? __sb_end_write+0xac/0xe0 [ 550.104601] ? fput+0x130/0x1a0 [ 550.107894] ? ksys_write+0x1a6/0x250 [ 550.111727] __x64_sys_sendmsg+0x78/0xb0 [ 550.115802] do_syscall_64+0x1b1/0x800 [ 550.119699] ? finish_task_switch+0x1ca/0x840 [ 550.124210] ? syscall_return_slowpath+0x5c0/0x5c0 [ 550.129157] ? syscall_return_slowpath+0x30f/0x5c0 [ 550.134100] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 550.139484] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 550.144344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.149543] RIP: 0033:0x455a09 [ 550.152737] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 550.160457] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 550.167741] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 550.175378] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 550.182664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 550.189944] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000000f 2018/06/06 15:00:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:27 executing program 3 (fault-call:1 fault-nth:16): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)) socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:27 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0x11}]}, 0x18}, 0x1}, 0x0) 2018/06/06 15:00:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x100000000000000, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) socket$kcm(0x29, 0x2, 0x0) 2018/06/06 15:00:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 550.314476] FAULT_INJECTION: forcing a failure. [ 550.314476] name failslab, interval 1, probability 0, space 0, times 0 [ 550.314653] device veth0_to_bridge entered promiscuous mode [ 550.325785] CPU: 0 PID: 13626 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 550.338755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.348117] Call Trace: [ 550.350717] dump_stack+0x1b9/0x294 [ 550.354363] ? dump_stack_print_info.cold.2+0x52/0x52 [ 550.359576] should_fail.cold.4+0xa/0x1a [ 550.363660] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 550.368782] ? graph_lock+0x170/0x170 [ 550.373036] ? find_held_lock+0x36/0x1c0 [ 550.377118] ? __lock_is_held+0xb5/0x140 [ 550.381206] ? check_same_owner+0x320/0x320 [ 550.385545] ? rcu_note_context_switch+0x710/0x710 [ 550.390490] ? check_same_owner+0x320/0x320 [ 550.394830] __should_failslab+0x124/0x180 [ 550.398599] device veth0_to_bridge left promiscuous mode [ 550.399071] should_failslab+0x9/0x14 [ 550.399092] __kmalloc_track_caller+0x2c4/0x760 [ 550.399111] ? debug_check_no_locks_freed+0x310/0x310 [ 550.418208] ? kasan_check_write+0x14/0x20 [ 550.422456] ? __mutex_lock+0x7d9/0x17f0 [ 550.426537] ? kstrdup_const+0x66/0x80 [ 550.430446] kstrdup+0x39/0x70 [ 550.433648] kstrdup_const+0x66/0x80 [ 550.437374] __kernfs_new_node+0xa8/0x580 [ 550.441533] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 550.446306] ? lock_downgrade+0x8e0/0x8e0 [ 550.450469] kernfs_new_node+0x80/0xf0 [ 550.454369] kernfs_create_dir_ns+0x3d/0x140 [ 550.458790] sysfs_create_dir_ns+0xbe/0x1d0 [ 550.463122] kobject_add_internal+0x354/0xac0 [ 550.467615] ? kobj_ns_type_registered+0x60/0x60 [ 550.472371] ? lock_downgrade+0x8e0/0x8e0 [ 550.476508] ? refcount_add_not_zero+0x320/0x320 [ 550.481253] ? kasan_check_read+0x11/0x20 [ 550.485392] kobject_add+0x13a/0x190 [ 550.489092] ? kset_create_and_add+0x190/0x190 [ 550.493668] ? mutex_unlock+0xd/0x10 [ 550.497373] device_add+0x3a5/0x16d0 [ 550.501077] ? device_private_init+0x230/0x230 [ 550.505647] ? kfree+0x1e9/0x260 [ 550.509010] ? kfree_const+0x5e/0x70 [ 550.512719] device_create_groups_vargs+0x1ff/0x270 [ 550.517723] device_create+0xd3/0x100 [ 550.521512] ? device_create_vargs+0x60/0x60 [ 550.525914] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 550.531011] ? trace_hardirqs_on+0xd/0x10 [ 550.535154] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 550.540069] ? string+0x21d/0x2c0 [ 550.543511] ? widen_string+0x2d0/0x2d0 [ 550.547492] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 550.553628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 550.559151] ? vsnprintf+0x242/0x1b40 [ 550.562942] ? pointer+0xa10/0xa10 [ 550.566475] ? rcu_note_context_switch+0x710/0x710 [ 550.571413] ? __lock_acquire+0x7f5/0x5140 [ 550.575645] ? kasprintf+0xa2/0xc0 [ 550.579201] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 550.584217] ? kvasprintf+0xe2/0x130 [ 550.587921] ? bust_spinlocks+0xe0/0xe0 [ 550.591892] ? kasprintf+0xa2/0xc0 [ 550.595424] ? kvasprintf_const+0x190/0x190 [ 550.599731] ? graph_lock+0x170/0x170 [ 550.603522] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 550.608790] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 550.614320] hwsim_new_radio_nl+0x7b8/0xa60 [ 550.618630] ? nla_parse+0x358/0x4a0 [ 550.622332] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 550.627519] ? __netlink_ns_capable+0x100/0x130 [ 550.632207] genl_family_rcv_msg+0x889/0x1120 [ 550.636704] ? genl_rcv+0x40/0x40 [ 550.640145] ? lock_downgrade+0x8e0/0x8e0 [ 550.644282] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 550.649294] ? kasan_check_read+0x11/0x20 [ 550.653432] ? lock_acquire+0x1dc/0x520 [ 550.657392] ? genl_rcv+0x19/0x40 [ 550.660850] genl_rcv_msg+0xc6/0x170 [ 550.664558] netlink_rcv_skb+0x172/0x440 [ 550.668607] ? genl_family_rcv_msg+0x1120/0x1120 [ 550.673355] ? netlink_ack+0xbc0/0xbc0 [ 550.677230] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 550.682410] ? netlink_skb_destructor+0x210/0x210 [ 550.687244] genl_rcv+0x28/0x40 [ 550.690601] netlink_unicast+0x58b/0x740 [ 550.694652] ? netlink_attachskb+0x970/0x970 [ 550.699048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 550.704574] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 550.709582] ? security_netlink_send+0x88/0xb0 [ 550.714157] netlink_sendmsg+0x9f0/0xfa0 [ 550.718217] ? netlink_unicast+0x740/0x740 [ 550.722440] ? security_socket_sendmsg+0x94/0xc0 [ 550.727186] ? netlink_unicast+0x740/0x740 [ 550.731413] sock_sendmsg+0xd5/0x120 [ 550.735117] ___sys_sendmsg+0x805/0x940 [ 550.739079] ? copy_msghdr_from_user+0x560/0x560 [ 550.743842] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 550.749368] ? proc_fail_nth_write+0x96/0x1f0 [ 550.753854] ? __fget_light+0x2ef/0x430 [ 550.757817] ? fget_raw+0x20/0x20 [ 550.761262] ? find_held_lock+0x36/0x1c0 [ 550.765314] ? kasan_check_write+0x14/0x20 [ 550.769544] ? wait_for_completion+0x870/0x870 [ 550.774132] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 550.779661] ? sockfd_lookup_light+0xc5/0x160 [ 550.784145] __sys_sendmsg+0x115/0x270 [ 550.788025] ? __ia32_sys_shutdown+0x80/0x80 [ 550.792424] ? __sb_end_write+0xac/0xe0 [ 550.796388] ? fput+0x130/0x1a0 [ 550.799655] ? ksys_write+0x1a6/0x250 [ 550.803450] __x64_sys_sendmsg+0x78/0xb0 [ 550.807500] do_syscall_64+0x1b1/0x800 [ 550.811377] ? finish_task_switch+0x1ca/0x840 [ 550.815864] ? syscall_return_slowpath+0x5c0/0x5c0 [ 550.820783] ? syscall_return_slowpath+0x30f/0x5c0 [ 550.825704] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 550.831062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 550.835900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.841074] RIP: 0033:0x455a09 [ 550.844247] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 550.851946] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 550.859203] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 2018/06/06 15:00:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)) socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) socket$nl_generic(0x10, 0x3, 0x10) [ 550.866458] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 550.873713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 550.880975] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000010 [ 550.888595] kobject_add_internal failed for hwsim84 (error: -12 parent: mac80211_hwsim) [ 551.069223] device veth0_to_bridge entered promiscuous mode 2018/06/06 15:00:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:28 executing program 3 (fault-call:1 fault-nth:17): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:28 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:28 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c9924") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x500000000000000, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:28 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffff, 0x800}, &(0x7f00000000c0)=0x90) 2018/06/06 15:00:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 551.131404] device veth0_to_bridge left promiscuous mode [ 551.173647] FAULT_INJECTION: forcing a failure. [ 551.173647] name failslab, interval 1, probability 0, space 0, times 0 [ 551.185008] CPU: 0 PID: 13666 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 551.185969] device veth0_to_bridge entered promiscuous mode [ 551.192282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.192289] Call Trace: [ 551.192311] dump_stack+0x1b9/0x294 [ 551.192331] ? dump_stack_print_info.cold.2+0x52/0x52 [ 551.192355] should_fail.cold.4+0xa/0x1a [ 551.192378] ? __kmalloc_track_caller+0x14a/0x760 [ 551.227696] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 551.232817] ? device_add+0x3a5/0x16d0 [ 551.236723] ? device_create_groups_vargs+0x1ff/0x270 [ 551.240287] device veth0_to_bridge left promiscuous mode [ 551.241920] ? device_create+0xd3/0x100 [ 551.241940] ? mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 551.241954] ? hwsim_new_radio_nl+0x7b8/0xa60 [ 551.241969] ? genl_family_rcv_msg+0x889/0x1120 [ 551.241987] ? genl_rcv_msg+0xc6/0x170 [ 551.269499] ? graph_lock+0x170/0x170 [ 551.273333] ? sock_sendmsg+0xd5/0x120 [ 551.277233] ? ___sys_sendmsg+0x805/0x940 [ 551.281391] ? __sys_sendmsg+0x115/0x270 [ 551.285457] ? __x64_sys_sendmsg+0x78/0xb0 [ 551.289699] ? do_syscall_64+0x1b1/0x800 [ 551.293776] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.299158] ? find_held_lock+0x36/0x1c0 [ 551.304366] ? __lock_is_held+0xb5/0x140 [ 551.308452] ? check_same_owner+0x320/0x320 [ 551.312792] ? rcu_note_context_switch+0x710/0x710 [ 551.317743] ? rcu_read_lock_sched_held+0x108/0x120 [ 551.322779] __should_failslab+0x124/0x180 [ 551.327119] should_failslab+0x9/0x14 [ 551.330936] kmem_cache_alloc+0x2af/0x760 [ 551.335089] ? memcpy+0x45/0x50 [ 551.338382] ? kstrdup+0x59/0x70 [ 551.341762] __kernfs_new_node+0xe7/0x580 [ 551.345921] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 551.350690] ? lock_release+0x4d4/0xa10 [ 551.354686] ? lock_downgrade+0x8e0/0x8e0 [ 551.358852] kernfs_new_node+0x80/0xf0 [ 551.362752] kernfs_create_dir_ns+0x3d/0x140 [ 551.367174] sysfs_create_dir_ns+0xbe/0x1d0 [ 551.371516] kobject_add_internal+0x354/0xac0 [ 551.376027] ? kobj_ns_type_registered+0x60/0x60 [ 551.380798] ? lock_downgrade+0x8e0/0x8e0 [ 551.384954] ? refcount_add_not_zero+0x320/0x320 [ 551.389726] ? kasan_check_read+0x11/0x20 [ 551.393885] kobject_add+0x13a/0x190 [ 551.397612] ? kset_create_and_add+0x190/0x190 [ 551.402216] ? mutex_unlock+0xd/0x10 [ 551.405944] device_add+0x3a5/0x16d0 [ 551.409686] ? device_private_init+0x230/0x230 [ 551.414282] ? kfree+0x1e9/0x260 [ 551.417667] ? kfree_const+0x5e/0x70 [ 551.421396] device_create_groups_vargs+0x1ff/0x270 [ 551.426429] device_create+0xd3/0x100 [ 551.430248] ? device_create_vargs+0x60/0x60 [ 551.434672] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 551.439782] ? trace_hardirqs_on+0xd/0x10 [ 551.443945] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 551.448882] ? string+0x21d/0x2c0 [ 551.452347] ? widen_string+0x2d0/0x2d0 [ 551.456342] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 551.462511] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 551.468068] ? vsnprintf+0x242/0x1b40 [ 551.471882] ? pointer+0xa10/0xa10 [ 551.475435] ? rcu_note_context_switch+0x710/0x710 [ 551.480379] ? __lock_acquire+0x7f5/0x5140 [ 551.484628] ? kasprintf+0xa2/0xc0 [ 551.488187] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 551.493216] ? kvasprintf+0xe2/0x130 [ 551.496945] ? bust_spinlocks+0xe0/0xe0 [ 551.500937] ? kasprintf+0xa2/0xc0 [ 551.504486] ? kvasprintf_const+0x190/0x190 [ 551.508815] ? graph_lock+0x170/0x170 [ 551.512630] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 551.517830] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 551.523387] hwsim_new_radio_nl+0x7b8/0xa60 [ 551.527720] ? nla_parse+0x358/0x4a0 [ 551.531453] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 551.536668] ? __netlink_ns_capable+0x100/0x130 [ 551.541357] genl_family_rcv_msg+0x889/0x1120 [ 551.545870] ? genl_rcv+0x40/0x40 [ 551.549339] ? lock_downgrade+0x8e0/0x8e0 [ 551.553508] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 551.558550] ? kasan_check_read+0x11/0x20 [ 551.562710] ? lock_acquire+0x1dc/0x520 [ 551.566693] ? genl_rcv+0x19/0x40 [ 551.570171] genl_rcv_msg+0xc6/0x170 2018/06/06 15:00:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:28 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:28 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:28 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0e") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:28 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0x1}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0e") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) [ 551.573895] netlink_rcv_skb+0x172/0x440 [ 551.577962] ? genl_family_rcv_msg+0x1120/0x1120 [ 551.582727] ? netlink_ack+0xbc0/0xbc0 [ 551.586621] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 551.591828] ? netlink_skb_destructor+0x210/0x210 [ 551.596690] genl_rcv+0x28/0x40 [ 551.599987] netlink_unicast+0x58b/0x740 [ 551.604064] ? netlink_attachskb+0x970/0x970 [ 551.608486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 551.614033] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 551.619065] ? security_netlink_send+0x88/0xb0 [ 551.623652] netlink_sendmsg+0x9f0/0xfa0 [ 551.627729] ? netlink_unicast+0x740/0x740 [ 551.631975] ? security_socket_sendmsg+0x94/0xc0 [ 551.636742] ? netlink_unicast+0x740/0x740 [ 551.641876] sock_sendmsg+0xd5/0x120 [ 551.645607] ___sys_sendmsg+0x805/0x940 [ 551.649601] ? copy_msghdr_from_user+0x560/0x560 [ 551.654393] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 551.659932] ? proc_fail_nth_write+0x96/0x1f0 [ 551.664416] ? __fget_light+0x2ef/0x430 [ 551.668384] ? fget_raw+0x20/0x20 [ 551.671839] ? find_held_lock+0x36/0x1c0 [ 551.675895] ? kasan_check_write+0x14/0x20 [ 551.680124] ? wait_for_completion+0x870/0x870 [ 551.684697] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 551.690230] ? sockfd_lookup_light+0xc5/0x160 [ 551.694727] __sys_sendmsg+0x115/0x270 [ 551.698639] ? __ia32_sys_shutdown+0x80/0x80 [ 551.703042] ? __sb_end_write+0xac/0xe0 [ 551.707002] ? fput+0x130/0x1a0 [ 551.710276] ? ksys_write+0x1a6/0x250 [ 551.714073] __x64_sys_sendmsg+0x78/0xb0 [ 551.718147] do_syscall_64+0x1b1/0x800 [ 551.722032] ? finish_task_switch+0x1ca/0x840 [ 551.726521] ? syscall_return_slowpath+0x5c0/0x5c0 [ 551.731452] ? syscall_return_slowpath+0x30f/0x5c0 [ 551.736379] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 551.741733] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 551.746576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.751755] RIP: 0033:0x455a09 [ 551.754926] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 551.762623] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:28 executing program 3 (fault-call:1 fault-nth:18): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0e") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:28 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x8}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 551.769878] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 551.777149] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 551.784408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 551.791671] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000011 [ 551.799274] kobject_add_internal failed for hwsim85 (error: -12 parent: mac80211_hwsim) [ 551.885078] FAULT_INJECTION: forcing a failure. [ 551.885078] name failslab, interval 1, probability 0, space 0, times 0 [ 551.896402] CPU: 0 PID: 13715 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 551.903679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.913036] Call Trace: [ 551.915726] dump_stack+0x1b9/0x294 [ 551.919372] ? dump_stack_print_info.cold.2+0x52/0x52 [ 551.924580] ? __lock_acquire+0x7f5/0x5140 [ 551.928839] should_fail.cold.4+0xa/0x1a [ 551.933001] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 551.937604] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 551.942728] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 551.947765] ? trace_hardirqs_on+0xd/0x10 [ 551.951932] ? __schedule+0x144f/0x1e30 [ 551.955931] ? __sched_text_start+0x8/0x8 [ 551.960092] ? find_held_lock+0x36/0x1c0 [ 551.964179] ? __lock_is_held+0xb5/0x140 [ 551.968266] ? check_same_owner+0x320/0x320 [ 551.972605] __should_failslab+0x124/0x180 [ 551.976845] should_failslab+0x9/0x14 [ 551.980654] kmem_cache_alloc+0x2af/0x760 [ 551.984813] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 551.990362] ? graph_lock+0x170/0x170 [ 551.994181] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 551.999212] __kernfs_new_node+0xe7/0x580 [ 552.003367] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 552.008130] ? find_held_lock+0x36/0x1c0 [ 552.012207] ? mark_held_locks+0xc9/0x160 [ 552.016361] ? lock_downgrade+0x8e0/0x8e0 [ 552.020527] kernfs_new_node+0x80/0xf0 [ 552.024426] __kernfs_create_file+0x4d/0x330 [ 552.028847] sysfs_add_file_mode_ns+0x21a/0x560 [ 552.033535] sysfs_create_file_ns+0x8b/0xb0 [ 552.037879] device_create_file+0xf4/0x1e0 [ 552.042112] ? acpi_bind_one+0x8f0/0x8f0 [ 552.046164] device_add+0x3ec/0x16d0 [ 552.049866] ? device_private_init+0x230/0x230 [ 552.054435] ? kfree+0x1e9/0x260 [ 552.057790] ? kfree_const+0x5e/0x70 [ 552.061494] device_create_groups_vargs+0x1ff/0x270 [ 552.066507] device_create+0xd3/0x100 [ 552.070304] ? device_create_vargs+0x60/0x60 [ 552.074715] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 552.079819] ? trace_hardirqs_on+0xd/0x10 [ 552.083968] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 552.088896] ? string+0x21d/0x2c0 [ 552.092333] ? widen_string+0x2d0/0x2d0 [ 552.096310] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 552.102456] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 552.107981] ? vsnprintf+0x242/0x1b40 [ 552.111784] ? pointer+0xa10/0xa10 [ 552.115314] ? rcu_note_context_switch+0x710/0x710 [ 552.120228] ? __lock_acquire+0x7f5/0x5140 [ 552.124461] ? kasprintf+0xa2/0xc0 [ 552.127991] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 552.132993] ? kvasprintf+0xe2/0x130 [ 552.136694] ? bust_spinlocks+0xe0/0xe0 [ 552.140653] ? kasprintf+0xa2/0xc0 [ 552.144181] ? kvasprintf_const+0x190/0x190 [ 552.148661] ? graph_lock+0x170/0x170 [ 552.152472] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 552.157650] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 552.163180] hwsim_new_radio_nl+0x7b8/0xa60 [ 552.167500] ? nla_parse+0x358/0x4a0 [ 552.171204] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 552.176387] ? __netlink_ns_capable+0x100/0x130 [ 552.181062] genl_family_rcv_msg+0x889/0x1120 [ 552.185560] ? genl_rcv+0x40/0x40 [ 552.188999] ? lock_downgrade+0x8e0/0x8e0 [ 552.193149] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 552.198170] ? kasan_check_read+0x11/0x20 [ 552.202309] ? lock_acquire+0x1dc/0x520 [ 552.206272] ? genl_rcv+0x19/0x40 [ 552.209731] genl_rcv_msg+0xc6/0x170 [ 552.213432] netlink_rcv_skb+0x172/0x440 [ 552.217478] ? genl_family_rcv_msg+0x1120/0x1120 [ 552.222220] ? netlink_ack+0xbc0/0xbc0 [ 552.226104] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 552.231294] ? netlink_skb_destructor+0x210/0x210 [ 552.236126] genl_rcv+0x28/0x40 [ 552.239390] netlink_unicast+0x58b/0x740 [ 552.243441] ? netlink_attachskb+0x970/0x970 [ 552.247840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 552.253364] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 552.258375] ? security_netlink_send+0x88/0xb0 [ 552.262944] netlink_sendmsg+0x9f0/0xfa0 [ 552.266997] ? netlink_unicast+0x740/0x740 [ 552.271240] ? security_socket_sendmsg+0x94/0xc0 [ 552.275999] ? netlink_unicast+0x740/0x740 [ 552.280237] sock_sendmsg+0xd5/0x120 [ 552.283937] ___sys_sendmsg+0x805/0x940 [ 552.287901] ? copy_msghdr_from_user+0x560/0x560 [ 552.292651] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 552.298175] ? proc_fail_nth_write+0x96/0x1f0 [ 552.302656] ? __fget_light+0x2ef/0x430 [ 552.306619] ? fget_raw+0x20/0x20 [ 552.310066] ? find_held_lock+0x36/0x1c0 [ 552.314133] ? kasan_check_write+0x14/0x20 [ 552.318364] ? wait_for_completion+0x870/0x870 [ 552.322949] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 552.328485] ? sockfd_lookup_light+0xc5/0x160 [ 552.332997] __sys_sendmsg+0x115/0x270 [ 552.336878] ? __ia32_sys_shutdown+0x80/0x80 [ 552.341273] ? __sb_end_write+0xac/0xe0 [ 552.345235] ? fput+0x130/0x1a0 [ 552.348501] ? ksys_write+0x1a6/0x250 [ 552.352292] __x64_sys_sendmsg+0x78/0xb0 [ 552.356340] do_syscall_64+0x1b1/0x800 [ 552.360210] ? finish_task_switch+0x1ca/0x840 [ 552.364700] ? syscall_return_slowpath+0x5c0/0x5c0 [ 552.369628] ? syscall_return_slowpath+0x30f/0x5c0 [ 552.374548] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 552.379902] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/06/06 15:00:29 executing program 7 (fault-call:3 fault-nth:0): r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:29 executing program 3 (fault-call:1 fault-nth:19): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 552.384742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.389917] RIP: 0033:0x455a09 [ 552.393112] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 552.400807] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 552.408064] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 552.415328] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 552.422589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 552.429845] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000012 2018/06/06 15:00:29 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x2}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x1000000, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 552.492984] device veth0_to_bridge entered promiscuous mode [ 552.503510] FAULT_INJECTION: forcing a failure. [ 552.503510] name failslab, interval 1, probability 0, space 0, times 0 [ 552.514891] CPU: 0 PID: 13732 Comm: syz-executor7 Not tainted 4.17.0-rc7+ #80 [ 552.522174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.531536] Call Trace: [ 552.534150] dump_stack+0x1b9/0x294 [ 552.537794] ? dump_stack_print_info.cold.2+0x52/0x52 [ 552.543000] ? lock_downgrade+0x8e0/0x8e0 [ 552.547260] should_fail.cold.4+0xa/0x1a [ 552.551345] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 552.556467] ? __local_bh_enable_ip+0x161/0x230 [ 552.561151] ? _raw_spin_unlock_bh+0x30/0x40 [ 552.565577] ? release_sock+0x1e2/0x2b0 [ 552.569566] ? rcu_is_watching+0x85/0x140 [ 552.573819] ? __local_bh_enable_ip+0x161/0x230 [ 552.574307] device veth0_to_bridge left promiscuous mode [ 552.578500] ? __release_sock+0x3a0/0x3a0 [ 552.578522] ? find_held_lock+0x36/0x1c0 2018/06/06 15:00:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 552.578558] ? check_same_owner+0x320/0x320 [ 552.596513] ? rcu_note_context_switch+0x710/0x710 [ 552.601464] ? __netlink_lookup+0x5cf/0xaa0 [ 552.605799] __should_failslab+0x124/0x180 [ 552.610045] should_failslab+0x9/0x14 [ 552.613863] kmem_cache_alloc_node+0x272/0x780 [ 552.618455] ? find_held_lock+0x36/0x1c0 [ 552.622530] __alloc_skb+0x111/0x780 [ 552.626253] ? skb_scrub_packet+0x580/0x580 [ 552.630595] ? rcu_is_watching+0x85/0x140 [ 552.634765] ? rcu_bh_force_quiescent_state+0x20/0x20 2018/06/06 15:00:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 552.639980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 552.645529] ? netlink_autobind.isra.34+0x240/0x330 [ 552.650564] netlink_sendmsg+0xb01/0xfa0 [ 552.654644] ? netlink_unicast+0x740/0x740 [ 552.658896] ? security_socket_sendmsg+0x94/0xc0 [ 552.663663] ? netlink_unicast+0x740/0x740 [ 552.667908] sock_sendmsg+0xd5/0x120 [ 552.671631] ___sys_sendmsg+0x805/0x940 [ 552.675618] ? copy_msghdr_from_user+0x560/0x560 [ 552.680394] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 552.685942] ? proc_fail_nth_write+0x96/0x1f0 [ 552.690446] ? __fget_light+0x2ef/0x430 [ 552.694429] ? fget_raw+0x20/0x20 [ 552.697886] ? find_held_lock+0x36/0x1c0 [ 552.701962] ? kasan_check_write+0x14/0x20 [ 552.706216] ? wait_for_completion+0x870/0x870 [ 552.710831] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 552.716381] ? sockfd_lookup_light+0xc5/0x160 [ 552.720893] __sys_sendmsg+0x115/0x270 [ 552.724793] ? __ia32_sys_shutdown+0x80/0x80 [ 552.729220] ? __sb_end_write+0xac/0xe0 [ 552.733207] ? fput+0x130/0x1a0 [ 552.736495] ? ksys_write+0x1a6/0x250 [ 552.740317] __x64_sys_sendmsg+0x78/0xb0 [ 552.744391] do_syscall_64+0x1b1/0x800 [ 552.748290] ? finish_task_switch+0x1ca/0x840 [ 552.752797] ? syscall_return_slowpath+0x5c0/0x5c0 [ 552.757738] ? syscall_return_slowpath+0x30f/0x5c0 [ 552.762685] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 552.768076] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 552.773114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.778324] RIP: 0033:0x455a09 [ 552.781524] RSP: 002b:00007f6bf4d0bc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 2018/06/06 15:00:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb53") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:29 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb53") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 552.789508] RAX: ffffffffffffffda RBX: 00007f6bf4d0c6d4 RCX: 0000000000455a09 [ 552.796799] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000014 [ 552.804080] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 552.811356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 552.818636] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000000 [ 552.857753] FAULT_INJECTION: forcing a failure. [ 552.857753] name failslab, interval 1, probability 0, space 0, times 0 [ 552.869523] CPU: 0 PID: 13764 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 552.876803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.886161] Call Trace: [ 552.888758] dump_stack+0x1b9/0x294 [ 552.892399] ? dump_stack_print_info.cold.2+0x52/0x52 [ 552.897607] ? mutex_trylock+0x2a0/0x2a0 [ 552.901690] should_fail.cold.4+0xa/0x1a [ 552.905772] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 552.910896] ? graph_lock+0x170/0x170 [ 552.914800] ? find_held_lock+0x36/0x1c0 [ 552.918880] ? find_held_lock+0x36/0x1c0 [ 552.922968] ? __lock_is_held+0xb5/0x140 [ 552.927064] ? check_same_owner+0x320/0x320 [ 552.931397] ? graph_lock+0x170/0x170 [ 552.935213] ? rcu_note_context_switch+0x710/0x710 [ 552.940155] ? kasan_check_write+0x14/0x20 [ 552.944406] __should_failslab+0x124/0x180 [ 552.948657] should_failslab+0x9/0x14 [ 552.952472] kmem_cache_alloc+0x2af/0x760 [ 552.956644] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 552.961674] __kernfs_new_node+0xe7/0x580 [ 552.965851] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 552.970626] ? lock_downgrade+0x8e0/0x8e0 [ 552.974795] ? kasan_check_read+0x11/0x20 [ 552.979054] ? do_raw_spin_unlock+0x9e/0x2e0 [ 552.983479] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 552.988078] kernfs_new_node+0x80/0xf0 [ 552.991982] kernfs_create_link+0x33/0x180 [ 552.996242] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 553.001539] sysfs_create_link+0x65/0xc0 [ 553.005612] device_add+0x481/0x16d0 [ 553.009334] ? device_private_init+0x230/0x230 [ 553.013909] ? kfree+0x1e9/0x260 [ 553.017289] ? kfree_const+0x5e/0x70 [ 553.020993] device_create_groups_vargs+0x1ff/0x270 [ 553.026012] device_create+0xd3/0x100 [ 553.029822] ? device_create_vargs+0x60/0x60 [ 553.034230] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 553.039336] ? trace_hardirqs_on+0xd/0x10 [ 553.043474] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 553.048399] ? string+0x21d/0x2c0 [ 553.051843] ? widen_string+0x2d0/0x2d0 [ 553.055814] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 553.061970] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 553.067495] ? vsnprintf+0x242/0x1b40 [ 553.071285] ? pointer+0xa10/0xa10 [ 553.074815] ? rcu_note_context_switch+0x710/0x710 [ 553.079737] ? __lock_acquire+0x7f5/0x5140 [ 553.083967] ? kasprintf+0xa2/0xc0 [ 553.087495] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 553.092498] ? kvasprintf+0xe2/0x130 [ 553.096205] ? bust_spinlocks+0xe0/0xe0 [ 553.100260] ? kasprintf+0xa2/0xc0 [ 553.103787] ? kvasprintf_const+0x190/0x190 [ 553.108094] ? graph_lock+0x170/0x170 [ 553.111909] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 553.117089] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 553.122617] hwsim_new_radio_nl+0x7b8/0xa60 [ 553.126929] ? nla_parse+0x358/0x4a0 [ 553.130629] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 553.135809] ? __netlink_ns_capable+0x100/0x130 [ 553.140479] genl_family_rcv_msg+0x889/0x1120 [ 553.144997] ? genl_rcv+0x40/0x40 [ 553.148453] ? lock_downgrade+0x8e0/0x8e0 [ 553.152595] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 553.157602] ? kasan_check_read+0x11/0x20 [ 553.161738] ? lock_acquire+0x1dc/0x520 [ 553.165707] ? genl_rcv+0x19/0x40 [ 553.169164] genl_rcv_msg+0xc6/0x170 [ 553.172864] netlink_rcv_skb+0x172/0x440 [ 553.177087] ? genl_family_rcv_msg+0x1120/0x1120 [ 553.181828] ? netlink_ack+0xbc0/0xbc0 [ 553.185699] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 553.190970] ? netlink_skb_destructor+0x210/0x210 [ 553.195797] genl_rcv+0x28/0x40 [ 553.199245] netlink_unicast+0x58b/0x740 [ 553.203292] ? netlink_attachskb+0x970/0x970 [ 553.207686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.213207] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 553.218213] ? security_netlink_send+0x88/0xb0 [ 553.222787] netlink_sendmsg+0x9f0/0xfa0 [ 553.226846] ? netlink_unicast+0x740/0x740 [ 553.231072] ? security_socket_sendmsg+0x94/0xc0 [ 553.235809] ? netlink_unicast+0x740/0x740 [ 553.240045] sock_sendmsg+0xd5/0x120 [ 553.243747] ___sys_sendmsg+0x805/0x940 [ 553.247705] ? copy_msghdr_from_user+0x560/0x560 [ 553.252449] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 553.257967] ? proc_fail_nth_write+0x96/0x1f0 [ 553.262444] ? __fget_light+0x2ef/0x430 [ 553.266398] ? fget_raw+0x20/0x20 [ 553.269842] ? find_held_lock+0x36/0x1c0 [ 553.273887] ? kasan_check_write+0x14/0x20 [ 553.278109] ? wait_for_completion+0x870/0x870 [ 553.282679] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 553.288198] ? sockfd_lookup_light+0xc5/0x160 [ 553.292684] __sys_sendmsg+0x115/0x270 [ 553.296556] ? __ia32_sys_shutdown+0x80/0x80 [ 553.300956] ? __sb_end_write+0xac/0xe0 [ 553.304916] ? fput+0x130/0x1a0 [ 553.308176] ? ksys_write+0x1a6/0x250 [ 553.311974] __x64_sys_sendmsg+0x78/0xb0 [ 553.316034] do_syscall_64+0x1b1/0x800 [ 553.319902] ? finish_task_switch+0x1ca/0x840 [ 553.324389] ? syscall_return_slowpath+0x5c0/0x5c0 [ 553.329301] ? syscall_return_slowpath+0x30f/0x5c0 [ 553.334217] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 553.339565] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 553.344394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.349565] RIP: 0033:0x455a09 2018/06/06 15:00:30 executing program 7 (fault-call:3 fault-nth:1): r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:30 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1300}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0xc3ff0000, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:30 executing program 3 (fault-call:1 fault-nth:20): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb53") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 553.352732] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 553.360430] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 553.367690] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 553.374947] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 553.382201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 553.389462] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000013 [ 553.460663] FAULT_INJECTION: forcing a failure. [ 553.460663] name failslab, interval 1, probability 0, space 0, times 0 [ 553.472505] CPU: 0 PID: 13783 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 553.473949] device veth0_to_bridge entered promiscuous mode [ 553.479795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.479802] Call Trace: [ 553.479825] dump_stack+0x1b9/0x294 [ 553.479843] ? dump_stack_print_info.cold.2+0x52/0x52 [ 553.479863] ? __might_sleep+0x95/0x190 2018/06/06 15:00:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 553.510255] should_fail.cold.4+0xa/0x1a [ 553.514335] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 553.519461] ? mutex_trylock+0x2a0/0x2a0 [ 553.523536] ? graph_lock+0x170/0x170 [ 553.527347] ? __mutex_lock+0x7d9/0x17f0 [ 553.531428] ? find_held_lock+0x36/0x1c0 [ 553.535501] ? __lock_is_held+0xb5/0x140 [ 553.539586] ? check_same_owner+0x320/0x320 [ 553.543923] ? rcu_note_context_switch+0x710/0x710 [ 553.548868] __should_failslab+0x124/0x180 [ 553.550680] device veth0_to_bridge left promiscuous mode [ 553.553108] should_failslab+0x9/0x14 [ 553.553129] __kmalloc_track_caller+0x2c4/0x760 [ 553.553145] ? graph_lock+0x170/0x170 [ 553.553159] ? graph_lock+0x170/0x170 [ 553.553177] ? kstrdup_const+0x66/0x80 [ 553.578601] kstrdup+0x39/0x70 [ 553.581806] kstrdup_const+0x66/0x80 [ 553.585530] __kernfs_new_node+0xa8/0x580 [ 553.589697] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 553.594471] ? lock_downgrade+0x8e0/0x8e0 [ 553.598648] ? kasan_check_read+0x11/0x20 [ 553.602805] ? do_raw_spin_unlock+0x9e/0x2e0 2018/06/06 15:00:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 553.607225] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 553.611819] kernfs_new_node+0x80/0xf0 [ 553.615716] kernfs_create_link+0x33/0x180 [ 553.619957] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 553.625242] sysfs_create_link+0x65/0xc0 [ 553.629338] device_add+0x7a0/0x16d0 [ 553.633068] ? device_private_init+0x230/0x230 [ 553.638341] ? kfree+0x1e9/0x260 [ 553.641715] ? kfree_const+0x5e/0x70 [ 553.645440] device_create_groups_vargs+0x1ff/0x270 [ 553.650472] device_create+0xd3/0x100 [ 553.654282] ? device_create_vargs+0x60/0x60 2018/06/06 15:00:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 553.658704] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 553.663814] ? trace_hardirqs_on+0xd/0x10 [ 553.667979] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 553.672924] ? string+0x21d/0x2c0 [ 553.676386] ? widen_string+0x2d0/0x2d0 [ 553.680383] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 553.686543] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 553.692089] ? vsnprintf+0x242/0x1b40 [ 553.695903] ? pointer+0xa10/0xa10 [ 553.699448] ? rcu_note_context_switch+0x710/0x710 [ 553.704386] ? __lock_acquire+0x7f5/0x5140 [ 553.708629] ? kasprintf+0xa2/0xc0 [ 553.712179] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 553.717204] ? kvasprintf+0xe2/0x130 [ 553.720926] ? bust_spinlocks+0xe0/0xe0 [ 553.724918] ? kasprintf+0xa2/0xc0 [ 553.728465] ? kvasprintf_const+0x190/0x190 [ 553.732793] ? graph_lock+0x170/0x170 [ 553.736617] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 553.741824] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 553.747380] hwsim_new_radio_nl+0x7b8/0xa60 [ 553.751718] ? nla_parse+0x358/0x4a0 [ 553.755447] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 2018/06/06 15:00:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f8") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 553.760654] ? __netlink_ns_capable+0x100/0x130 [ 553.765342] genl_family_rcv_msg+0x889/0x1120 [ 553.769849] ? genl_rcv+0x40/0x40 [ 553.773311] ? lock_downgrade+0x8e0/0x8e0 [ 553.777469] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 553.782501] ? kasan_check_read+0x11/0x20 [ 553.786660] ? lock_acquire+0x1dc/0x520 [ 553.790643] ? genl_rcv+0x19/0x40 [ 553.794208] genl_rcv_msg+0xc6/0x170 [ 553.797930] netlink_rcv_skb+0x172/0x440 [ 553.802002] ? genl_family_rcv_msg+0x1120/0x1120 [ 553.806765] ? netlink_ack+0xbc0/0xbc0 [ 553.810665] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 553.815870] ? netlink_skb_destructor+0x210/0x210 [ 553.820729] genl_rcv+0x28/0x40 [ 553.824018] netlink_unicast+0x58b/0x740 [ 553.828087] ? netlink_attachskb+0x970/0x970 [ 553.832679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.838226] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 553.843249] ? security_netlink_send+0x88/0xb0 [ 553.847843] netlink_sendmsg+0x9f0/0xfa0 [ 553.851919] ? netlink_unicast+0x740/0x740 [ 553.856173] ? security_socket_sendmsg+0x94/0xc0 [ 553.861027] ? netlink_unicast+0x740/0x740 [ 553.865274] sock_sendmsg+0xd5/0x120 [ 553.869003] ___sys_sendmsg+0x805/0x940 [ 553.872014] FAULT_INJECTION: forcing a failure. [ 553.872014] name failslab, interval 1, probability 0, space 0, times 0 [ 553.872994] ? copy_msghdr_from_user+0x560/0x560 [ 553.873024] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 553.873040] ? proc_fail_nth_write+0x96/0x1f0 [ 553.873062] ? __fget_light+0x2ef/0x430 [ 553.902981] ? fget_raw+0x20/0x20 [ 553.906428] ? find_held_lock+0x36/0x1c0 [ 553.910487] ? kasan_check_write+0x14/0x20 [ 553.914721] ? wait_for_completion+0x870/0x870 [ 553.919304] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 553.924834] ? sockfd_lookup_light+0xc5/0x160 [ 553.929325] __sys_sendmsg+0x115/0x270 [ 553.933207] ? __ia32_sys_shutdown+0x80/0x80 [ 553.937608] ? __sb_end_write+0xac/0xe0 [ 553.941577] ? fput+0x130/0x1a0 [ 553.944850] ? ksys_write+0x1a6/0x250 [ 553.948656] __x64_sys_sendmsg+0x78/0xb0 [ 553.952713] do_syscall_64+0x1b1/0x800 [ 553.956593] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 553.961431] ? syscall_return_slowpath+0x5c0/0x5c0 [ 553.966358] ? syscall_return_slowpath+0x30f/0x5c0 [ 553.971285] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 553.976646] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 553.981488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.986666] RIP: 0033:0x455a09 [ 553.989862] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 553.997569] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 554.004831] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 554.012094] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 554.019356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 554.026623] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000014 [ 554.033907] CPU: 1 PID: 13792 Comm: syz-executor7 Not tainted 4.17.0-rc7+ #80 [ 554.041189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.050636] Call Trace: [ 554.053240] dump_stack+0x1b9/0x294 [ 554.056881] ? dump_stack_print_info.cold.2+0x52/0x52 [ 554.062078] ? is_bpf_text_address+0xd7/0x170 [ 554.062095] ? kernel_text_address+0x79/0xf0 [ 554.062111] ? __unwind_start+0x166/0x330 [ 554.062129] should_fail.cold.4+0xa/0x1a [ 554.079198] ? __save_stack_trace+0x7e/0xd0 [ 554.083538] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 554.088658] ? save_stack+0xa9/0xd0 [ 554.092297] ? save_stack+0x43/0xd0 [ 554.095935] ? kasan_kmalloc+0xc4/0xe0 [ 554.099827] ? kasan_slab_alloc+0x12/0x20 [ 554.103988] ? find_held_lock+0x36/0x1c0 [ 554.108081] ? check_same_owner+0x320/0x320 [ 554.112417] ? rcu_note_context_switch+0x710/0x710 [ 554.117360] __should_failslab+0x124/0x180 [ 554.121606] should_failslab+0x9/0x14 [ 554.125421] kmem_cache_alloc_node_trace+0x26f/0x770 [ 554.130549] __kmalloc_node_track_caller+0x33/0x70 [ 554.135496] __kmalloc_reserve.isra.39+0x3a/0xe0 [ 554.140265] __alloc_skb+0x14d/0x780 [ 554.143993] ? skb_scrub_packet+0x580/0x580 [ 554.148342] ? rcu_is_watching+0x85/0x140 [ 554.152504] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 554.157709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 554.163255] ? netlink_autobind.isra.34+0x240/0x330 [ 554.168289] netlink_sendmsg+0xb01/0xfa0 [ 554.172367] ? netlink_unicast+0x740/0x740 [ 554.176615] ? security_socket_sendmsg+0x94/0xc0 [ 554.181378] ? netlink_unicast+0x740/0x740 [ 554.185615] sock_sendmsg+0xd5/0x120 [ 554.189317] ___sys_sendmsg+0x805/0x940 [ 554.193281] ? copy_msghdr_from_user+0x560/0x560 [ 554.198040] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 554.203568] ? proc_fail_nth_write+0x96/0x1f0 [ 554.208051] ? __fget_light+0x2ef/0x430 [ 554.212012] ? fget_raw+0x20/0x20 [ 554.215459] ? find_held_lock+0x36/0x1c0 [ 554.219511] ? kasan_check_write+0x14/0x20 [ 554.223734] ? wait_for_completion+0x870/0x870 [ 554.228307] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 554.233828] ? sockfd_lookup_light+0xc5/0x160 [ 554.238327] __sys_sendmsg+0x115/0x270 [ 554.242201] ? __ia32_sys_shutdown+0x80/0x80 [ 554.246594] ? __sb_end_write+0xac/0xe0 [ 554.250553] ? fput+0x130/0x1a0 [ 554.253815] ? ksys_write+0x1a6/0x250 [ 554.257620] __x64_sys_sendmsg+0x78/0xb0 [ 554.261670] do_syscall_64+0x1b1/0x800 [ 554.265545] ? finish_task_switch+0x1ca/0x840 [ 554.270046] ? syscall_return_slowpath+0x5c0/0x5c0 [ 554.274970] ? syscall_return_slowpath+0x30f/0x5c0 [ 554.279895] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 554.285247] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 554.290080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.295267] RIP: 0033:0x455a09 [ 554.298444] RSP: 002b:00007f6bf4d0bc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 554.306143] RAX: ffffffffffffffda RBX: 00007f6bf4d0c6d4 RCX: 0000000000455a09 2018/06/06 15:00:31 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f8") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x9000000}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:31 executing program 3 (fault-call:1 fault-nth:21): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x5, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:31 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) [ 554.313395] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000014 [ 554.320649] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 554.327909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 554.335174] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000001 [ 554.397340] FAULT_INJECTION: forcing a failure. [ 554.397340] name failslab, interval 1, probability 0, space 0, times 0 [ 554.408716] CPU: 0 PID: 13835 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 554.415999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.425381] Call Trace: [ 554.427996] dump_stack+0x1b9/0x294 [ 554.431644] ? dump_stack_print_info.cold.2+0x52/0x52 [ 554.436866] should_fail.cold.4+0xa/0x1a [ 554.440945] ? __kmalloc_track_caller+0x14a/0x760 2018/06/06 15:00:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f8") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 554.445809] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 554.450927] ? device_create_groups_vargs+0x1ff/0x270 [ 554.456133] ? device_create+0xd3/0x100 [ 554.460119] ? mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 554.465236] ? hwsim_new_radio_nl+0x7b8/0xa60 [ 554.469743] ? genl_family_rcv_msg+0x889/0x1120 [ 554.474418] ? genl_rcv_msg+0xc6/0x170 [ 554.478312] ? netlink_rcv_skb+0x172/0x440 [ 554.482579] ? graph_lock+0x170/0x170 [ 554.486391] ? ___sys_sendmsg+0x805/0x940 [ 554.490551] ? __sys_sendmsg+0x115/0x270 2018/06/06 15:00:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 554.494627] ? __x64_sys_sendmsg+0x78/0xb0 [ 554.498875] ? do_syscall_64+0x1b1/0x800 [ 554.502954] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.508333] ? find_held_lock+0x36/0x1c0 [ 554.512410] ? __lock_is_held+0xb5/0x140 [ 554.516494] ? check_same_owner+0x320/0x320 [ 554.520830] ? rcu_note_context_switch+0x710/0x710 [ 554.525775] ? rcu_read_lock_sched_held+0x108/0x120 [ 554.530809] __should_failslab+0x124/0x180 [ 554.535056] should_failslab+0x9/0x14 [ 554.538872] kmem_cache_alloc+0x2af/0x760 [ 554.543028] ? memcpy+0x45/0x50 2018/06/06 15:00:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x0, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 554.546320] ? kstrdup+0x59/0x70 [ 554.549699] __kernfs_new_node+0xe7/0x580 [ 554.553863] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 554.558635] ? lock_downgrade+0x8e0/0x8e0 [ 554.562804] ? kasan_check_read+0x11/0x20 [ 554.566975] ? do_raw_spin_unlock+0x9e/0x2e0 [ 554.571399] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 554.575996] kernfs_new_node+0x80/0xf0 [ 554.579898] kernfs_create_link+0x33/0x180 [ 554.584147] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 554.589439] sysfs_create_link+0x65/0xc0 [ 554.593511] device_add+0x7a0/0x16d0 [ 554.597235] ? device_private_init+0x230/0x230 [ 554.601830] ? kfree+0x1e9/0x260 [ 554.605210] ? kfree_const+0x5e/0x70 [ 554.608946] device_create_groups_vargs+0x1ff/0x270 [ 554.613980] device_create+0xd3/0x100 [ 554.617789] ? device_create_vargs+0x60/0x60 [ 554.622212] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 554.627322] ? trace_hardirqs_on+0xd/0x10 [ 554.631485] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 554.636427] ? string+0x21d/0x2c0 [ 554.639893] ? widen_string+0x2d0/0x2d0 2018/06/06 15:00:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 554.643882] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 554.650036] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 554.655584] ? vsnprintf+0x242/0x1b40 [ 554.659396] ? pointer+0xa10/0xa10 [ 554.662949] ? rcu_note_context_switch+0x710/0x710 [ 554.667890] ? __lock_acquire+0x7f5/0x5140 [ 554.672132] ? kasprintf+0xa2/0xc0 [ 554.675685] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 554.680706] ? kvasprintf+0xe2/0x130 [ 554.684427] ? bust_spinlocks+0xe0/0xe0 [ 554.688420] ? kasprintf+0xa2/0xc0 [ 554.691968] ? kvasprintf_const+0x190/0x190 2018/06/06 15:00:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x0, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 554.696298] ? graph_lock+0x170/0x170 [ 554.700104] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 554.705305] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 554.710857] hwsim_new_radio_nl+0x7b8/0xa60 [ 554.715187] ? nla_parse+0x358/0x4a0 [ 554.718913] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 554.724125] ? __netlink_ns_capable+0x100/0x130 [ 554.728802] genl_family_rcv_msg+0x889/0x1120 [ 554.733313] ? genl_rcv+0x40/0x40 [ 554.736772] ? lock_downgrade+0x8e0/0x8e0 [ 554.740959] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 554.745991] ? kasan_check_read+0x11/0x20 [ 554.750154] ? lock_acquire+0x1dc/0x520 [ 554.754137] ? genl_rcv+0x19/0x40 [ 554.757615] genl_rcv_msg+0xc6/0x170 [ 554.761343] netlink_rcv_skb+0x172/0x440 [ 554.765413] ? genl_family_rcv_msg+0x1120/0x1120 [ 554.770265] ? netlink_ack+0xbc0/0xbc0 [ 554.774343] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 554.779544] ? netlink_skb_destructor+0x210/0x210 [ 554.784400] genl_rcv+0x28/0x40 [ 554.787687] netlink_unicast+0x58b/0x740 [ 554.791754] ? netlink_attachskb+0x970/0x970 [ 554.796172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 554.801719] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 554.806754] ? security_netlink_send+0x88/0xb0 [ 554.811350] netlink_sendmsg+0x9f0/0xfa0 [ 554.815429] ? netlink_unicast+0x740/0x740 [ 554.819685] ? security_socket_sendmsg+0x94/0xc0 [ 554.824451] ? netlink_unicast+0x740/0x740 [ 554.828696] sock_sendmsg+0xd5/0x120 [ 554.832421] ___sys_sendmsg+0x805/0x940 [ 554.836410] ? copy_msghdr_from_user+0x560/0x560 [ 554.841187] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 554.846732] ? proc_fail_nth_write+0x96/0x1f0 [ 554.851240] ? __fget_light+0x2ef/0x430 [ 554.855223] ? fget_raw+0x20/0x20 [ 554.858678] ? find_held_lock+0x36/0x1c0 [ 554.862757] ? kasan_check_write+0x14/0x20 [ 554.867049] ? wait_for_completion+0x870/0x870 [ 554.871653] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 554.877202] ? sockfd_lookup_light+0xc5/0x160 [ 554.881711] __sys_sendmsg+0x115/0x270 [ 554.885611] ? __ia32_sys_shutdown+0x80/0x80 [ 554.887366] device veth0_to_bridge entered promiscuous mode [ 554.890025] ? __sb_end_write+0xac/0xe0 [ 554.890045] ? fput+0x130/0x1a0 [ 554.890060] ? ksys_write+0x1a6/0x250 [ 554.890087] __x64_sys_sendmsg+0x78/0xb0 [ 554.890108] do_syscall_64+0x1b1/0x800 [ 554.912151] device veth0_to_bridge left promiscuous mode [ 554.914768] ? finish_task_switch+0x1ca/0x840 [ 554.914788] ? syscall_return_slowpath+0x5c0/0x5c0 [ 554.914805] ? syscall_return_slowpath+0x30f/0x5c0 [ 554.914826] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 554.914843] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 554.914861] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.949920] RIP: 0033:0x455a09 [ 554.953101] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 554.960794] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 554.968052] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 554.975317] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 554.982581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 554.989855] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000015 2018/06/06 15:00:32 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x19, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x0, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x30000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:32 executing program 3 (fault-call:1 fault-nth:22): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x1f8, &(0x7f0000003bc0)}}], 0x1f9, 0x0) [ 555.120785] FAULT_INJECTION: forcing a failure. [ 555.120785] name failslab, interval 1, probability 0, space 0, times 0 [ 555.132101] CPU: 0 PID: 13891 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 555.139381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.148742] Call Trace: [ 555.151344] dump_stack+0x1b9/0x294 [ 555.154985] ? dump_stack_print_info.cold.2+0x52/0x52 [ 555.160194] ? rcu_note_context_switch+0x710/0x710 [ 555.165145] should_fail.cold.4+0xa/0x1a 2018/06/06 15:00:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xf00]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 555.169219] ? kasan_check_write+0x14/0x20 [ 555.173470] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 555.178593] ? graph_lock+0x170/0x170 [ 555.182408] ? ___ratelimit.cold.2+0x6a/0x6a [ 555.186830] ? __mutex_lock+0x7d9/0x17f0 [ 555.190908] ? kasan_kmalloc+0xc4/0xe0 [ 555.194809] ? find_held_lock+0x36/0x1c0 [ 555.198883] ? __lock_is_held+0xb5/0x140 [ 555.202974] ? check_same_owner+0x320/0x320 [ 555.207316] ? rcu_note_context_switch+0x710/0x710 [ 555.212257] ? lock_downgrade+0x8e0/0x8e0 [ 555.216418] __should_failslab+0x124/0x180 [ 555.220662] should_failslab+0x9/0x14 [ 555.224474] kmem_cache_alloc+0x2af/0x760 [ 555.228635] ? wait_for_completion+0x870/0x870 [ 555.233232] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 555.238260] __kernfs_new_node+0xe7/0x580 [ 555.242423] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 555.247189] ? __lock_is_held+0xb5/0x140 [ 555.251262] ? wait_for_completion+0x870/0x870 [ 555.255873] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 555.261427] ? kernfs_put+0x493/0x750 [ 555.265332] kernfs_new_node+0x80/0xf0 2018/06/06 15:00:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xf0ffffffffffff]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 555.269230] kernfs_create_dir_ns+0x3d/0x140 [ 555.273652] internal_create_group+0x110/0x970 [ 555.278246] sysfs_create_group+0x1f/0x30 [ 555.282401] dpm_sysfs_add+0x26/0x210 [ 555.286211] device_add+0xa11/0x16d0 [ 555.289947] ? device_private_init+0x230/0x230 [ 555.294536] ? kfree+0x1e9/0x260 [ 555.297917] ? kfree_const+0x5e/0x70 [ 555.301643] device_create_groups_vargs+0x1ff/0x270 [ 555.306670] device_create+0xd3/0x100 [ 555.310486] ? device_create_vargs+0x60/0x60 [ 555.315087] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 2018/06/06 15:00:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x3000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 555.320201] ? trace_hardirqs_on+0xd/0x10 [ 555.324370] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 555.329310] ? string+0x21d/0x2c0 [ 555.332772] ? widen_string+0x2d0/0x2d0 [ 555.336759] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 555.342918] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 555.348460] ? vsnprintf+0x242/0x1b40 [ 555.352269] ? pointer+0xa10/0xa10 [ 555.355821] ? rcu_note_context_switch+0x710/0x710 [ 555.360756] ? __lock_acquire+0x7f5/0x5140 [ 555.364997] ? kasprintf+0xa2/0xc0 2018/06/06 15:00:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x7ed]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 555.368555] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 555.373576] ? kvasprintf+0xe2/0x130 [ 555.377297] ? bust_spinlocks+0xe0/0xe0 [ 555.381286] ? kasprintf+0xa2/0xc0 [ 555.384837] ? kvasprintf_const+0x190/0x190 [ 555.389170] ? graph_lock+0x170/0x170 [ 555.392988] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 555.398194] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 555.403749] hwsim_new_radio_nl+0x7b8/0xa60 [ 555.408082] ? nla_parse+0x358/0x4a0 [ 555.411810] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 555.417021] ? __netlink_ns_capable+0x100/0x130 [ 555.421706] genl_family_rcv_msg+0x889/0x1120 [ 555.426218] ? genl_rcv+0x40/0x40 [ 555.429677] ? lock_downgrade+0x8e0/0x8e0 [ 555.434093] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 555.439123] ? kasan_check_read+0x11/0x20 [ 555.443286] ? lock_acquire+0x1dc/0x520 [ 555.447278] ? genl_rcv+0x19/0x40 [ 555.450750] genl_rcv_msg+0xc6/0x170 [ 555.454472] netlink_rcv_skb+0x172/0x440 [ 555.458538] ? genl_family_rcv_msg+0x1120/0x1120 [ 555.463298] ? netlink_ack+0xbc0/0xbc0 [ 555.467188] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 555.472387] ? netlink_skb_destructor+0x210/0x210 [ 555.477242] genl_rcv+0x28/0x40 [ 555.480530] netlink_unicast+0x58b/0x740 [ 555.484606] ? netlink_attachskb+0x970/0x970 [ 555.489027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.494575] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 555.499580] ? security_netlink_send+0x88/0xb0 [ 555.504147] netlink_sendmsg+0x9f0/0xfa0 [ 555.508195] ? netlink_unicast+0x740/0x740 [ 555.512415] ? security_socket_sendmsg+0x94/0xc0 [ 555.517155] ? netlink_unicast+0x740/0x740 [ 555.521384] sock_sendmsg+0xd5/0x120 [ 555.525083] ___sys_sendmsg+0x805/0x940 [ 555.529046] ? copy_msghdr_from_user+0x560/0x560 [ 555.533793] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 555.539316] ? proc_fail_nth_write+0x96/0x1f0 [ 555.543794] ? __fget_light+0x2ef/0x430 [ 555.547754] ? fget_raw+0x20/0x20 [ 555.551191] ? find_held_lock+0x36/0x1c0 [ 555.555237] ? kasan_check_write+0x14/0x20 [ 555.559467] ? wait_for_completion+0x870/0x870 [ 555.564054] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 555.569595] ? sockfd_lookup_light+0xc5/0x160 [ 555.574087] __sys_sendmsg+0x115/0x270 [ 555.577978] ? __ia32_sys_shutdown+0x80/0x80 [ 555.582391] ? __sb_end_write+0xac/0xe0 [ 555.586359] ? fput+0x130/0x1a0 [ 555.589632] ? ksys_write+0x1a6/0x250 [ 555.593440] __x64_sys_sendmsg+0x78/0xb0 [ 555.595844] device veth0_to_bridge entered promiscuous mode [ 555.597506] do_syscall_64+0x1b1/0x800 [ 555.597522] ? finish_task_switch+0x1ca/0x840 [ 555.597542] ? syscall_return_slowpath+0x5c0/0x5c0 [ 555.616531] ? syscall_return_slowpath+0x30f/0x5c0 [ 555.621478] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 555.626853] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 555.631712] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.637681] RIP: 0033:0x455a09 [ 555.637817] device veth0_to_bridge left promiscuous mode [ 555.640885] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 555.640901] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 555.640910] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 555.640918] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 555.640926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 555.640934] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000016 2018/06/06 15:00:32 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x9, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0xc3ff000000000000, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:32 executing program 3 (fault-call:1 fault-nth:23): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xfffffffffffff000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 555.786589] FAULT_INJECTION: forcing a failure. [ 555.786589] name failslab, interval 1, probability 0, space 0, times 0 [ 555.797961] CPU: 0 PID: 13948 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 555.805244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.809609] device veth0_to_bridge entered promiscuous mode [ 555.814598] Call Trace: [ 555.814623] dump_stack+0x1b9/0x294 [ 555.814642] ? dump_stack_print_info.cold.2+0x52/0x52 [ 555.814665] should_fail.cold.4+0xa/0x1a 2018/06/06 15:00:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 555.835794] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 555.840917] ? lock_release+0xa10/0xa10 [ 555.844909] ? check_same_owner+0x320/0x320 [ 555.849239] ? graph_lock+0x170/0x170 [ 555.853053] ? rcu_note_context_switch+0x710/0x710 [ 555.857993] ? find_held_lock+0x36/0x1c0 [ 555.862073] ? find_held_lock+0x36/0x1c0 [ 555.866174] ? __lock_is_held+0xb5/0x140 [ 555.870261] ? check_same_owner+0x320/0x320 [ 555.874598] ? rcu_note_context_switch+0x710/0x710 [ 555.879546] __should_failslab+0x124/0x180 [ 555.883795] should_failslab+0x9/0x14 [ 555.887604] kmem_cache_alloc+0x2af/0x760 [ 555.891773] ? kasan_check_write+0x14/0x20 [ 555.896020] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 555.901053] __kernfs_new_node+0xe7/0x580 [ 555.905216] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 555.909987] ? kasan_check_write+0x14/0x20 [ 555.914230] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 555.919163] ? graph_lock+0x170/0x170 [ 555.922816] device veth0_to_bridge left promiscuous mode [ 555.922973] ? wait_for_completion+0x870/0x870 2018/06/06 15:00:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 555.932986] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 555.938539] kernfs_new_node+0x80/0xf0 [ 555.942446] __kernfs_create_file+0x4d/0x330 [ 555.946874] sysfs_add_file_mode_ns+0x21a/0x560 [ 555.951556] sysfs_add_file+0x4e/0x60 [ 555.955371] sysfs_merge_group+0xfa/0x230 [ 555.959537] dpm_sysfs_add+0x161/0x210 [ 555.963450] device_add+0xa11/0x16d0 [ 555.967182] ? device_private_init+0x230/0x230 [ 555.971776] ? kfree+0x1e9/0x260 [ 555.975158] ? kfree_const+0x5e/0x70 [ 555.978887] device_create_groups_vargs+0x1ff/0x270 [ 555.983914] device_create+0xd3/0x100 2018/06/06 15:00:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x4000000000000, &(0x7f0000003bc0)}}], 0x1f9, 0x0) [ 555.987723] ? device_create_vargs+0x60/0x60 [ 555.992143] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 555.997252] ? trace_hardirqs_on+0xd/0x10 [ 556.001416] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 556.006355] ? string+0x21d/0x2c0 [ 556.009817] ? widen_string+0x2d0/0x2d0 [ 556.013813] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 556.019973] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 556.025520] ? vsnprintf+0x242/0x1b40 [ 556.029336] ? pointer+0xa10/0xa10 [ 556.032887] ? rcu_note_context_switch+0x710/0x710 2018/06/06 15:00:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 556.037825] ? __lock_acquire+0x7f5/0x5140 [ 556.042075] ? kasprintf+0xa2/0xc0 [ 556.045721] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 556.050748] ? kvasprintf+0xe2/0x130 [ 556.054473] ? bust_spinlocks+0xe0/0xe0 [ 556.058464] ? kasprintf+0xa2/0xc0 [ 556.062008] ? kvasprintf_const+0x190/0x190 [ 556.066335] ? graph_lock+0x170/0x170 [ 556.070149] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 556.075357] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 556.080917] hwsim_new_radio_nl+0x7b8/0xa60 [ 556.085336] ? nla_parse+0x358/0x4a0 [ 556.089155] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 556.094365] ? __netlink_ns_capable+0x100/0x130 [ 556.099054] genl_family_rcv_msg+0x889/0x1120 [ 556.103596] ? genl_rcv+0x40/0x40 [ 556.107070] ? lock_downgrade+0x8e0/0x8e0 [ 556.111230] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 556.116268] ? kasan_check_read+0x11/0x20 [ 556.120427] ? lock_acquire+0x1dc/0x520 [ 556.124407] ? genl_rcv+0x19/0x40 [ 556.127884] genl_rcv_msg+0xc6/0x170 [ 556.131610] netlink_rcv_skb+0x172/0x440 2018/06/06 15:00:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 556.135680] ? genl_family_rcv_msg+0x1120/0x1120 [ 556.140447] ? netlink_ack+0xbc0/0xbc0 [ 556.144340] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 556.149546] ? netlink_skb_destructor+0x210/0x210 [ 556.154405] genl_rcv+0x28/0x40 [ 556.157692] netlink_unicast+0x58b/0x740 [ 556.161765] ? netlink_attachskb+0x970/0x970 [ 556.166187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.171739] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 556.176778] ? security_netlink_send+0x88/0xb0 [ 556.181375] netlink_sendmsg+0x9f0/0xfa0 2018/06/06 15:00:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x40000, &(0x7f0000003bc0)}}], 0x1f9, 0x0) [ 556.185451] ? netlink_unicast+0x740/0x740 [ 556.189702] ? security_socket_sendmsg+0x94/0xc0 [ 556.194466] ? netlink_unicast+0x740/0x740 [ 556.198710] sock_sendmsg+0xd5/0x120 [ 556.202433] ___sys_sendmsg+0x805/0x940 [ 556.206414] ? copy_msghdr_from_user+0x560/0x560 [ 556.211186] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 556.216730] ? proc_fail_nth_write+0x96/0x1f0 [ 556.221233] ? __fget_light+0x2ef/0x430 [ 556.225215] ? fget_raw+0x20/0x20 [ 556.228669] ? find_held_lock+0x36/0x1c0 [ 556.232750] ? kasan_check_write+0x14/0x20 [ 556.236995] ? wait_for_completion+0x870/0x870 [ 556.241596] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 556.247138] ? sockfd_lookup_light+0xc5/0x160 [ 556.251644] __sys_sendmsg+0x115/0x270 [ 556.255542] ? __ia32_sys_shutdown+0x80/0x80 [ 556.259961] ? __sb_end_write+0xac/0xe0 [ 556.263948] ? fput+0x130/0x1a0 [ 556.267243] ? ksys_write+0x1a6/0x250 [ 556.271065] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 556.275925] __x64_sys_sendmsg+0x78/0xb0 [ 556.280017] do_syscall_64+0x1b1/0x800 [ 556.283915] ? finish_task_switch+0x1ca/0x840 2018/06/06 15:00:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 556.288425] ? syscall_return_slowpath+0x5c0/0x5c0 [ 556.293714] ? syscall_return_slowpath+0x30f/0x5c0 [ 556.298665] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 556.304049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 556.308912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.314198] RIP: 0033:0x455a09 [ 556.317388] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 556.325103] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 556.332380] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 556.339655] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 556.346932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 556.354207] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000017 2018/06/06 15:00:33 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0xd, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:33 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x4, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00'}) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x3000000000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:33 executing program 3 (fault-call:1 fault-nth:24): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 556.507403] FAULT_INJECTION: forcing a failure. [ 556.507403] name failslab, interval 1, probability 0, space 0, times 0 [ 556.518732] CPU: 0 PID: 14022 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 556.526014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.535376] Call Trace: [ 556.537978] dump_stack+0x1b9/0x294 [ 556.541625] ? dump_stack_print_info.cold.2+0x52/0x52 [ 556.546834] ? __mutex_lock+0x7d9/0x17f0 [ 556.550915] should_fail.cold.4+0xa/0x1a 2018/06/06 15:00:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x300000000000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 556.554989] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 556.560189] ? kasan_kmalloc+0xc4/0xe0 [ 556.564092] ? graph_lock+0x170/0x170 [ 556.567906] ? find_held_lock+0x36/0x1c0 [ 556.571987] ? __lock_is_held+0xb5/0x140 [ 556.576072] ? check_same_owner+0x320/0x320 [ 556.580406] ? kasan_check_write+0x14/0x20 [ 556.584654] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 556.589600] ? rcu_note_context_switch+0x710/0x710 [ 556.594543] __should_failslab+0x124/0x180 [ 556.598790] should_failslab+0x9/0x14 [ 556.602608] kmem_cache_alloc+0x2af/0x760 [ 556.606767] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 556.611713] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 556.616743] __kernfs_new_node+0xe7/0x580 [ 556.620907] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 556.625665] ? mutex_unlock+0xd/0x10 [ 556.629468] ? kernfs_activate+0x20e/0x2a0 [ 556.633718] ? kernfs_walk_and_get_ns+0x320/0x320 [ 556.638575] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 556.644134] ? kernfs_link_sibling+0x1d2/0x3b0 [ 556.648734] kernfs_new_node+0x80/0xf0 [ 556.652632] __kernfs_create_file+0x4d/0x330 [ 556.657047] sysfs_add_file_mode_ns+0x21a/0x560 [ 556.661732] sysfs_add_file+0x4e/0x60 [ 556.665552] sysfs_merge_group+0xfa/0x230 [ 556.669707] dpm_sysfs_add+0x161/0x210 [ 556.673601] device_add+0xa11/0x16d0 [ 556.677330] ? device_private_init+0x230/0x230 [ 556.681931] ? kfree+0x1e9/0x260 [ 556.685305] ? kfree_const+0x5e/0x70 [ 556.689028] device_create_groups_vargs+0x1ff/0x270 [ 556.694057] device_create+0xd3/0x100 [ 556.697867] ? device_create_vargs+0x60/0x60 [ 556.702291] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 556.707400] ? trace_hardirqs_on+0xd/0x10 [ 556.711571] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 556.716523] ? string+0x21d/0x2c0 [ 556.719968] ? widen_string+0x2d0/0x2d0 [ 556.723947] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 556.730108] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 556.735671] ? vsnprintf+0x242/0x1b40 [ 556.739488] ? pointer+0xa10/0xa10 [ 556.743048] ? rcu_note_context_switch+0x710/0x710 [ 556.747988] ? __lock_acquire+0x7f5/0x5140 [ 556.752235] ? kasprintf+0xa2/0xc0 [ 556.755786] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 556.760818] ? kvasprintf+0xe2/0x130 [ 556.764539] ? bust_spinlocks+0xe0/0xe0 [ 556.768528] ? kasprintf+0xa2/0xc0 [ 556.772069] ? kvasprintf_const+0x190/0x190 [ 556.776380] ? graph_lock+0x170/0x170 [ 556.780181] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 556.785357] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 556.790885] hwsim_new_radio_nl+0x7b8/0xa60 [ 556.795189] ? nla_parse+0x358/0x4a0 [ 556.798889] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 556.804073] ? __netlink_ns_capable+0x100/0x130 [ 556.808725] genl_family_rcv_msg+0x889/0x1120 [ 556.813214] ? genl_rcv+0x40/0x40 [ 556.816650] ? lock_downgrade+0x8e0/0x8e0 [ 556.820783] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 556.825793] ? kasan_check_read+0x11/0x20 [ 556.829926] ? lock_acquire+0x1dc/0x520 [ 556.833881] ? genl_rcv+0x19/0x40 [ 556.837323] genl_rcv_msg+0xc6/0x170 [ 556.841038] netlink_rcv_skb+0x172/0x440 [ 556.845084] ? genl_family_rcv_msg+0x1120/0x1120 [ 556.850179] ? netlink_ack+0xbc0/0xbc0 [ 556.854063] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 556.859250] ? netlink_skb_destructor+0x210/0x210 [ 556.864088] genl_rcv+0x28/0x40 [ 556.867349] netlink_unicast+0x58b/0x740 [ 556.871393] ? netlink_attachskb+0x970/0x970 [ 556.875808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.881331] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 556.886351] ? security_netlink_send+0x88/0xb0 [ 556.890933] netlink_sendmsg+0x9f0/0xfa0 [ 556.894982] ? netlink_unicast+0x740/0x740 [ 556.899206] ? security_socket_sendmsg+0x94/0xc0 [ 556.903952] ? netlink_unicast+0x740/0x740 [ 556.908171] sock_sendmsg+0xd5/0x120 [ 556.911871] ___sys_sendmsg+0x805/0x940 [ 556.915841] ? copy_msghdr_from_user+0x560/0x560 [ 556.920607] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 556.926131] ? proc_fail_nth_write+0x96/0x1f0 [ 556.930619] ? __fget_light+0x2ef/0x430 [ 556.934586] ? fget_raw+0x20/0x20 [ 556.938030] ? find_held_lock+0x36/0x1c0 [ 556.942088] ? kasan_check_write+0x14/0x20 [ 556.946310] ? wait_for_completion+0x870/0x870 [ 556.950879] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 556.956398] ? sockfd_lookup_light+0xc5/0x160 [ 556.960876] __sys_sendmsg+0x115/0x270 [ 556.964748] ? __ia32_sys_shutdown+0x80/0x80 [ 556.969150] ? __sb_end_write+0xac/0xe0 [ 556.973109] ? fput+0x130/0x1a0 [ 556.976374] ? ksys_write+0x1a6/0x250 [ 556.980168] __x64_sys_sendmsg+0x78/0xb0 [ 556.984226] do_syscall_64+0x1b1/0x800 [ 556.988098] ? finish_task_switch+0x1ca/0x840 [ 556.992574] ? syscall_return_slowpath+0x5c0/0x5c0 [ 556.997492] ? syscall_return_slowpath+0x30f/0x5c0 [ 557.002424] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 557.007789] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 557.012626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.017799] RIP: 0033:0x455a09 [ 557.020968] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 557.028657] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 557.035920] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 557.043171] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 557.050428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 557.057684] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000018 2018/06/06 15:00:34 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x3, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x2000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0xffc3, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:34 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:34 executing program 3 (fault-call:1 fault-nth:25): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 557.170670] FAULT_INJECTION: forcing a failure. [ 557.170670] name failslab, interval 1, probability 0, space 0, times 0 [ 557.182054] CPU: 1 PID: 14069 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 557.189334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.198692] Call Trace: [ 557.201296] dump_stack+0x1b9/0x294 [ 557.204944] ? dump_stack_print_info.cold.2+0x52/0x52 [ 557.210149] ? __mutex_lock+0x7d9/0x17f0 [ 557.214231] should_fail.cold.4+0xa/0x1a [ 557.218315] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 557.223427] ? kasan_kmalloc+0xc4/0xe0 [ 557.227332] ? graph_lock+0x170/0x170 [ 557.231148] ? find_held_lock+0x36/0x1c0 [ 557.235216] ? __lock_is_held+0xb5/0x140 [ 557.239300] ? check_same_owner+0x320/0x320 [ 557.243634] ? kasan_check_write+0x14/0x20 [ 557.247885] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 557.252828] ? rcu_note_context_switch+0x710/0x710 [ 557.257772] __should_failslab+0x124/0x180 [ 557.262016] should_failslab+0x9/0x14 [ 557.265831] kmem_cache_alloc+0x2af/0x760 [ 557.269993] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 557.274940] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 557.279974] __kernfs_new_node+0xe7/0x580 [ 557.284137] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 557.288906] ? mutex_unlock+0xd/0x10 [ 557.292637] ? kernfs_activate+0x20e/0x2a0 [ 557.296898] ? kernfs_walk_and_get_ns+0x320/0x320 [ 557.301760] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 557.307310] ? kernfs_link_sibling+0x1d2/0x3b0 [ 557.311933] kernfs_new_node+0x80/0xf0 [ 557.315839] __kernfs_create_file+0x4d/0x330 [ 557.320270] sysfs_add_file_mode_ns+0x21a/0x560 [ 557.324957] sysfs_add_file+0x4e/0x60 [ 557.328772] sysfs_merge_group+0xfa/0x230 [ 557.333458] dpm_sysfs_add+0x161/0x210 [ 557.337418] device_add+0xa11/0x16d0 [ 557.341149] ? device_private_init+0x230/0x230 [ 557.345739] ? kfree+0x1e9/0x260 [ 557.349118] ? kfree_const+0x5e/0x70 [ 557.352842] device_create_groups_vargs+0x1ff/0x270 [ 557.357871] device_create+0xd3/0x100 [ 557.361682] ? device_create_vargs+0x60/0x60 [ 557.366110] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 557.371229] ? trace_hardirqs_on+0xd/0x10 [ 557.375391] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 557.380330] ? string+0x21d/0x2c0 [ 557.383788] ? widen_string+0x2d0/0x2d0 [ 557.387775] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 557.393932] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 557.399483] ? vsnprintf+0x242/0x1b40 [ 557.403301] ? pointer+0xa10/0xa10 [ 557.406851] ? rcu_note_context_switch+0x710/0x710 [ 557.411792] ? __lock_acquire+0x7f5/0x5140 [ 557.416042] ? kasprintf+0xa2/0xc0 [ 557.419592] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 557.424609] ? kvasprintf+0xe2/0x130 [ 557.428327] ? bust_spinlocks+0xe0/0xe0 [ 557.432320] ? kasprintf+0xa2/0xc0 [ 557.435870] ? kvasprintf_const+0x190/0x190 [ 557.440210] ? graph_lock+0x170/0x170 [ 557.444028] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 557.449274] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 557.454832] hwsim_new_radio_nl+0x7b8/0xa60 [ 557.459166] ? nla_parse+0x358/0x4a0 [ 557.462891] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 557.468097] ? __netlink_ns_capable+0x100/0x130 [ 557.472781] genl_family_rcv_msg+0x889/0x1120 [ 557.477296] ? genl_rcv+0x40/0x40 [ 557.480765] ? lock_downgrade+0x8e0/0x8e0 [ 557.484926] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 557.489960] ? kasan_check_read+0x11/0x20 [ 557.494120] ? lock_acquire+0x1dc/0x520 [ 557.498100] ? genl_rcv+0x19/0x40 [ 557.501578] genl_rcv_msg+0xc6/0x170 [ 557.505302] netlink_rcv_skb+0x172/0x440 [ 557.509380] ? genl_family_rcv_msg+0x1120/0x1120 [ 557.514143] ? netlink_ack+0xbc0/0xbc0 [ 557.518044] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 557.523255] ? netlink_skb_destructor+0x210/0x210 [ 557.528124] genl_rcv+0x28/0x40 [ 557.531408] netlink_unicast+0x58b/0x740 [ 557.535488] ? netlink_attachskb+0x970/0x970 [ 557.539907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 557.545459] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 557.550583] ? security_netlink_send+0x88/0xb0 [ 557.555175] netlink_sendmsg+0x9f0/0xfa0 [ 557.559259] ? netlink_unicast+0x740/0x740 [ 557.563504] ? security_socket_sendmsg+0x94/0xc0 [ 557.568267] ? netlink_unicast+0x740/0x740 [ 557.572514] sock_sendmsg+0xd5/0x120 [ 557.576242] ___sys_sendmsg+0x805/0x940 [ 557.580231] ? copy_msghdr_from_user+0x560/0x560 [ 557.585011] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 557.590561] ? proc_fail_nth_write+0x96/0x1f0 [ 557.595065] ? __fget_light+0x2ef/0x430 [ 557.599047] ? fget_raw+0x20/0x20 [ 557.602502] ? find_held_lock+0x36/0x1c0 [ 557.606574] ? kasan_check_write+0x14/0x20 [ 557.610825] ? wait_for_completion+0x870/0x870 [ 557.615428] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 2018/06/06 15:00:34 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x4, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0xc, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x12, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x20000050, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x2f, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x8, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0xb, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x7, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0xe, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xffffff7f]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 557.620976] ? sockfd_lookup_light+0xc5/0x160 [ 557.625483] __sys_sendmsg+0x115/0x270 [ 557.629408] ? __ia32_sys_shutdown+0x80/0x80 [ 557.633831] ? __sb_end_write+0xac/0xe0 [ 557.637820] ? fput+0x130/0x1a0 [ 557.641104] ? ksys_write+0x1a6/0x250 [ 557.644918] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 557.649765] __x64_sys_sendmsg+0x78/0xb0 [ 557.653829] do_syscall_64+0x1b1/0x800 [ 557.657728] ? finish_task_switch+0x1ca/0x840 [ 557.662240] ? syscall_return_slowpath+0x5c0/0x5c0 [ 557.667181] ? syscall_return_slowpath+0x30f/0x5c0 2018/06/06 15:00:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0xffffff7f00000000, &(0x7f0000003bc0)}}], 0x1f9, 0x0) [ 557.672126] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 557.677506] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 557.682364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.687553] RIP: 0033:0x455a09 [ 557.690748] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 557.698462] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 557.705738] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 557.713016] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/06/06 15:00:34 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:34 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0xa, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) [ 557.720296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 557.727574] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000019 2018/06/06 15:00:34 executing program 3 (fault-call:1 fault-nth:26): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x11, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:34 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:34 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0xffffff7f, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x34000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 557.892776] FAULT_INJECTION: forcing a failure. [ 557.892776] name failslab, interval 1, probability 0, space 0, times 0 [ 557.904106] CPU: 0 PID: 14146 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 557.911386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.920766] Call Trace: [ 557.923374] dump_stack+0x1b9/0x294 [ 557.927024] ? dump_stack_print_info.cold.2+0x52/0x52 [ 557.932231] ? __mutex_lock+0x7d9/0x17f0 [ 557.936315] should_fail.cold.4+0xa/0x1a [ 557.940393] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 557.945509] ? kasan_kmalloc+0xc4/0xe0 [ 557.949416] ? graph_lock+0x170/0x170 [ 557.953236] ? find_held_lock+0x36/0x1c0 [ 557.957313] ? __lock_is_held+0xb5/0x140 [ 557.961401] ? check_same_owner+0x320/0x320 [ 557.965743] ? kasan_check_write+0x14/0x20 [ 557.969997] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 557.974938] ? rcu_note_context_switch+0x710/0x710 [ 557.979884] __should_failslab+0x124/0x180 [ 557.984129] should_failslab+0x9/0x14 [ 557.987940] kmem_cache_alloc+0x2af/0x760 [ 557.992100] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 557.997045] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 558.002077] __kernfs_new_node+0xe7/0x580 [ 558.006243] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 558.011021] ? mutex_unlock+0xd/0x10 [ 558.014753] ? kernfs_activate+0x20e/0x2a0 [ 558.019003] ? kernfs_walk_and_get_ns+0x320/0x320 [ 558.023855] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 558.029403] ? kernfs_link_sibling+0x1d2/0x3b0 [ 558.034002] kernfs_new_node+0x80/0xf0 [ 558.037905] __kernfs_create_file+0x4d/0x330 2018/06/06 15:00:35 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x2, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:35 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x5, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xf]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 558.042329] sysfs_add_file_mode_ns+0x21a/0x560 [ 558.047011] sysfs_add_file+0x4e/0x60 [ 558.050828] sysfs_merge_group+0xfa/0x230 [ 558.054992] dpm_sysfs_add+0x161/0x210 [ 558.058893] device_add+0xa11/0x16d0 [ 558.062620] ? device_private_init+0x230/0x230 [ 558.067210] ? kfree+0x1e9/0x260 [ 558.070597] ? kfree_const+0x5e/0x70 [ 558.074325] device_create_groups_vargs+0x1ff/0x270 [ 558.079357] device_create+0xd3/0x100 [ 558.083168] ? device_create_vargs+0x60/0x60 [ 558.087588] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 2018/06/06 15:00:35 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 558.092768] ? trace_hardirqs_on+0xd/0x10 [ 558.096929] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 558.101873] ? string+0x21d/0x2c0 [ 558.105334] ? widen_string+0x2d0/0x2d0 [ 558.109322] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 558.115480] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 558.121024] ? vsnprintf+0x242/0x1b40 [ 558.124836] ? pointer+0xa10/0xa10 [ 558.128389] ? rcu_note_context_switch+0x710/0x710 [ 558.133330] ? __lock_acquire+0x7f5/0x5140 [ 558.137576] ? kasprintf+0xa2/0xc0 2018/06/06 15:00:35 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x6, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 558.141127] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 558.146150] ? kvasprintf+0xe2/0x130 [ 558.149874] ? bust_spinlocks+0xe0/0xe0 [ 558.153868] ? kasprintf+0xa2/0xc0 [ 558.157413] ? kvasprintf_const+0x190/0x190 [ 558.161745] ? graph_lock+0x170/0x170 [ 558.165560] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 558.170768] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 558.176324] hwsim_new_radio_nl+0x7b8/0xa60 [ 558.180660] ? nla_parse+0x358/0x4a0 [ 558.184400] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 558.189604] ? __netlink_ns_capable+0x100/0x130 2018/06/06 15:00:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xf00000000000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 558.194288] genl_family_rcv_msg+0x889/0x1120 [ 558.198794] ? genl_rcv+0x40/0x40 [ 558.202259] ? lock_downgrade+0x8e0/0x8e0 [ 558.206418] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 558.211446] ? kasan_check_read+0x11/0x20 [ 558.215603] ? lock_acquire+0x1dc/0x520 [ 558.219596] ? genl_rcv+0x19/0x40 [ 558.223068] genl_rcv_msg+0xc6/0x170 [ 558.226791] netlink_rcv_skb+0x172/0x440 [ 558.230859] ? genl_family_rcv_msg+0x1120/0x1120 [ 558.235624] ? netlink_ack+0xbc0/0xbc0 2018/06/06 15:00:35 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 558.239520] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 558.244732] ? netlink_skb_destructor+0x210/0x210 [ 558.249585] genl_rcv+0x28/0x40 [ 558.252871] netlink_unicast+0x58b/0x740 [ 558.256942] ? netlink_attachskb+0x970/0x970 [ 558.261360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 558.266905] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 558.271930] ? security_netlink_send+0x88/0xb0 [ 558.276523] netlink_sendmsg+0x9f0/0xfa0 [ 558.280601] ? netlink_unicast+0x740/0x740 [ 558.284849] ? security_socket_sendmsg+0x94/0xc0 [ 558.289619] ? netlink_unicast+0x740/0x740 [ 558.293866] sock_sendmsg+0xd5/0x120 [ 558.297592] ___sys_sendmsg+0x805/0x940 [ 558.301580] ? copy_msghdr_from_user+0x560/0x560 [ 558.306359] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 558.311906] ? proc_fail_nth_write+0x96/0x1f0 [ 558.316412] ? __fget_light+0x2ef/0x430 [ 558.320394] ? fget_raw+0x20/0x20 [ 558.323850] ? find_held_lock+0x36/0x1c0 [ 558.327921] ? kasan_check_write+0x14/0x20 [ 558.332169] ? wait_for_completion+0x870/0x870 [ 558.336768] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 558.342312] ? sockfd_lookup_light+0xc5/0x160 [ 558.346821] __sys_sendmsg+0x115/0x270 [ 558.350725] ? __ia32_sys_shutdown+0x80/0x80 [ 558.355144] ? __sb_end_write+0xac/0xe0 [ 558.359133] ? fput+0x130/0x1a0 [ 558.362416] ? ksys_write+0x1a6/0x250 [ 558.366230] __x64_sys_sendmsg+0x78/0xb0 [ 558.370302] do_syscall_64+0x1b1/0x800 [ 558.374198] ? finish_task_switch+0x1ca/0x840 [ 558.378707] ? syscall_return_slowpath+0x5c0/0x5c0 [ 558.383643] ? syscall_return_slowpath+0x30f/0x5c0 [ 558.388584] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 558.393962] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 558.398822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.404014] RIP: 0033:0x455a09 [ 558.407203] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 558.414921] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 558.422195] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 558.429466] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 558.436747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 558.444026] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000001a 2018/06/06 15:00:35 executing program 3 (fault-call:1 fault-nth:27): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xffffff9e]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x500, &(0x7f0000003bc0)}}], 0x1f9, 0x0) 2018/06/06 15:00:35 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:35 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:35 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x30000, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:35 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 558.539368] FAULT_INJECTION: forcing a failure. [ 558.539368] name failslab, interval 1, probability 0, space 0, times 0 [ 558.550695] CPU: 0 PID: 14203 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 558.557982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.567339] Call Trace: [ 558.569945] dump_stack+0x1b9/0x294 [ 558.573593] ? dump_stack_print_info.cold.2+0x52/0x52 [ 558.578804] ? __mutex_lock+0x7d9/0x17f0 [ 558.582889] should_fail.cold.4+0xa/0x1a 2018/06/06 15:00:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xffffff7f00000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:35 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 558.586965] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 558.592083] ? kasan_kmalloc+0xc4/0xe0 [ 558.595986] ? graph_lock+0x170/0x170 [ 558.599802] ? find_held_lock+0x36/0x1c0 [ 558.603880] ? __lock_is_held+0xb5/0x140 [ 558.607960] ? check_same_owner+0x320/0x320 [ 558.612293] ? kasan_check_write+0x14/0x20 [ 558.616543] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 558.621489] ? rcu_note_context_switch+0x710/0x710 [ 558.626437] __should_failslab+0x124/0x180 [ 558.630690] should_failslab+0x9/0x14 [ 558.634501] kmem_cache_alloc+0x2af/0x760 2018/06/06 15:00:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 558.638660] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 558.643609] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 558.648637] __kernfs_new_node+0xe7/0x580 [ 558.652803] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 558.657573] ? mutex_unlock+0xd/0x10 [ 558.661300] ? kernfs_activate+0x20e/0x2a0 [ 558.665546] ? kernfs_walk_and_get_ns+0x320/0x320 [ 558.670414] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 558.675967] ? kernfs_link_sibling+0x1d2/0x3b0 [ 558.680580] kernfs_new_node+0x80/0xf0 [ 558.684489] __kernfs_create_file+0x4d/0x330 [ 558.688912] sysfs_add_file_mode_ns+0x21a/0x560 [ 558.693599] sysfs_add_file+0x4e/0x60 [ 558.697413] sysfs_merge_group+0xfa/0x230 [ 558.701575] dpm_sysfs_add+0x161/0x210 [ 558.705476] device_add+0xa11/0x16d0 [ 558.709208] ? device_private_init+0x230/0x230 [ 558.713803] ? kfree+0x1e9/0x260 [ 558.717182] ? kfree_const+0x5e/0x70 [ 558.720917] device_create_groups_vargs+0x1ff/0x270 [ 558.725946] device_create+0xd3/0x100 [ 558.729760] ? device_create_vargs+0x60/0x60 [ 558.734181] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 2018/06/06 15:00:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:35 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) 2018/06/06 15:00:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x100000000000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 558.739290] ? trace_hardirqs_on+0xd/0x10 [ 558.743451] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 558.748389] ? string+0x21d/0x2c0 [ 558.751850] ? widen_string+0x2d0/0x2d0 [ 558.755838] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 558.762001] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 558.767545] ? vsnprintf+0x242/0x1b40 [ 558.771369] ? pointer+0xa10/0xa10 [ 558.774915] ? rcu_note_context_switch+0x710/0x710 [ 558.779854] ? __lock_acquire+0x7f5/0x5140 [ 558.784095] ? kasprintf+0xa2/0xc0 [ 558.787645] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 558.792683] ? kvasprintf+0xe2/0x130 [ 558.796405] ? bust_spinlocks+0xe0/0xe0 [ 558.800405] ? kasprintf+0xa2/0xc0 [ 558.803953] ? kvasprintf_const+0x190/0x190 [ 558.808281] ? graph_lock+0x170/0x170 [ 558.812092] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 558.817288] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 558.822834] hwsim_new_radio_nl+0x7b8/0xa60 [ 558.827162] ? nla_parse+0x358/0x4a0 [ 558.830889] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 558.836104] ? __netlink_ns_capable+0x100/0x130 2018/06/06 15:00:35 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b01000000002e}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 558.840784] genl_family_rcv_msg+0x889/0x1120 [ 558.845290] ? genl_rcv+0x40/0x40 [ 558.848754] ? lock_downgrade+0x8e0/0x8e0 [ 558.852910] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 558.857944] ? kasan_check_read+0x11/0x20 [ 558.862104] ? lock_acquire+0x1dc/0x520 [ 558.866100] ? genl_rcv+0x19/0x40 [ 558.869575] genl_rcv_msg+0xc6/0x170 [ 558.873304] netlink_rcv_skb+0x172/0x440 [ 558.877373] ? genl_family_rcv_msg+0x1120/0x1120 [ 558.882138] ? netlink_ack+0xbc0/0xbc0 [ 558.886033] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 558.891234] ? netlink_skb_destructor+0x210/0x210 [ 558.896089] genl_rcv+0x28/0x40 [ 558.899377] netlink_unicast+0x58b/0x740 [ 558.903452] ? netlink_attachskb+0x970/0x970 [ 558.907872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 558.913421] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 558.918455] ? security_netlink_send+0x88/0xb0 [ 558.923046] netlink_sendmsg+0x9f0/0xfa0 [ 558.927118] ? netlink_unicast+0x740/0x740 [ 558.931362] ? security_socket_sendmsg+0x94/0xc0 [ 558.936124] ? netlink_unicast+0x740/0x740 [ 558.940387] sock_sendmsg+0xd5/0x120 [ 558.944112] ___sys_sendmsg+0x805/0x940 [ 558.948102] ? copy_msghdr_from_user+0x560/0x560 [ 558.952875] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 558.958420] ? proc_fail_nth_write+0x96/0x1f0 [ 558.962925] ? __fget_light+0x2ef/0x430 [ 558.966908] ? fget_raw+0x20/0x20 [ 558.970365] ? find_held_lock+0x36/0x1c0 [ 558.974441] ? kasan_check_write+0x14/0x20 [ 558.978698] ? wait_for_completion+0x870/0x870 [ 558.983296] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 558.988844] ? sockfd_lookup_light+0xc5/0x160 [ 558.993355] __sys_sendmsg+0x115/0x270 [ 558.997255] ? __ia32_sys_shutdown+0x80/0x80 [ 559.001679] ? __sb_end_write+0xac/0xe0 [ 559.005668] ? fput+0x130/0x1a0 [ 559.008966] ? ksys_write+0x1a6/0x250 [ 559.012782] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 559.017639] __x64_sys_sendmsg+0x78/0xb0 [ 559.021721] do_syscall_64+0x1b1/0x800 [ 559.025620] ? finish_task_switch+0x1ca/0x840 [ 559.030128] ? syscall_return_slowpath+0x5c0/0x5c0 [ 559.035065] ? syscall_return_slowpath+0x30f/0x5c0 [ 559.040005] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 559.045383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 559.050248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.055445] RIP: 0033:0x455a09 [ 559.058632] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 559.066347] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 559.073614] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 559.080889] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 559.088161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 559.095438] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000001b 2018/06/06 15:00:36 executing program 3 (fault-call:1 fault-nth:28): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x0) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:36 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000020c6b}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:36 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xf0ffffff00000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:36 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) 2018/06/06 15:00:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:36 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x5}}], 0x1f9, 0x0) [ 559.183681] FAULT_INJECTION: forcing a failure. [ 559.183681] name failslab, interval 1, probability 0, space 0, times 0 [ 559.195063] CPU: 0 PID: 14262 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 559.202346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.211709] Call Trace: [ 559.214308] dump_stack+0x1b9/0x294 [ 559.217950] ? dump_stack_print_info.cold.2+0x52/0x52 [ 559.223157] ? mutex_trylock+0x2a0/0x2a0 [ 559.227232] should_fail.cold.4+0xa/0x1a 2018/06/06 15:00:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x400300]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:36 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) [ 559.231312] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 559.236433] ? graph_lock+0x170/0x170 [ 559.240247] ? lock_downgrade+0x8e0/0x8e0 [ 559.244408] ? kasan_check_write+0x14/0x20 [ 559.248666] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 559.253610] ? find_held_lock+0x36/0x1c0 [ 559.257692] ? __lock_is_held+0xb5/0x140 [ 559.261779] ? check_same_owner+0x320/0x320 [ 559.266115] ? rcu_note_context_switch+0x710/0x710 [ 559.271058] __should_failslab+0x124/0x180 [ 559.275305] should_failslab+0x9/0x14 [ 559.279118] kmem_cache_alloc_trace+0x2cb/0x780 2018/06/06 15:00:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x0) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 559.283802] ? device_create_file+0x1e0/0x1e0 [ 559.288306] kobject_uevent_env+0x20f/0x1110 [ 559.292727] ? device_pm_add+0x221/0x340 [ 559.296809] kobject_uevent+0x1f/0x30 [ 559.300621] device_add+0xb01/0x16d0 [ 559.304357] ? device_private_init+0x230/0x230 [ 559.308948] ? kfree+0x1e9/0x260 [ 559.312331] ? kfree_const+0x5e/0x70 [ 559.316061] device_create_groups_vargs+0x1ff/0x270 [ 559.321093] device_create+0xd3/0x100 [ 559.324910] ? device_create_vargs+0x60/0x60 [ 559.329340] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 559.334456] ? trace_hardirqs_on+0xd/0x10 [ 559.338621] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 559.343569] ? string+0x21d/0x2c0 [ 559.347033] ? widen_string+0x2d0/0x2d0 [ 559.351061] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 559.357212] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 559.362757] ? vsnprintf+0x242/0x1b40 [ 559.366573] ? pointer+0xa10/0xa10 [ 559.370125] ? rcu_note_context_switch+0x710/0x710 [ 559.375063] ? __lock_acquire+0x7f5/0x5140 [ 559.379314] ? kasprintf+0xa2/0xc0 2018/06/06 15:00:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x0) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 559.382869] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 559.387889] ? kvasprintf+0xe2/0x130 [ 559.391610] ? bust_spinlocks+0xe0/0xe0 [ 559.395604] ? kasprintf+0xa2/0xc0 [ 559.399151] ? kvasprintf_const+0x190/0x190 [ 559.403476] ? graph_lock+0x170/0x170 [ 559.407294] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 559.412492] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 559.418037] hwsim_new_radio_nl+0x7b8/0xa60 [ 559.422362] ? nla_parse+0x358/0x4a0 [ 559.426083] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 2018/06/06 15:00:36 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:36 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000002f00}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xed07]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 559.431284] ? __netlink_ns_capable+0x100/0x130 [ 559.435967] genl_family_rcv_msg+0x889/0x1120 [ 559.440475] ? genl_rcv+0x40/0x40 [ 559.443936] ? lock_downgrade+0x8e0/0x8e0 [ 559.448092] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 559.453124] ? kasan_check_read+0x11/0x20 [ 559.457282] ? lock_acquire+0x1dc/0x520 [ 559.461259] ? genl_rcv+0x19/0x40 [ 559.464729] genl_rcv_msg+0xc6/0x170 [ 559.468451] netlink_rcv_skb+0x172/0x440 [ 559.472517] ? genl_family_rcv_msg+0x1120/0x1120 [ 559.477278] ? netlink_ack+0xbc0/0xbc0 [ 559.481173] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 559.486374] ? netlink_skb_destructor+0x210/0x210 [ 559.491229] genl_rcv+0x28/0x40 [ 559.494518] netlink_unicast+0x58b/0x740 [ 559.498589] ? netlink_attachskb+0x970/0x970 [ 559.503011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.508557] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 559.513581] ? security_netlink_send+0x88/0xb0 [ 559.518169] netlink_sendmsg+0x9f0/0xfa0 [ 559.522248] ? netlink_unicast+0x740/0x740 [ 559.526492] ? security_socket_sendmsg+0x94/0xc0 [ 559.531254] ? netlink_unicast+0x740/0x740 2018/06/06 15:00:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xed07000000000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 559.535499] sock_sendmsg+0xd5/0x120 [ 559.539220] ___sys_sendmsg+0x805/0x940 [ 559.543204] ? copy_msghdr_from_user+0x560/0x560 [ 559.547974] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 559.553519] ? proc_fail_nth_write+0x96/0x1f0 [ 559.558025] ? __fget_light+0x2ef/0x430 [ 559.562008] ? fget_raw+0x20/0x20 [ 559.565473] ? find_held_lock+0x36/0x1c0 [ 559.569537] ? kasan_check_write+0x14/0x20 [ 559.573780] ? wait_for_completion+0x870/0x870 [ 559.578382] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 559.583923] ? sockfd_lookup_light+0xc5/0x160 [ 559.588423] __sys_sendmsg+0x115/0x270 [ 559.592316] ? __ia32_sys_shutdown+0x80/0x80 [ 559.596733] ? __sb_end_write+0xac/0xe0 [ 559.600716] ? fput+0x130/0x1a0 [ 559.603997] ? ksys_write+0x1a6/0x250 [ 559.607812] __x64_sys_sendmsg+0x78/0xb0 [ 559.611879] do_syscall_64+0x1b1/0x800 [ 559.615771] ? finish_task_switch+0x1ca/0x840 [ 559.620274] ? syscall_return_slowpath+0x5c0/0x5c0 [ 559.625205] ? syscall_return_slowpath+0x30f/0x5c0 [ 559.630144] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 559.635519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 559.641050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.646245] RIP: 0033:0x455a09 [ 559.649437] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 559.657149] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 559.664424] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 559.671698] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 559.678998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 559.686276] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000001c 2018/06/06 15:00:36 executing program 3 (fault-call:1 fault-nth:29): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:36 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x9effffff]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:36 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x100000000000000}}], 0x1f9, 0x0) 2018/06/06 15:00:36 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:36 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010023000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 559.784904] FAULT_INJECTION: forcing a failure. [ 559.784904] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 559.796760] CPU: 1 PID: 14326 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 559.804042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.813399] Call Trace: [ 559.815998] dump_stack+0x1b9/0x294 [ 559.819641] ? dump_stack_print_info.cold.2+0x52/0x52 [ 559.824851] ? kasan_check_write+0x14/0x20 [ 559.829108] should_fail.cold.4+0xa/0x1a [ 559.833185] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 559.838309] ? debug_check_no_locks_freed+0x310/0x310 [ 559.843508] ? find_held_lock+0x36/0x1c0 [ 559.847581] ? rcu_note_context_switch+0x710/0x710 [ 559.852525] ? __might_sleep+0x95/0x190 [ 559.856513] ? kasan_check_write+0x14/0x20 [ 559.860756] ? __mutex_lock+0x7d9/0x17f0 [ 559.864824] ? find_held_lock+0x36/0x1c0 [ 559.868907] ? mutex_trylock+0x2a0/0x2a0 [ 559.872978] ? lock_downgrade+0x8e0/0x8e0 [ 559.877143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.882691] ? should_fail+0x21b/0xbcd [ 559.886597] __alloc_pages_nodemask+0x34e/0xd70 [ 559.891282] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 559.896303] ? lock_downgrade+0x8e0/0x8e0 [ 559.900466] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 559.905406] ? find_held_lock+0x36/0x1c0 [ 559.909477] ? __lock_is_held+0xb5/0x140 [ 559.913553] ? check_same_owner+0x320/0x320 [ 559.917891] cache_grow_begin+0x6e/0x6c0 [ 559.921968] kmem_cache_alloc_trace+0x6a5/0x780 [ 559.926656] ? device_create_file+0x1e0/0x1e0 [ 559.931164] kobject_uevent_env+0x20f/0x1110 [ 559.935678] ? device_pm_add+0x221/0x340 [ 559.939758] kobject_uevent+0x1f/0x30 [ 559.943568] device_add+0xb01/0x16d0 [ 559.947297] ? device_private_init+0x230/0x230 [ 559.951886] ? kfree+0x1e9/0x260 [ 559.955261] ? kfree_const+0x5e/0x70 [ 559.958986] device_create_groups_vargs+0x1ff/0x270 [ 559.964011] device_create+0xd3/0x100 [ 559.967818] ? device_create_vargs+0x60/0x60 [ 559.972248] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 559.977360] ? trace_hardirqs_on+0xd/0x10 [ 559.981525] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 559.986460] ? string+0x21d/0x2c0 [ 559.989923] ? widen_string+0x2d0/0x2d0 [ 559.993915] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 560.000070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 560.005617] ? vsnprintf+0x242/0x1b40 [ 560.009423] ? pointer+0xa10/0xa10 [ 560.012969] ? rcu_note_context_switch+0x710/0x710 [ 560.017904] ? __lock_acquire+0x7f5/0x5140 [ 560.022145] ? kasprintf+0xa2/0xc0 [ 560.025697] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 560.030722] ? kvasprintf+0xe2/0x130 [ 560.034445] ? bust_spinlocks+0xe0/0xe0 [ 560.038434] ? kasprintf+0xa2/0xc0 [ 560.041977] ? kvasprintf_const+0x190/0x190 [ 560.046300] ? graph_lock+0x170/0x170 [ 560.050118] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 560.055339] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 560.060891] hwsim_new_radio_nl+0x7b8/0xa60 [ 560.065219] ? nla_parse+0x358/0x4a0 [ 560.068943] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 560.074146] ? __netlink_ns_capable+0x100/0x130 [ 560.078828] genl_family_rcv_msg+0x889/0x1120 [ 560.083610] ? genl_rcv+0x40/0x40 [ 560.087072] ? lock_downgrade+0x8e0/0x8e0 [ 560.091228] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 560.096258] ? kasan_check_read+0x11/0x20 [ 560.100416] ? lock_acquire+0x1dc/0x520 [ 560.104396] ? genl_rcv+0x19/0x40 [ 560.107875] genl_rcv_msg+0xc6/0x170 [ 560.111605] netlink_rcv_skb+0x172/0x440 [ 560.115673] ? genl_family_rcv_msg+0x1120/0x1120 [ 560.120451] ? netlink_ack+0xbc0/0xbc0 [ 560.124348] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 560.129547] ? netlink_skb_destructor+0x210/0x210 [ 560.134396] genl_rcv+0x28/0x40 [ 560.137680] netlink_unicast+0x58b/0x740 [ 560.141865] ? netlink_attachskb+0x970/0x970 [ 560.146281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.151827] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 560.156850] ? security_netlink_send+0x88/0xb0 [ 560.161441] netlink_sendmsg+0x9f0/0xfa0 [ 560.165517] ? netlink_unicast+0x740/0x740 [ 560.169762] ? security_socket_sendmsg+0x94/0xc0 [ 560.174619] ? netlink_unicast+0x740/0x740 [ 560.178865] sock_sendmsg+0xd5/0x120 [ 560.182594] ___sys_sendmsg+0x805/0x940 [ 560.186587] ? copy_msghdr_from_user+0x560/0x560 [ 560.191363] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 560.196909] ? proc_fail_nth_write+0x96/0x1f0 [ 560.201417] ? __fget_light+0x2ef/0x430 [ 560.205400] ? fget_raw+0x20/0x20 [ 560.208861] ? find_held_lock+0x36/0x1c0 [ 560.212943] ? kasan_check_write+0x14/0x20 [ 560.217193] ? wait_for_completion+0x870/0x870 [ 560.221794] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 560.227336] ? sockfd_lookup_light+0xc5/0x160 [ 560.231844] __sys_sendmsg+0x115/0x270 [ 560.235741] ? __ia32_sys_shutdown+0x80/0x80 [ 560.240158] ? __sb_end_write+0xac/0xe0 [ 560.244142] ? fput+0x130/0x1a0 [ 560.247429] ? ksys_write+0x1a6/0x250 [ 560.251248] __x64_sys_sendmsg+0x78/0xb0 [ 560.255316] do_syscall_64+0x1b1/0x800 [ 560.259209] ? finish_task_switch+0x1ca/0x840 [ 560.263717] ? syscall_return_slowpath+0x5c0/0x5c0 [ 560.268742] ? syscall_return_slowpath+0x30f/0x5c0 [ 560.273684] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 560.279060] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/06/06 15:00:36 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0xf801000000000000}}], 0x1f9, 0x0) 2018/06/06 15:00:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x3]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:36 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000003200}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:37 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:37 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000020c69}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:37 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0x4, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:37 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b01000000004f}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:37 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xb, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 560.283920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.289108] RIP: 0033:0x455a09 [ 560.292297] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 560.300013] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 560.307287] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 560.314562] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 560.321838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 560.329122] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000001d 2018/06/06 15:00:37 executing program 3 (fault-call:1 fault-nth:30): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x5000000}}], 0x1f9, 0x0) 2018/06/06 15:00:37 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010021000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:37 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0x9, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x40030000000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 560.415619] FAULT_INJECTION: forcing a failure. [ 560.415619] name failslab, interval 1, probability 0, space 0, times 0 [ 560.427373] CPU: 1 PID: 14381 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 560.434661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.444019] Call Trace: [ 560.446626] dump_stack+0x1b9/0x294 [ 560.450274] ? dump_stack_print_info.cold.2+0x52/0x52 [ 560.455483] ? __lock_acquire+0x7f5/0x5140 [ 560.459742] should_fail.cold.4+0xa/0x1a 2018/06/06 15:00:37 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000600}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:37 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010019000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 560.463826] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 560.468941] ? rcu_note_context_switch+0x710/0x710 [ 560.474547] ? graph_lock+0x170/0x170 [ 560.478352] ? __might_sleep+0x95/0x190 [ 560.482344] ? find_held_lock+0x36/0x1c0 [ 560.486428] ? __lock_is_held+0xb5/0x140 [ 560.490514] ? check_same_owner+0x320/0x320 [ 560.494845] ? graph_lock+0x170/0x170 [ 560.498659] ? device_create+0xd3/0x100 [ 560.502644] ? rcu_note_context_switch+0x710/0x710 [ 560.507587] __should_failslab+0x124/0x180 [ 560.511858] should_failslab+0x9/0x14 2018/06/06 15:00:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x4}}], 0x1f9, 0x0) [ 560.515673] kmem_cache_alloc_node+0x272/0x780 [ 560.520262] ? find_held_lock+0x36/0x1c0 [ 560.524336] __alloc_skb+0x111/0x780 [ 560.528069] ? skb_scrub_packet+0x580/0x580 [ 560.532400] ? kasan_check_read+0x11/0x20 [ 560.536553] ? rcu_is_watching+0x85/0x140 [ 560.540709] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 560.545913] ? netlink_has_listeners+0x2ff/0x4c0 [ 560.550681] ? netlink_tap_init_net+0x3c0/0x3c0 [ 560.555362] alloc_uevent_skb+0x89/0x220 [ 560.559436] kobject_uevent_env+0x866/0x1110 2018/06/06 15:00:37 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000001a00}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:37 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b0100fffff000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 560.563863] ? device_pm_add+0x221/0x340 [ 560.567944] kobject_uevent+0x1f/0x30 [ 560.571749] device_add+0xb01/0x16d0 [ 560.575477] ? device_private_init+0x230/0x230 [ 560.580079] ? kfree+0x1e9/0x260 [ 560.583459] ? kfree_const+0x5e/0x70 [ 560.587196] device_create_groups_vargs+0x1ff/0x270 [ 560.592229] device_create+0xd3/0x100 [ 560.596043] ? device_create_vargs+0x60/0x60 [ 560.600472] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 560.605585] ? trace_hardirqs_on+0xd/0x10 [ 560.609835] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 560.614771] ? string+0x21d/0x2c0 [ 560.618230] ? widen_string+0x2d0/0x2d0 [ 560.622222] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 560.628392] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 560.633939] ? vsnprintf+0x242/0x1b40 [ 560.637763] ? pointer+0xa10/0xa10 [ 560.641314] ? rcu_note_context_switch+0x710/0x710 [ 560.646254] ? __lock_acquire+0x7f5/0x5140 [ 560.650502] ? kasprintf+0xa2/0xc0 [ 560.654058] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 560.659081] ? kvasprintf+0xe2/0x130 [ 560.662796] ? bust_spinlocks+0xe0/0xe0 2018/06/06 15:00:37 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000008}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0xc3ff}}], 0x1f9, 0x0) 2018/06/06 15:00:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x200000000000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 560.666784] ? kasprintf+0xa2/0xc0 [ 560.670328] ? kvasprintf_const+0x190/0x190 [ 560.674654] ? graph_lock+0x170/0x170 [ 560.678459] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 560.683657] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 560.689207] hwsim_new_radio_nl+0x7b8/0xa60 [ 560.693533] ? nla_parse+0x358/0x4a0 [ 560.697262] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 560.702468] ? __netlink_ns_capable+0x100/0x130 [ 560.707155] genl_family_rcv_msg+0x889/0x1120 [ 560.711662] ? genl_rcv+0x40/0x40 [ 560.715119] ? lock_downgrade+0x8e0/0x8e0 [ 560.719275] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 560.724311] ? kasan_check_read+0x11/0x20 [ 560.728475] ? lock_acquire+0x1dc/0x520 [ 560.732455] ? genl_rcv+0x19/0x40 [ 560.735928] genl_rcv_msg+0xc6/0x170 [ 560.739648] netlink_rcv_skb+0x172/0x440 [ 560.743714] ? genl_family_rcv_msg+0x1120/0x1120 [ 560.748474] ? netlink_ack+0xbc0/0xbc0 [ 560.752371] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 560.757576] ? netlink_skb_destructor+0x210/0x210 [ 560.762431] genl_rcv+0x28/0x40 [ 560.765722] netlink_unicast+0x58b/0x740 [ 560.769798] ? netlink_attachskb+0x970/0x970 [ 560.774219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.779766] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 560.784789] ? security_netlink_send+0x88/0xb0 [ 560.789379] netlink_sendmsg+0x9f0/0xfa0 [ 560.793454] ? netlink_unicast+0x740/0x740 [ 560.797698] ? security_socket_sendmsg+0x94/0xc0 [ 560.802462] ? netlink_unicast+0x740/0x740 [ 560.806708] sock_sendmsg+0xd5/0x120 [ 560.810430] ___sys_sendmsg+0x805/0x940 [ 560.814417] ? copy_msghdr_from_user+0x560/0x560 [ 560.819188] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 560.824727] ? proc_fail_nth_write+0x96/0x1f0 [ 560.829223] ? __fget_light+0x2ef/0x430 [ 560.833201] ? fget_raw+0x20/0x20 [ 560.836655] ? find_held_lock+0x36/0x1c0 [ 560.840724] ? kasan_check_write+0x14/0x20 [ 560.844957] ? wait_for_completion+0x870/0x870 [ 560.849531] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 560.855060] ? sockfd_lookup_light+0xc5/0x160 [ 560.859544] __sys_sendmsg+0x115/0x270 [ 560.863425] ? __ia32_sys_shutdown+0x80/0x80 [ 560.867840] ? __sb_end_write+0xac/0xe0 [ 560.871821] ? fput+0x130/0x1a0 [ 560.875103] ? ksys_write+0x1a6/0x250 [ 560.878927] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 560.883777] __x64_sys_sendmsg+0x78/0xb0 [ 560.887849] do_syscall_64+0x1b1/0x800 [ 560.891736] ? finish_task_switch+0x1ca/0x840 [ 560.896217] ? syscall_return_slowpath+0x5c0/0x5c0 [ 560.901135] ? syscall_return_slowpath+0x30f/0x5c0 [ 560.906058] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 560.911407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 560.916249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.921425] RIP: 0033:0x455a09 [ 560.924596] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 560.932303] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 560.939557] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 560.946808] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 560.954058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 560.961310] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000001e 2018/06/06 15:00:38 executing program 3 (fault-call:1 fault-nth:31): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xfffff000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:38 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0x2, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:38 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:38 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000025}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0xffc3}}], 0x1f9, 0x0) 2018/06/06 15:00:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) [ 561.089532] FAULT_INJECTION: forcing a failure. [ 561.089532] name failslab, interval 1, probability 0, space 0, times 0 [ 561.101086] CPU: 1 PID: 14446 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 561.108373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.117735] Call Trace: [ 561.120344] dump_stack+0x1b9/0x294 [ 561.123987] ? dump_stack_print_info.cold.2+0x52/0x52 [ 561.129217] ? is_bpf_text_address+0xd7/0x170 [ 561.133759] ? kernel_text_address+0x79/0xf0 2018/06/06 15:00:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300), 0x0, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 561.138182] ? __unwind_start+0x166/0x330 [ 561.142354] should_fail.cold.4+0xa/0x1a [ 561.146429] ? __save_stack_trace+0x7e/0xd0 [ 561.150774] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 561.155892] ? graph_lock+0x170/0x170 [ 561.159699] ? save_stack+0x43/0xd0 [ 561.163335] ? kasan_kmalloc+0xc4/0xe0 [ 561.167230] ? kasan_slab_alloc+0x12/0x20 [ 561.171392] ? find_held_lock+0x36/0x1c0 [ 561.175470] ? __lock_is_held+0xb5/0x140 [ 561.179558] ? check_same_owner+0x320/0x320 [ 561.183891] ? rcu_note_context_switch+0x710/0x710 2018/06/06 15:00:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300), 0x0, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:38 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0x3, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 561.188866] __should_failslab+0x124/0x180 [ 561.193113] should_failslab+0x9/0x14 [ 561.196929] kmem_cache_alloc_node_trace+0x26f/0x770 [ 561.202060] __kmalloc_node_track_caller+0x33/0x70 [ 561.207005] __kmalloc_reserve.isra.39+0x3a/0xe0 [ 561.211784] __alloc_skb+0x14d/0x780 [ 561.215512] ? skb_scrub_packet+0x580/0x580 [ 561.219848] ? kasan_check_read+0x11/0x20 [ 561.224013] ? rcu_is_watching+0x85/0x140 [ 561.228175] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 561.233379] ? netlink_has_listeners+0x2ff/0x4c0 2018/06/06 15:00:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300), 0x0, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 561.238150] ? netlink_tap_init_net+0x3c0/0x3c0 [ 561.242841] alloc_uevent_skb+0x89/0x220 [ 561.246923] kobject_uevent_env+0x866/0x1110 [ 561.251341] ? device_pm_add+0x221/0x340 [ 561.255421] kobject_uevent+0x1f/0x30 [ 561.259234] device_add+0xb01/0x16d0 [ 561.262960] ? device_private_init+0x230/0x230 [ 561.267548] ? kfree+0x1e9/0x260 [ 561.270925] ? kfree_const+0x5e/0x70 [ 561.274650] device_create_groups_vargs+0x1ff/0x270 [ 561.279679] device_create+0xd3/0x100 [ 561.283484] ? device_create_vargs+0x60/0x60 2018/06/06 15:00:38 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0x7, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 561.287902] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 561.293035] ? trace_hardirqs_on+0xd/0x10 [ 561.297195] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 561.302128] ? string+0x21d/0x2c0 [ 561.305595] ? widen_string+0x2d0/0x2d0 [ 561.309581] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 561.315737] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 561.321284] ? vsnprintf+0x242/0x1b40 [ 561.325098] ? pointer+0xa10/0xa10 [ 561.328649] ? rcu_note_context_switch+0x710/0x710 [ 561.333583] ? __lock_acquire+0x7f5/0x5140 2018/06/06 15:00:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x4000000000000}}], 0x1f9, 0x0) 2018/06/06 15:00:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 561.337824] ? kasprintf+0xa2/0xc0 [ 561.341370] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 561.346392] ? kvasprintf+0xe2/0x130 [ 561.350109] ? bust_spinlocks+0xe0/0xe0 [ 561.354101] ? kasprintf+0xa2/0xc0 [ 561.357643] ? kvasprintf_const+0x190/0x190 [ 561.361963] ? graph_lock+0x170/0x170 [ 561.365767] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 561.370969] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 561.376520] hwsim_new_radio_nl+0x7b8/0xa60 [ 561.380851] ? nla_parse+0x358/0x4a0 [ 561.384573] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 2018/06/06 15:00:38 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0x5, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 561.389780] ? __netlink_ns_capable+0x100/0x130 [ 561.394466] genl_family_rcv_msg+0x889/0x1120 [ 561.398972] ? genl_rcv+0x40/0x40 [ 561.402439] ? lock_downgrade+0x8e0/0x8e0 [ 561.406597] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 561.411631] ? kasan_check_read+0x11/0x20 [ 561.415792] ? lock_acquire+0x1dc/0x520 [ 561.419776] ? genl_rcv+0x19/0x40 [ 561.423249] genl_rcv_msg+0xc6/0x170 [ 561.426973] netlink_rcv_skb+0x172/0x440 [ 561.431046] ? genl_family_rcv_msg+0x1120/0x1120 [ 561.435812] ? netlink_ack+0xbc0/0xbc0 [ 561.439711] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 561.444915] ? netlink_skb_destructor+0x210/0x210 [ 561.449765] genl_rcv+0x28/0x40 [ 561.453054] netlink_unicast+0x58b/0x740 [ 561.457123] ? netlink_attachskb+0x970/0x970 [ 561.461540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.467085] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 561.472108] ? security_netlink_send+0x88/0xb0 [ 561.476707] netlink_sendmsg+0x9f0/0xfa0 [ 561.480780] ? netlink_unicast+0x740/0x740 [ 561.485029] ? security_socket_sendmsg+0x94/0xc0 [ 561.489807] ? netlink_unicast+0x740/0x740 [ 561.494051] sock_sendmsg+0xd5/0x120 [ 561.497775] ___sys_sendmsg+0x805/0x940 [ 561.501760] ? copy_msghdr_from_user+0x560/0x560 [ 561.506531] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 561.512075] ? proc_fail_nth_write+0x96/0x1f0 [ 561.516582] ? __fget_light+0x2ef/0x430 [ 561.520563] ? fget_raw+0x20/0x20 [ 561.524027] ? find_held_lock+0x36/0x1c0 [ 561.528100] ? kasan_check_write+0x14/0x20 [ 561.532351] ? wait_for_completion+0x870/0x870 [ 561.536954] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 561.542506] ? sockfd_lookup_light+0xc5/0x160 [ 561.547020] __sys_sendmsg+0x115/0x270 [ 561.550921] ? __ia32_sys_shutdown+0x80/0x80 [ 561.555336] ? __sb_end_write+0xac/0xe0 [ 561.559324] ? fput+0x130/0x1a0 [ 561.562605] ? ksys_write+0x1a6/0x250 [ 561.566405] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 561.571251] __x64_sys_sendmsg+0x78/0xb0 [ 561.575317] do_syscall_64+0x1b1/0x800 [ 561.579201] ? finish_task_switch+0x1ca/0x840 [ 561.583688] ? syscall_return_slowpath+0x5c0/0x5c0 [ 561.588600] ? syscall_return_slowpath+0x30f/0x5c0 [ 561.593525] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 561.598885] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 561.603714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.608895] RIP: 0033:0x455a09 [ 561.612064] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 561.619755] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 561.627011] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 561.634274] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 561.641525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 561.648794] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000001f 2018/06/06 15:00:38 executing program 3 (fault-call:1 fault-nth:32): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:38 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0x6, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:38 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xf0]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:38 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b01000000000e}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0xffffff7f00000000}}], 0x1f9, 0x0) 2018/06/06 15:00:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x0) 2018/06/06 15:00:38 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:38 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xfffffff0]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:38 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b0100800c0200}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x34000) 2018/06/06 15:00:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x1000000}}], 0x1f9, 0x0) [ 562.100540] FAULT_INJECTION: forcing a failure. [ 562.100540] name failslab, interval 1, probability 0, space 0, times 0 [ 562.111885] CPU: 1 PID: 14559 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 562.119157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 562.128939] Call Trace: [ 562.131554] dump_stack+0x1b9/0x294 [ 562.135168] ? dump_stack_print_info.cold.2+0x52/0x52 [ 562.140343] ? is_bpf_text_address+0xd7/0x170 [ 562.144836] ? kernel_text_address+0x79/0xf0 [ 562.149230] ? __unwind_start+0x166/0x330 [ 562.153367] should_fail.cold.4+0xa/0x1a [ 562.157412] ? __save_stack_trace+0x7e/0xd0 [ 562.161718] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 562.166820] ? graph_lock+0x170/0x170 [ 562.170602] ? save_stack+0x43/0xd0 [ 562.174216] ? kasan_kmalloc+0xc4/0xe0 [ 562.178090] ? kasan_slab_alloc+0x12/0x20 [ 562.182222] ? find_held_lock+0x36/0x1c0 [ 562.186267] ? __lock_is_held+0xb5/0x140 [ 562.190320] ? check_same_owner+0x320/0x320 [ 562.194647] ? rcu_note_context_switch+0x710/0x710 [ 562.199598] __should_failslab+0x124/0x180 [ 562.203844] should_failslab+0x9/0x14 [ 562.207656] kmem_cache_alloc_node_trace+0x26f/0x770 [ 562.212779] __kmalloc_node_track_caller+0x33/0x70 [ 562.217724] __kmalloc_reserve.isra.39+0x3a/0xe0 [ 562.222484] __alloc_skb+0x14d/0x780 [ 562.226199] ? skb_scrub_packet+0x580/0x580 [ 562.230523] ? kasan_check_read+0x11/0x20 [ 562.234653] ? rcu_is_watching+0x85/0x140 [ 562.238786] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 562.243964] ? netlink_has_listeners+0x2ff/0x4c0 [ 562.248701] ? netlink_tap_init_net+0x3c0/0x3c0 [ 562.253355] alloc_uevent_skb+0x89/0x220 [ 562.257401] kobject_uevent_env+0x866/0x1110 [ 562.261791] ? device_pm_add+0x221/0x340 [ 562.265837] kobject_uevent+0x1f/0x30 [ 562.269620] device_add+0xb01/0x16d0 [ 562.273317] ? device_private_init+0x230/0x230 [ 562.277880] ? kfree+0x1e9/0x260 [ 562.281237] ? kfree_const+0x5e/0x70 [ 562.284948] device_create_groups_vargs+0x1ff/0x270 [ 562.289951] device_create+0xd3/0x100 [ 562.293741] ? device_create_vargs+0x60/0x60 [ 562.298132] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 562.303224] ? trace_hardirqs_on+0xd/0x10 [ 562.307360] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 562.312269] ? string+0x21d/0x2c0 [ 562.315702] ? widen_string+0x2d0/0x2d0 [ 562.319663] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 562.325790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 562.331320] ? vsnprintf+0x242/0x1b40 [ 562.335118] ? pointer+0xa10/0xa10 [ 562.338641] ? rcu_note_context_switch+0x710/0x710 [ 562.343557] ? __lock_acquire+0x7f5/0x5140 [ 562.347776] ? kasprintf+0xa2/0xc0 [ 562.351308] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 562.356305] ? kvasprintf+0xe2/0x130 [ 562.359999] ? bust_spinlocks+0xe0/0xe0 [ 562.363963] ? kasprintf+0xa2/0xc0 [ 562.367489] ? kvasprintf_const+0x190/0x190 [ 562.371790] ? graph_lock+0x170/0x170 [ 562.375573] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 562.380746] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 562.386268] hwsim_new_radio_nl+0x7b8/0xa60 [ 562.390572] ? nla_parse+0x358/0x4a0 [ 562.394277] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 562.399454] ? __netlink_ns_capable+0x100/0x130 [ 562.404116] genl_family_rcv_msg+0x889/0x1120 [ 562.408604] ? genl_rcv+0x40/0x40 [ 562.412046] ? lock_downgrade+0x8e0/0x8e0 [ 562.416181] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 562.421193] ? kasan_check_read+0x11/0x20 [ 562.425325] ? lock_acquire+0x1dc/0x520 [ 562.429279] ? genl_rcv+0x19/0x40 [ 562.432722] genl_rcv_msg+0xc6/0x170 [ 562.436424] netlink_rcv_skb+0x172/0x440 [ 562.440476] ? genl_family_rcv_msg+0x1120/0x1120 [ 562.445212] ? netlink_ack+0xbc0/0xbc0 [ 562.449091] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 562.454284] ? netlink_skb_destructor+0x210/0x210 [ 562.459130] genl_rcv+0x28/0x40 [ 562.462419] netlink_unicast+0x58b/0x740 [ 562.466494] ? netlink_attachskb+0x970/0x970 [ 562.471469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 562.477004] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 562.482024] ? security_netlink_send+0x88/0xb0 [ 562.486602] netlink_sendmsg+0x9f0/0xfa0 [ 562.490660] ? netlink_unicast+0x740/0x740 [ 562.494886] ? security_socket_sendmsg+0x94/0xc0 [ 562.499633] ? netlink_unicast+0x740/0x740 [ 562.503855] sock_sendmsg+0xd5/0x120 [ 562.507551] ___sys_sendmsg+0x805/0x940 [ 562.511509] ? copy_msghdr_from_user+0x560/0x560 [ 562.516252] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 562.521772] ? proc_fail_nth_write+0x96/0x1f0 [ 562.526259] ? __fget_light+0x2ef/0x430 [ 562.530218] ? fget_raw+0x20/0x20 [ 562.533652] ? find_held_lock+0x36/0x1c0 [ 562.537711] ? kasan_check_write+0x14/0x20 [ 562.541944] ? wait_for_completion+0x870/0x870 [ 562.546516] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 562.552041] ? sockfd_lookup_light+0xc5/0x160 [ 562.556607] __sys_sendmsg+0x115/0x270 [ 562.560479] ? __ia32_sys_shutdown+0x80/0x80 [ 562.564868] ? __sb_end_write+0xac/0xe0 [ 562.568831] ? fput+0x130/0x1a0 [ 562.572092] ? ksys_write+0x1a6/0x250 [ 562.575880] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 562.580710] __x64_sys_sendmsg+0x78/0xb0 [ 562.584755] do_syscall_64+0x1b1/0x800 [ 562.588626] ? finish_task_switch+0x1ca/0x840 [ 562.593111] ? syscall_return_slowpath+0x5c0/0x5c0 [ 562.598048] ? syscall_return_slowpath+0x30f/0x5c0 [ 562.602979] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 562.608327] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 562.613155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 562.618332] RIP: 0033:0x455a09 [ 562.621503] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 562.629191] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 562.636442] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 562.643692] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/06/06 15:00:39 executing program 3 (fault-call:1 fault-nth:33): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:39 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be", 0x2}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x300]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x97ffffff00000000) 2018/06/06 15:00:39 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xaa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:39 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b01000000c087}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x500}}], 0x1f9, 0x0) [ 562.650941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 562.658191] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000020 [ 562.740326] FAULT_INJECTION: forcing a failure. [ 562.740326] name failslab, interval 1, probability 0, space 0, times 0 [ 562.751669] CPU: 0 PID: 14582 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 562.758945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 562.768319] Call Trace: [ 562.770912] dump_stack+0x1b9/0x294 [ 562.774556] ? dump_stack_print_info.cold.2+0x52/0x52 [ 562.779797] ? device_add+0xbd0/0x16d0 [ 562.783702] should_fail.cold.4+0xa/0x1a 2018/06/06 15:00:39 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x7800, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xf0ffff]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be", 0x2}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:39 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b01001a000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 562.787770] ? graph_lock+0x170/0x170 [ 562.791587] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 562.796702] ? __lock_acquire+0x7f5/0x5140 [ 562.800956] ? mutex_trylock+0x2a0/0x2a0 [ 562.805037] ? graph_lock+0x170/0x170 [ 562.808862] ? find_held_lock+0x36/0x1c0 [ 562.812944] ? __lock_is_held+0xb5/0x140 [ 562.817033] ? check_same_owner+0x320/0x320 [ 562.821372] ? rcu_note_context_switch+0x710/0x710 [ 562.826315] ? kasan_check_write+0x14/0x20 [ 562.830563] __should_failslab+0x124/0x180 [ 562.834806] should_failslab+0x9/0x14 [ 562.838619] __kmalloc_track_caller+0x2c4/0x760 [ 562.843298] ? graph_lock+0x170/0x170 [ 562.847135] ? kasan_check_write+0x14/0x20 [ 562.851382] ? do_raw_spin_lock+0xc1/0x200 [ 562.855636] ? kstrdup_const+0x66/0x80 [ 562.859533] kstrdup+0x39/0x70 [ 562.862736] kstrdup_const+0x66/0x80 [ 562.866473] __kernfs_new_node+0xa8/0x580 [ 562.870635] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 562.875410] ? lock_downgrade+0x8e0/0x8e0 [ 562.879572] ? kasan_check_read+0x11/0x20 [ 562.883725] ? do_raw_spin_unlock+0x9e/0x2e0 2018/06/06 15:00:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xf0ffffff]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:39 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x5, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:40 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010055000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 562.888142] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 562.892733] kernfs_new_node+0x80/0xf0 [ 562.896630] kernfs_create_link+0x33/0x180 [ 562.900871] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 562.906153] sysfs_create_link+0x65/0xc0 [ 562.910224] driver_sysfs_add+0x107/0x2a0 [ 562.914379] device_bind_driver+0x19/0xd0 [ 562.918536] mac80211_hwsim_new_radio+0x451/0x33b0 [ 562.923465] ? string+0x21d/0x2c0 [ 562.926920] ? widen_string+0x2d0/0x2d0 [ 562.930904] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 2018/06/06 15:00:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be", 0x2}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 562.937055] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 562.942595] ? vsnprintf+0x242/0x1b40 [ 562.946411] ? pointer+0xa10/0xa10 [ 562.949953] ? rcu_note_context_switch+0x710/0x710 [ 562.954885] ? __lock_acquire+0x7f5/0x5140 [ 562.959122] ? kasprintf+0xa2/0xc0 [ 562.962670] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 562.967692] ? kvasprintf+0xe2/0x130 [ 562.971413] ? bust_spinlocks+0xe0/0xe0 [ 562.975404] ? kasprintf+0xa2/0xc0 [ 562.978948] ? kvasprintf_const+0x190/0x190 [ 562.983271] ? graph_lock+0x170/0x170 [ 562.987081] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 562.992282] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 562.997829] hwsim_new_radio_nl+0x7b8/0xa60 [ 563.002152] ? nla_parse+0x358/0x4a0 [ 563.005873] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 563.011074] ? __netlink_ns_capable+0x100/0x130 [ 563.015753] genl_family_rcv_msg+0x889/0x1120 [ 563.020259] ? genl_rcv+0x40/0x40 [ 563.023718] ? lock_downgrade+0x8e0/0x8e0 [ 563.027874] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 563.032902] ? kasan_check_read+0x11/0x20 [ 563.037055] ? lock_acquire+0x1dc/0x520 [ 563.041031] ? genl_rcv+0x19/0x40 [ 563.044504] genl_rcv_msg+0xc6/0x170 [ 563.048220] netlink_rcv_skb+0x172/0x440 [ 563.052282] ? genl_family_rcv_msg+0x1120/0x1120 [ 563.057039] ? netlink_ack+0xbc0/0xbc0 [ 563.060929] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 563.066128] ? netlink_skb_destructor+0x210/0x210 [ 563.070981] genl_rcv+0x28/0x40 [ 563.074266] netlink_unicast+0x58b/0x740 [ 563.078330] ? netlink_attachskb+0x970/0x970 [ 563.082739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 563.088286] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 563.093306] ? security_netlink_send+0x88/0xb0 [ 563.097898] netlink_sendmsg+0x9f0/0xfa0 [ 563.101979] ? netlink_unicast+0x740/0x740 [ 563.106218] ? security_socket_sendmsg+0x94/0xc0 [ 563.110976] ? netlink_unicast+0x740/0x740 [ 563.115221] sock_sendmsg+0xd5/0x120 [ 563.118944] ___sys_sendmsg+0x805/0x940 [ 563.122929] ? copy_msghdr_from_user+0x560/0x560 [ 563.127697] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 563.133243] ? proc_fail_nth_write+0x96/0x1f0 [ 563.137751] ? __fget_light+0x2ef/0x430 [ 563.141728] ? fget_raw+0x20/0x20 [ 563.145179] ? find_held_lock+0x36/0x1c0 [ 563.149243] ? kasan_check_write+0x14/0x20 [ 563.153487] ? wait_for_completion+0x870/0x870 [ 563.158088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 563.163631] ? sockfd_lookup_light+0xc5/0x160 [ 563.168132] __sys_sendmsg+0x115/0x270 [ 563.172028] ? __ia32_sys_shutdown+0x80/0x80 [ 563.176444] ? __sb_end_write+0xac/0xe0 [ 563.180428] ? fput+0x130/0x1a0 [ 563.183711] ? ksys_write+0x1a6/0x250 [ 563.187533] __x64_sys_sendmsg+0x78/0xb0 [ 563.191596] do_syscall_64+0x1b1/0x800 [ 563.195482] ? finish_task_switch+0x1ca/0x840 [ 563.200073] ? syscall_return_slowpath+0x5c0/0x5c0 [ 563.205008] ? syscall_return_slowpath+0x30f/0x5c0 [ 563.209949] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 563.215326] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 563.220183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 563.225375] RIP: 0033:0x455a09 [ 563.228574] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 2018/06/06 15:00:40 executing program 3 (fault-call:1 fault-nth:34): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:40 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x200000000000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:40 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010012000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be83", 0x3}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0xf801}}], 0x1f9, 0x0) 2018/06/06 15:00:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x2]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x40030000000000) [ 563.236283] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 563.243535] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 563.250785] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 563.258122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 563.265372] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000021 [ 563.314163] FAULT_INJECTION: forcing a failure. [ 563.314163] name failslab, interval 1, probability 0, space 0, times 0 [ 563.325535] CPU: 0 PID: 14620 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 563.332821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.342180] Call Trace: [ 563.344780] dump_stack+0x1b9/0x294 [ 563.348430] ? dump_stack_print_info.cold.2+0x52/0x52 [ 563.353641] should_fail.cold.4+0xa/0x1a [ 563.357712] ? __kmalloc_track_caller+0x14a/0x760 2018/06/06 15:00:40 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000d00}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:40 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0xff000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 563.362566] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 563.367681] ? device_bind_driver+0x19/0xd0 [ 563.372014] ? mac80211_hwsim_new_radio+0x451/0x33b0 [ 563.377125] ? hwsim_new_radio_nl+0x7b8/0xa60 [ 563.381631] ? genl_family_rcv_msg+0x889/0x1120 [ 563.386307] ? genl_rcv_msg+0xc6/0x170 [ 563.390201] ? netlink_rcv_skb+0x172/0x440 [ 563.394440] ? genl_rcv+0x28/0x40 [ 563.397898] ? graph_lock+0x170/0x170 [ 563.401711] ? __sys_sendmsg+0x115/0x270 [ 563.405780] ? __x64_sys_sendmsg+0x78/0xb0 [ 563.410024] ? do_syscall_64+0x1b1/0x800 [ 563.414097] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 563.419473] ? find_held_lock+0x36/0x1c0 [ 563.423546] ? __lock_is_held+0xb5/0x140 [ 563.427631] ? check_same_owner+0x320/0x320 [ 563.431969] ? rcu_note_context_switch+0x710/0x710 [ 563.436912] ? rcu_read_lock_sched_held+0x108/0x120 [ 563.441944] __should_failslab+0x124/0x180 [ 563.446189] should_failslab+0x9/0x14 [ 563.450001] kmem_cache_alloc+0x2af/0x760 [ 563.454153] ? memcpy+0x45/0x50 [ 563.457439] ? kstrdup+0x59/0x70 [ 563.460819] __kernfs_new_node+0xe7/0x580 2018/06/06 15:00:40 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x8000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:40 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000004100}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 563.464978] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 563.469746] ? lock_downgrade+0x8e0/0x8e0 [ 563.473914] ? kasan_check_read+0x11/0x20 [ 563.478067] ? do_raw_spin_unlock+0x9e/0x2e0 [ 563.482483] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 563.487082] kernfs_new_node+0x80/0xf0 [ 563.490979] kernfs_create_link+0x33/0x180 [ 563.495221] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 563.500507] sysfs_create_link+0x65/0xc0 [ 563.504582] driver_sysfs_add+0x107/0x2a0 [ 563.508738] device_bind_driver+0x19/0xd0 2018/06/06 15:00:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 563.512894] mac80211_hwsim_new_radio+0x451/0x33b0 [ 563.517824] ? string+0x21d/0x2c0 [ 563.521283] ? widen_string+0x2d0/0x2d0 [ 563.525270] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 563.531434] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 563.536980] ? vsnprintf+0x242/0x1b40 [ 563.540786] ? pointer+0xa10/0xa10 [ 563.544342] ? rcu_note_context_switch+0x710/0x710 [ 563.549284] ? __lock_acquire+0x7f5/0x5140 [ 563.553524] ? kasprintf+0xa2/0xc0 [ 563.557073] ? __sanitizer_cov_trace_cmp4+0x16/0x20 2018/06/06 15:00:40 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x40000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 563.562091] ? kvasprintf+0xe2/0x130 [ 563.565808] ? bust_spinlocks+0xe0/0xe0 [ 563.569796] ? kasprintf+0xa2/0xc0 [ 563.573345] ? kvasprintf_const+0x190/0x190 [ 563.577680] ? graph_lock+0x170/0x170 [ 563.581490] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 563.586693] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 563.592242] hwsim_new_radio_nl+0x7b8/0xa60 [ 563.596568] ? nla_parse+0x358/0x4a0 [ 563.600289] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 563.605494] ? __netlink_ns_capable+0x100/0x130 [ 563.610611] genl_family_rcv_msg+0x889/0x1120 2018/06/06 15:00:40 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000006000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 563.615118] ? genl_rcv+0x40/0x40 [ 563.618574] ? lock_downgrade+0x8e0/0x8e0 [ 563.622723] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 563.627752] ? kasan_check_read+0x11/0x20 [ 563.631908] ? lock_acquire+0x1dc/0x520 [ 563.635888] ? genl_rcv+0x19/0x40 [ 563.639976] genl_rcv_msg+0xc6/0x170 [ 563.643696] netlink_rcv_skb+0x172/0x440 [ 563.647762] ? genl_family_rcv_msg+0x1120/0x1120 [ 563.652526] ? netlink_ack+0xbc0/0xbc0 [ 563.656425] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 563.661629] ? netlink_skb_destructor+0x210/0x210 [ 563.666479] genl_rcv+0x28/0x40 [ 563.669761] netlink_unicast+0x58b/0x740 [ 563.673830] ? netlink_attachskb+0x970/0x970 [ 563.678253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 563.683801] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 563.688825] ? security_netlink_send+0x88/0xb0 [ 563.693418] netlink_sendmsg+0x9f0/0xfa0 [ 563.697493] ? netlink_unicast+0x740/0x740 [ 563.701735] ? security_socket_sendmsg+0x94/0xc0 [ 563.706503] ? netlink_unicast+0x740/0x740 [ 563.710745] sock_sendmsg+0xd5/0x120 [ 563.714467] ___sys_sendmsg+0x805/0x940 [ 563.718453] ? copy_msghdr_from_user+0x560/0x560 [ 563.723224] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 563.728766] ? proc_fail_nth_write+0x96/0x1f0 [ 563.733272] ? __fget_light+0x2ef/0x430 [ 563.737252] ? fget_raw+0x20/0x20 [ 563.740726] ? find_held_lock+0x36/0x1c0 [ 563.744797] ? kasan_check_write+0x14/0x20 [ 563.749046] ? wait_for_completion+0x870/0x870 [ 563.753646] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 563.759192] ? sockfd_lookup_light+0xc5/0x160 [ 563.763700] __sys_sendmsg+0x115/0x270 [ 563.767602] ? __ia32_sys_shutdown+0x80/0x80 [ 563.772018] ? __sb_end_write+0xac/0xe0 [ 563.775998] ? fput+0x130/0x1a0 [ 563.779281] ? ksys_write+0x1a6/0x250 [ 563.783104] __x64_sys_sendmsg+0x78/0xb0 [ 563.787171] do_syscall_64+0x1b1/0x800 [ 563.791064] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 563.795915] ? syscall_return_slowpath+0x5c0/0x5c0 [ 563.800841] ? syscall_return_slowpath+0x30f/0x5c0 [ 563.805777] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 563.811147] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 563.816000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 563.821189] RIP: 0033:0x455a09 [ 563.824373] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 563.832084] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 563.839354] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 563.846623] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 563.853894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/06/06 15:00:40 executing program 3 (fault-call:1 fault-nth:35): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:40 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:40 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000037}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:40 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0xf8010000}}], 0x1f9, 0x0) 2018/06/06 15:00:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x9effffff00000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 563.861163] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000022 2018/06/06 15:00:40 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be83", 0x3}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x100000000000000) [ 563.961426] FAULT_INJECTION: forcing a failure. [ 563.961426] name failslab, interval 1, probability 0, space 0, times 0 [ 563.972742] CPU: 0 PID: 14694 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 563.980020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.989378] Call Trace: [ 563.992064] dump_stack+0x1b9/0x294 [ 563.995704] ? dump_stack_print_info.cold.2+0x52/0x52 [ 564.000901] ? __mutex_lock+0x7d9/0x17f0 [ 564.004976] should_fail.cold.4+0xa/0x1a [ 564.009050] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 564.014163] ? kasan_kmalloc+0xc4/0xe0 [ 564.018064] ? graph_lock+0x170/0x170 [ 564.021873] ? debug_check_no_locks_freed+0x310/0x310 [ 564.027079] ? find_held_lock+0x36/0x1c0 [ 564.031153] ? __lock_is_held+0xb5/0x140 [ 564.035235] ? check_same_owner+0x320/0x320 [ 564.039568] ? kasan_check_write+0x14/0x20 [ 564.043812] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 564.048750] ? rcu_note_context_switch+0x710/0x710 [ 564.053691] __should_failslab+0x124/0x180 [ 564.057933] should_failslab+0x9/0x14 2018/06/06 15:00:41 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b01000000004c}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be83", 0x3}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x1000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 564.061742] kmem_cache_alloc+0x2af/0x760 [ 564.065903] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 564.070844] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 564.075874] __kernfs_new_node+0xe7/0x580 [ 564.080036] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 564.084807] ? lock_downgrade+0x8e0/0x8e0 [ 564.088974] ? kasan_check_read+0x11/0x20 [ 564.093132] ? do_raw_spin_unlock+0x9e/0x2e0 [ 564.097548] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 564.102143] kernfs_new_node+0x80/0xf0 [ 564.106042] kernfs_create_link+0x33/0x180 2018/06/06 15:00:41 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x7f00, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 564.110282] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 564.115566] sysfs_create_link+0x65/0xc0 [ 564.119636] driver_sysfs_add+0x188/0x2a0 [ 564.123796] device_bind_driver+0x19/0xd0 [ 564.127953] mac80211_hwsim_new_radio+0x451/0x33b0 [ 564.132888] ? string+0x21d/0x2c0 [ 564.136346] ? widen_string+0x2d0/0x2d0 [ 564.140334] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 564.146483] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 564.152023] ? vsnprintf+0x242/0x1b40 [ 564.155832] ? pointer+0xa10/0xa10 2018/06/06 15:00:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:41 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x80fe, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 564.159438] ? rcu_note_context_switch+0x710/0x710 [ 564.164370] ? __lock_acquire+0x7f5/0x5140 [ 564.168606] ? kasprintf+0xa2/0xc0 [ 564.172153] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 564.177168] ? kvasprintf+0xe2/0x130 [ 564.180887] ? bust_spinlocks+0xe0/0xe0 [ 564.184873] ? kasprintf+0xa2/0xc0 [ 564.188410] ? kvasprintf_const+0x190/0x190 [ 564.192728] ? graph_lock+0x170/0x170 [ 564.196540] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 564.201741] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 564.207296] hwsim_new_radio_nl+0x7b8/0xa60 2018/06/06 15:00:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 564.211628] ? nla_parse+0x358/0x4a0 [ 564.215354] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 564.220550] ? __netlink_ns_capable+0x100/0x130 [ 564.225226] genl_family_rcv_msg+0x889/0x1120 [ 564.229732] ? genl_rcv+0x40/0x40 [ 564.233190] ? lock_downgrade+0x8e0/0x8e0 [ 564.237344] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 564.242366] ? kasan_check_read+0x11/0x20 [ 564.246520] ? lock_acquire+0x1dc/0x520 [ 564.250498] ? genl_rcv+0x19/0x40 [ 564.253963] genl_rcv_msg+0xc6/0x170 [ 564.257679] netlink_rcv_skb+0x172/0x440 [ 564.261741] ? genl_family_rcv_msg+0x1120/0x1120 [ 564.266505] ? netlink_ack+0xbc0/0xbc0 [ 564.270407] genl_rcv+0x28/0x40 [ 564.273684] netlink_unicast+0x58b/0x740 [ 564.277755] ? netlink_attachskb+0x970/0x970 [ 564.282169] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 564.287712] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 564.292731] ? security_netlink_send+0x88/0xb0 [ 564.297325] netlink_sendmsg+0x9f0/0xfa0 [ 564.301408] ? netlink_unicast+0x740/0x740 [ 564.305648] ? security_socket_sendmsg+0x94/0xc0 [ 564.310407] ? netlink_unicast+0x740/0x740 [ 564.314650] sock_sendmsg+0xd5/0x120 [ 564.318368] ___sys_sendmsg+0x805/0x940 [ 564.322356] ? copy_msghdr_from_user+0x560/0x560 [ 564.327129] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 564.332674] ? proc_fail_nth_write+0x96/0x1f0 [ 564.337178] ? __fget_light+0x2ef/0x430 [ 564.341149] ? fget_raw+0x20/0x20 [ 564.344597] ? find_held_lock+0x36/0x1c0 [ 564.348666] ? kasan_check_write+0x14/0x20 [ 564.352909] ? wait_for_completion+0x870/0x870 [ 564.357505] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 564.363047] ? sockfd_lookup_light+0xc5/0x160 [ 564.367545] __sys_sendmsg+0x115/0x270 [ 564.371435] ? __ia32_sys_shutdown+0x80/0x80 [ 564.375849] ? __sb_end_write+0xac/0xe0 [ 564.379829] ? fput+0x130/0x1a0 [ 564.383112] ? ksys_write+0x1a6/0x250 [ 564.386929] __x64_sys_sendmsg+0x78/0xb0 [ 564.391000] do_syscall_64+0x1b1/0x800 [ 564.394888] ? finish_task_switch+0x1ca/0x840 [ 564.399388] ? syscall_return_slowpath+0x5c0/0x5c0 [ 564.404327] ? syscall_return_slowpath+0x30f/0x5c0 [ 564.409275] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 564.414657] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 564.419510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 564.424697] RIP: 0033:0x455a09 [ 564.427880] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 564.435593] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 564.442858] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 564.450124] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/06/06 15:00:41 executing program 3 (fault-call:1 fault-nth:36): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:41 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x900000000000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xf000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:41 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000001700}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:41 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x1f8}}], 0x1f9, 0x0) 2018/06/06 15:00:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x9000000) [ 564.457393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 564.464662] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000023 2018/06/06 15:00:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:41 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000002000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 564.555648] FAULT_INJECTION: forcing a failure. [ 564.555648] name failslab, interval 1, probability 0, space 0, times 0 [ 564.566978] CPU: 0 PID: 14732 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 564.574267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.583637] Call Trace: [ 564.586237] dump_stack+0x1b9/0x294 [ 564.589874] ? dump_stack_print_info.cold.2+0x52/0x52 [ 564.595081] should_fail.cold.4+0xa/0x1a [ 564.599152] ? __kmalloc_track_caller+0x14a/0x760 2018/06/06 15:00:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xed070000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 564.604015] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 564.609137] ? device_bind_driver+0x19/0xd0 [ 564.613466] ? mac80211_hwsim_new_radio+0x451/0x33b0 [ 564.618586] ? hwsim_new_radio_nl+0x7b8/0xa60 [ 564.623088] ? genl_family_rcv_msg+0x889/0x1120 [ 564.627759] ? genl_rcv_msg+0xc6/0x170 [ 564.631645] ? netlink_rcv_skb+0x172/0x440 [ 564.635880] ? genl_rcv+0x28/0x40 [ 564.639335] ? graph_lock+0x170/0x170 [ 564.643144] ? __sys_sendmsg+0x115/0x270 [ 564.647208] ? __x64_sys_sendmsg+0x78/0xb0 [ 564.651452] ? do_syscall_64+0x1b1/0x800 2018/06/06 15:00:41 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:41 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x2000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 564.655520] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 564.660890] ? find_held_lock+0x36/0x1c0 [ 564.664967] ? __lock_is_held+0xb5/0x140 [ 564.669053] ? check_same_owner+0x320/0x320 [ 564.673391] ? rcu_note_context_switch+0x710/0x710 [ 564.678325] ? rcu_read_lock_sched_held+0x108/0x120 [ 564.683351] __should_failslab+0x124/0x180 [ 564.687588] should_failslab+0x9/0x14 [ 564.691417] kmem_cache_alloc+0x2af/0x760 [ 564.695568] ? memcpy+0x45/0x50 [ 564.698858] ? kstrdup+0x59/0x70 [ 564.702239] __kernfs_new_node+0xe7/0x580 2018/06/06 15:00:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:41 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000020c71}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0xf000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 564.706398] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 564.711163] ? lock_downgrade+0x8e0/0x8e0 [ 564.715333] ? kasan_check_read+0x11/0x20 [ 564.719489] ? do_raw_spin_unlock+0x9e/0x2e0 [ 564.723907] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 564.728501] kernfs_new_node+0x80/0xf0 [ 564.732396] kernfs_create_link+0x33/0x180 [ 564.736634] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 564.741916] sysfs_create_link+0x65/0xc0 [ 564.745986] driver_sysfs_add+0x107/0x2a0 [ 564.750140] device_bind_driver+0x19/0xd0 [ 564.754300] mac80211_hwsim_new_radio+0x451/0x33b0 [ 564.759231] ? string+0x21d/0x2c0 [ 564.762689] ? widen_string+0x2d0/0x2d0 [ 564.766678] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 564.772830] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 564.778380] ? vsnprintf+0x242/0x1b40 [ 564.782183] ? pointer+0xa10/0xa10 [ 564.785723] ? rcu_note_context_switch+0x710/0x710 [ 564.790658] ? __lock_acquire+0x7f5/0x5140 [ 564.794905] ? kasprintf+0xa2/0xc0 [ 564.798454] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 564.803472] ? kvasprintf+0xe2/0x130 [ 564.807189] ? bust_spinlocks+0xe0/0xe0 [ 564.811178] ? kasprintf+0xa2/0xc0 [ 564.814729] ? kvasprintf_const+0x190/0x190 [ 564.819053] ? graph_lock+0x170/0x170 [ 564.822866] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 564.828061] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 564.833607] hwsim_new_radio_nl+0x7b8/0xa60 [ 564.837931] ? nla_parse+0x358/0x4a0 [ 564.841653] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 564.846849] ? __netlink_ns_capable+0x100/0x130 [ 564.851532] genl_family_rcv_msg+0x889/0x1120 [ 564.856039] ? genl_rcv+0x40/0x40 [ 564.859507] ? lock_downgrade+0x8e0/0x8e0 [ 564.863661] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 564.868690] ? kasan_check_read+0x11/0x20 [ 564.872842] ? lock_acquire+0x1dc/0x520 [ 564.876816] ? genl_rcv+0x19/0x40 [ 564.880291] genl_rcv_msg+0xc6/0x170 [ 564.884011] netlink_rcv_skb+0x172/0x440 [ 564.888079] ? genl_family_rcv_msg+0x1120/0x1120 [ 564.892837] ? netlink_ack+0xbc0/0xbc0 [ 564.896725] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 564.901923] ? netlink_skb_destructor+0x210/0x210 [ 564.906774] genl_rcv+0x28/0x40 [ 564.910060] netlink_unicast+0x58b/0x740 [ 564.914131] ? netlink_attachskb+0x970/0x970 [ 564.918548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 564.924093] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 564.929111] ? security_netlink_send+0x88/0xb0 [ 564.933698] netlink_sendmsg+0x9f0/0xfa0 [ 564.937768] ? netlink_unicast+0x740/0x740 [ 564.942008] ? security_socket_sendmsg+0x94/0xc0 [ 564.946766] ? netlink_unicast+0x740/0x740 [ 564.951010] sock_sendmsg+0xd5/0x120 [ 564.954730] ___sys_sendmsg+0x805/0x940 [ 564.958715] ? copy_msghdr_from_user+0x560/0x560 [ 564.963487] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 564.969032] ? proc_fail_nth_write+0x96/0x1f0 [ 564.973538] ? __fget_light+0x2ef/0x430 [ 564.977523] ? fget_raw+0x20/0x20 [ 564.980978] ? find_held_lock+0x36/0x1c0 [ 564.985049] ? kasan_check_write+0x14/0x20 [ 564.989299] ? wait_for_completion+0x870/0x870 [ 564.993899] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 564.999441] ? sockfd_lookup_light+0xc5/0x160 [ 565.003945] __sys_sendmsg+0x115/0x270 [ 565.007839] ? __ia32_sys_shutdown+0x80/0x80 [ 565.012254] ? __sb_end_write+0xac/0xe0 [ 565.016237] ? fput+0x130/0x1a0 [ 565.019526] ? ksys_write+0x1a6/0x250 [ 565.023338] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 565.028191] __x64_sys_sendmsg+0x78/0xb0 [ 565.032258] do_syscall_64+0x1b1/0x800 [ 565.036158] ? finish_task_switch+0x1ca/0x840 [ 565.040659] ? syscall_return_slowpath+0x5c0/0x5c0 [ 565.045595] ? syscall_return_slowpath+0x30f/0x5c0 [ 565.050534] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 565.055906] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 565.060761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 565.065948] RIP: 0033:0x455a09 [ 565.069136] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 565.076852] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 565.084123] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 565.091394] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 565.098655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/06/06 15:00:42 executing program 3 (fault-call:1 fault-nth:37): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0xffffff7f00000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:42 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b01004c000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:42 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x5000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:42 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x500000000000000}}], 0x1f9, 0x0) 2018/06/06 15:00:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x2000000) [ 565.105907] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000024 [ 565.199383] FAULT_INJECTION: forcing a failure. [ 565.199383] name failslab, interval 1, probability 0, space 0, times 0 [ 565.210722] CPU: 1 PID: 14806 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 565.218005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.227358] Call Trace: [ 565.229953] dump_stack+0x1b9/0x294 [ 565.233599] ? dump_stack_print_info.cold.2+0x52/0x52 [ 565.238796] ? kernel_text_address+0x79/0xf0 [ 565.243215] ? __unwind_start+0x166/0x330 [ 565.247373] ? __kernel_text_address+0xd/0x40 [ 565.251881] should_fail.cold.4+0xa/0x1a [ 565.255954] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 565.261064] ? save_stack+0xa9/0xd0 [ 565.264700] ? graph_lock+0x170/0x170 [ 565.268502] ? kasan_kmalloc+0xc4/0xe0 [ 565.272398] ? kmem_cache_alloc_trace+0x152/0x780 [ 565.277248] ? kobject_uevent_env+0x20f/0x1110 [ 565.281834] ? kobject_uevent+0x1f/0x30 [ 565.285812] ? driver_bound+0x1a3/0x220 [ 565.289794] ? device_bind_driver+0xb3/0xd0 [ 565.294124] ? find_held_lock+0x36/0x1c0 [ 565.298195] ? __lock_is_held+0xb5/0x140 [ 565.302279] ? check_same_owner+0x320/0x320 [ 565.306611] ? rcu_note_context_switch+0x710/0x710 [ 565.311553] __should_failslab+0x124/0x180 [ 565.315795] should_failslab+0x9/0x14 [ 565.319602] __kmalloc+0x2c8/0x760 [ 565.323152] ? kobject_uevent_env+0x20f/0x1110 [ 565.327741] ? rcu_read_lock_sched_held+0x108/0x120 [ 565.332770] ? kobject_get_path+0xc2/0x1a0 [ 565.337011] ? trace_hardirqs_on+0xd/0x10 [ 565.341167] kobject_get_path+0xc2/0x1a0 [ 565.345238] kobject_uevent_env+0x234/0x1110 [ 565.349651] ? _raw_spin_unlock_irq+0x27/0x70 [ 565.354164] kobject_uevent+0x1f/0x30 [ 565.357983] driver_bound+0x1a3/0x220 [ 565.361791] device_bind_driver+0xb3/0xd0 [ 565.365956] mac80211_hwsim_new_radio+0x451/0x33b0 [ 565.370888] ? string+0x21d/0x2c0 [ 565.374345] ? widen_string+0x2d0/0x2d0 [ 565.378331] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 565.384481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 565.390021] ? vsnprintf+0x242/0x1b40 [ 565.393832] ? pointer+0xa10/0xa10 [ 565.397375] ? rcu_note_context_switch+0x710/0x710 [ 565.402308] ? __lock_acquire+0x7f5/0x5140 [ 565.406549] ? kasprintf+0xa2/0xc0 [ 565.410098] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 565.415120] ? kvasprintf+0xe2/0x130 [ 565.418838] ? bust_spinlocks+0xe0/0xe0 [ 565.422819] ? kasprintf+0xa2/0xc0 [ 565.426367] ? kvasprintf_const+0x190/0x190 [ 565.430687] ? graph_lock+0x170/0x170 [ 565.434496] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 565.439695] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 565.445243] hwsim_new_radio_nl+0x7b8/0xa60 [ 565.449567] ? nla_parse+0x358/0x4a0 [ 565.453289] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 565.458487] ? __netlink_ns_capable+0x100/0x130 [ 565.463166] genl_family_rcv_msg+0x889/0x1120 [ 565.467669] ? genl_rcv+0x40/0x40 [ 565.471124] ? lock_downgrade+0x8e0/0x8e0 [ 565.475275] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 565.480303] ? kasan_check_read+0x11/0x20 [ 565.484459] ? lock_acquire+0x1dc/0x520 [ 565.488436] ? genl_rcv+0x19/0x40 [ 565.491905] genl_rcv_msg+0xc6/0x170 [ 565.495623] netlink_rcv_skb+0x172/0x440 2018/06/06 15:00:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:42 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b0100f0ffffff}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0x100000000000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:42 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x9000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0x200000000000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 565.499685] ? genl_family_rcv_msg+0x1120/0x1120 [ 565.504443] ? netlink_ack+0xbc0/0xbc0 [ 565.508337] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 565.513525] ? netlink_skb_destructor+0x210/0x210 [ 565.518369] genl_rcv+0x28/0x40 [ 565.521653] netlink_unicast+0x58b/0x740 [ 565.525720] ? netlink_attachskb+0x970/0x970 [ 565.530150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 565.535694] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 565.540713] ? security_netlink_send+0x88/0xb0 [ 565.545304] netlink_sendmsg+0x9f0/0xfa0 [ 565.549377] ? netlink_unicast+0x740/0x740 [ 565.553619] ? security_socket_sendmsg+0x94/0xc0 [ 565.558382] ? netlink_unicast+0x740/0x740 [ 565.562621] sock_sendmsg+0xd5/0x120 [ 565.566337] ___sys_sendmsg+0x805/0x940 [ 565.570316] ? copy_msghdr_from_user+0x560/0x560 [ 565.575091] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 565.580634] ? proc_fail_nth_write+0x96/0x1f0 [ 565.585138] ? __fget_light+0x2ef/0x430 [ 565.589115] ? fget_raw+0x20/0x20 [ 565.592568] ? find_held_lock+0x36/0x1c0 [ 565.596637] ? kasan_check_write+0x14/0x20 [ 565.600879] ? wait_for_completion+0x870/0x870 [ 565.605478] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 565.611018] ? sockfd_lookup_light+0xc5/0x160 [ 565.615522] __sys_sendmsg+0x115/0x270 [ 565.619412] ? __ia32_sys_shutdown+0x80/0x80 [ 565.623821] ? __sb_end_write+0xac/0xe0 [ 565.627800] ? fput+0x130/0x1a0 [ 565.631086] ? ksys_write+0x1a6/0x250 [ 565.634903] __x64_sys_sendmsg+0x78/0xb0 [ 565.638967] do_syscall_64+0x1b1/0x800 [ 565.642858] ? finish_task_switch+0x1ca/0x840 [ 565.647359] ? syscall_return_slowpath+0x5c0/0x5c0 [ 565.652295] ? syscall_return_slowpath+0x30f/0x5c0 [ 565.657236] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 565.662606] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 565.667458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 565.672651] RIP: 0033:0x455a09 [ 565.675838] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 565.683550] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 565.690813] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 2018/06/06 15:00:42 executing program 3 (fault-call:1 fault-nth:38): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:42 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x600, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:42 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0xffffff7f]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:42 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0xc3ff000000000000}}], 0x1f9, 0x0) 2018/06/06 15:00:42 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000001e00}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x97ffffff) [ 565.698063] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 565.705327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 565.712596] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000025 [ 565.796599] FAULT_INJECTION: forcing a failure. [ 565.796599] name failslab, interval 1, probability 0, space 0, times 0 [ 565.807945] CPU: 1 PID: 14860 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 565.815223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.824581] Call Trace: [ 565.827181] dump_stack+0x1b9/0x294 [ 565.830823] ? dump_stack_print_info.cold.2+0x52/0x52 [ 565.836032] should_fail.cold.4+0xa/0x1a [ 565.840107] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 565.845227] ? rcu_note_context_switch+0x710/0x710 [ 565.850169] ? graph_lock+0x170/0x170 [ 565.853980] ? __might_sleep+0x95/0x190 [ 565.857967] ? find_held_lock+0x36/0x1c0 [ 565.862042] ? __lock_is_held+0xb5/0x140 [ 565.866125] ? check_same_owner+0x320/0x320 [ 565.870454] ? graph_lock+0x170/0x170 [ 565.874268] ? rcu_note_context_switch+0x710/0x710 [ 565.879213] __should_failslab+0x124/0x180 [ 565.883458] should_failslab+0x9/0x14 [ 565.887273] kmem_cache_alloc_node+0x272/0x780 [ 565.891861] ? find_held_lock+0x36/0x1c0 [ 565.895939] __alloc_skb+0x111/0x780 [ 565.899663] ? skb_scrub_packet+0x580/0x580 [ 565.903999] ? kasan_check_read+0x11/0x20 [ 565.908151] ? rcu_is_watching+0x85/0x140 [ 565.912307] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 565.917517] ? netlink_has_listeners+0x2ff/0x4c0 [ 565.922284] ? netlink_tap_init_net+0x3c0/0x3c0 [ 565.926967] alloc_uevent_skb+0x89/0x220 [ 565.931043] kobject_uevent_env+0x866/0x1110 [ 565.935469] ? _raw_spin_unlock_irq+0x27/0x70 [ 565.939977] kobject_uevent+0x1f/0x30 [ 565.943786] driver_bound+0x1a3/0x220 [ 565.947598] device_bind_driver+0xb3/0xd0 [ 565.951752] mac80211_hwsim_new_radio+0x451/0x33b0 [ 565.956684] ? string+0x21d/0x2c0 [ 565.960150] ? widen_string+0x2d0/0x2d0 [ 565.964142] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 565.970300] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 565.975850] ? vsnprintf+0x242/0x1b40 [ 565.979661] ? pointer+0xa10/0xa10 [ 565.983210] ? rcu_note_context_switch+0x710/0x710 [ 565.988141] ? __lock_acquire+0x7f5/0x5140 [ 565.992376] ? kasprintf+0xa2/0xc0 [ 565.995925] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 566.000943] ? kvasprintf+0xe2/0x130 [ 566.004661] ? bust_spinlocks+0xe0/0xe0 [ 566.008645] ? kasprintf+0xa2/0xc0 [ 566.012188] ? kvasprintf_const+0x190/0x190 [ 566.016511] ? graph_lock+0x170/0x170 [ 566.020324] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 566.025520] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 566.031066] hwsim_new_radio_nl+0x7b8/0xa60 [ 566.035390] ? nla_parse+0x358/0x4a0 [ 566.039114] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 566.044316] ? __netlink_ns_capable+0x100/0x130 [ 566.048997] genl_family_rcv_msg+0x889/0x1120 [ 566.053498] ? genl_rcv+0x40/0x40 [ 566.056955] ? lock_downgrade+0x8e0/0x8e0 [ 566.061111] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 566.066139] ? kasan_check_read+0x11/0x20 [ 566.070294] ? lock_acquire+0x1dc/0x520 [ 566.074273] ? genl_rcv+0x19/0x40 [ 566.077744] genl_rcv_msg+0xc6/0x170 [ 566.081464] netlink_rcv_skb+0x172/0x440 [ 566.085530] ? genl_family_rcv_msg+0x1120/0x1120 [ 566.090291] ? netlink_ack+0xbc0/0xbc0 2018/06/06 15:00:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0x30000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0xf0]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0xf]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 566.094187] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 566.099394] ? netlink_skb_destructor+0x210/0x210 [ 566.104247] genl_rcv+0x28/0x40 [ 566.107532] netlink_unicast+0x58b/0x740 [ 566.111609] ? netlink_attachskb+0x970/0x970 [ 566.116023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.121570] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 566.126591] ? security_netlink_send+0x88/0xb0 [ 566.131172] netlink_sendmsg+0x9f0/0xfa0 [ 566.135223] ? netlink_unicast+0x740/0x740 [ 566.139455] ? security_socket_sendmsg+0x94/0xc0 [ 566.144213] ? netlink_unicast+0x740/0x740 [ 566.148433] sock_sendmsg+0xd5/0x120 [ 566.152128] ___sys_sendmsg+0x805/0x940 [ 566.156096] ? copy_msghdr_from_user+0x560/0x560 [ 566.160846] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 566.166367] ? proc_fail_nth_write+0x96/0x1f0 [ 566.170843] ? __fget_light+0x2ef/0x430 [ 566.174808] ? fget_raw+0x20/0x20 [ 566.178250] ? find_held_lock+0x36/0x1c0 [ 566.182294] ? kasan_check_write+0x14/0x20 [ 566.186514] ? wait_for_completion+0x870/0x870 [ 566.191110] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 566.196652] ? sockfd_lookup_light+0xc5/0x160 [ 566.201152] __sys_sendmsg+0x115/0x270 [ 566.205040] ? __ia32_sys_shutdown+0x80/0x80 [ 566.209435] ? __sb_end_write+0xac/0xe0 [ 566.213394] ? fput+0x130/0x1a0 [ 566.216657] ? ksys_write+0x1a6/0x250 [ 566.220447] __x64_sys_sendmsg+0x78/0xb0 [ 566.224500] do_syscall_64+0x1b1/0x800 [ 566.228371] ? finish_task_switch+0x1ca/0x840 [ 566.232860] ? syscall_return_slowpath+0x5c0/0x5c0 [ 566.237780] ? syscall_return_slowpath+0x30f/0x5c0 [ 566.242707] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 566.248062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 566.252897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 566.258065] RIP: 0033:0x455a09 [ 566.261242] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 566.268937] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 566.276186] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 566.283444] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 566.290704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/06/06 15:00:43 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x3000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x4) 2018/06/06 15:00:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0xfffffff0]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:43 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000900}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0xc3ff0000}}], 0x1f9, 0x0) 2018/06/06 15:00:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x0, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:43 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:43 executing program 3 (fault-call:1 fault-nth:39): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 566.297952] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000026 2018/06/06 15:00:43 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0xa00, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0xed070000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 566.459541] FAULT_INJECTION: forcing a failure. [ 566.459541] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 566.471974] CPU: 1 PID: 14914 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 566.479262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.488621] Call Trace: [ 566.491223] dump_stack+0x1b9/0x294 [ 566.494865] ? dump_stack_print_info.cold.2+0x52/0x52 [ 566.500076] ? pick_next_task_fair+0x97c/0x1780 [ 566.504762] should_fail.cold.4+0xa/0x1a 2018/06/06 15:00:43 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x500, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0x3000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 566.508838] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 566.513971] ? lock_downgrade+0x8e0/0x8e0 [ 566.518132] ? finish_task_switch+0x182/0x840 [ 566.522641] ? mark_held_locks+0xc9/0x160 [ 566.526800] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 566.531481] ? _raw_spin_unlock_irq+0x27/0x70 [ 566.535995] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 566.541022] ? trace_hardirqs_on+0xd/0x10 [ 566.545178] ? _raw_spin_unlock_irq+0x27/0x70 [ 566.549689] ? finish_task_switch+0x1ca/0x840 [ 566.554200] ? preempt_notifier_register+0x1e0/0x1e0 2018/06/06 15:00:43 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x100000000000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:43 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0xa000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 566.559337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.564883] ? should_fail+0x21b/0xbcd [ 566.568787] __alloc_pages_nodemask+0x34e/0xd70 [ 566.573472] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 566.578504] ? __sched_text_start+0x8/0x8 [ 566.582657] ? find_held_lock+0x36/0x1c0 [ 566.586731] ? __lock_is_held+0xb5/0x140 [ 566.590809] ? check_same_owner+0x320/0x320 [ 566.595138] cache_grow_begin+0x6e/0x6c0 [ 566.599218] kmem_cache_alloc_trace+0x6a5/0x780 [ 566.603904] ? trace_hardirqs_on+0xd/0x10 2018/06/06 15:00:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0xf000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:43 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0xfe800000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 566.608163] ? device_create_file+0x1e0/0x1e0 [ 566.612674] kobject_uevent_env+0x20f/0x1110 [ 566.617086] ? _raw_spin_unlock_irq+0x27/0x70 [ 566.621608] kobject_uevent+0x1f/0x30 [ 566.625428] driver_bound+0x1a3/0x220 [ 566.629245] device_bind_driver+0xb3/0xd0 [ 566.633405] mac80211_hwsim_new_radio+0x451/0x33b0 [ 566.638336] ? string+0x21d/0x2c0 [ 566.641796] ? widen_string+0x2d0/0x2d0 [ 566.645782] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 566.651935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 566.657476] ? vsnprintf+0x242/0x1b40 [ 566.661283] ? pointer+0xa10/0xa10 [ 566.664825] ? rcu_note_context_switch+0x710/0x710 [ 566.669758] ? __lock_acquire+0x7f5/0x5140 [ 566.673993] ? kasprintf+0xa2/0xc0 [ 566.677546] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 566.682567] ? kvasprintf+0xe2/0x130 [ 566.686284] ? bust_spinlocks+0xe0/0xe0 [ 566.690267] ? kasprintf+0xa2/0xc0 [ 566.693806] ? kvasprintf_const+0x190/0x190 [ 566.698125] ? graph_lock+0x170/0x170 [ 566.701934] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 566.707134] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 566.712687] hwsim_new_radio_nl+0x7b8/0xa60 [ 566.717015] ? nla_parse+0x358/0x4a0 [ 566.720734] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 566.725938] ? __netlink_ns_capable+0x100/0x130 [ 566.730619] genl_family_rcv_msg+0x889/0x1120 [ 566.735137] ? genl_rcv+0x40/0x40 [ 566.738599] ? lock_downgrade+0x8e0/0x8e0 [ 566.742755] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 566.747781] ? kasan_check_read+0x11/0x20 [ 566.751939] ? lock_acquire+0x1dc/0x520 [ 566.755917] ? genl_rcv+0x19/0x40 [ 566.759386] genl_rcv_msg+0xc6/0x170 [ 566.763111] netlink_rcv_skb+0x172/0x440 [ 566.767175] ? genl_family_rcv_msg+0x1120/0x1120 [ 566.771939] ? netlink_ack+0xbc0/0xbc0 [ 566.775830] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 566.781027] ? netlink_skb_destructor+0x210/0x210 [ 566.785879] genl_rcv+0x28/0x40 [ 566.789164] netlink_unicast+0x58b/0x740 [ 566.793237] ? netlink_attachskb+0x970/0x970 [ 566.797745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.803290] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 566.808308] ? security_netlink_send+0x88/0xb0 [ 566.812896] netlink_sendmsg+0x9f0/0xfa0 [ 566.816966] ? netlink_unicast+0x740/0x740 [ 566.821212] ? security_socket_sendmsg+0x94/0xc0 [ 566.825968] ? netlink_unicast+0x740/0x740 [ 566.830206] sock_sendmsg+0xd5/0x120 [ 566.833927] ___sys_sendmsg+0x805/0x940 [ 566.837914] ? copy_msghdr_from_user+0x560/0x560 [ 566.842690] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 566.848236] ? proc_fail_nth_write+0x96/0x1f0 [ 566.852736] ? __fget_light+0x2ef/0x430 [ 566.856714] ? fget_raw+0x20/0x20 [ 566.860170] ? find_held_lock+0x36/0x1c0 [ 566.864239] ? kasan_check_write+0x14/0x20 [ 566.868484] ? wait_for_completion+0x870/0x870 [ 566.873082] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 566.878621] ? sockfd_lookup_light+0xc5/0x160 [ 566.883124] __sys_sendmsg+0x115/0x270 [ 566.887103] ? __ia32_sys_shutdown+0x80/0x80 [ 566.891524] ? __sb_end_write+0xac/0xe0 [ 566.895505] ? fput+0x130/0x1a0 [ 566.898789] ? ksys_write+0x1a6/0x250 [ 566.902609] __x64_sys_sendmsg+0x78/0xb0 [ 566.906669] do_syscall_64+0x1b1/0x800 [ 566.910539] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 566.915365] ? syscall_return_slowpath+0x5c0/0x5c0 [ 566.920289] ? syscall_return_slowpath+0x30f/0x5c0 [ 566.925204] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 566.930561] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 566.935402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 566.940576] RIP: 0033:0x455a09 [ 566.943753] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 566.951451] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 566.958703] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 566.965957] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 566.973220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 566.980475] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000027 2018/06/06 15:00:44 executing program 3 (fault-call:1 fault-nth:40): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:44 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x1000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0xed07]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:44 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b01000000000a}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x0, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x40000}}], 0x1f9, 0x0) 2018/06/06 15:00:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x9) 2018/06/06 15:00:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0xffffff9e]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 567.106162] FAULT_INJECTION: forcing a failure. [ 567.106162] name failslab, interval 1, probability 0, space 0, times 0 [ 567.117673] CPU: 0 PID: 14953 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 567.124953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.134309] Call Trace: [ 567.136908] dump_stack+0x1b9/0x294 [ 567.140548] ? dump_stack_print_info.cold.2+0x52/0x52 [ 567.145754] ? kasan_check_write+0x14/0x20 [ 567.150000] ? finish_task_switch+0x28b/0x840 2018/06/06 15:00:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x0, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277696b60cc1ff625ee877cbfcdde9486e76981ef31") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:44 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x3f00, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 567.154515] should_fail.cold.4+0xa/0x1a [ 567.158604] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 567.163724] ? __schedule+0x809/0x1e30 [ 567.167633] ? __sched_text_start+0x8/0x8 [ 567.171789] ? find_held_lock+0x36/0x1c0 [ 567.175860] ? __lock_is_held+0xb5/0x140 [ 567.179943] ? check_same_owner+0x320/0x320 [ 567.184284] __should_failslab+0x124/0x180 [ 567.188536] should_failslab+0x9/0x14 [ 567.192346] __kmalloc+0x2c8/0x760 [ 567.195901] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 567.201096] ? ieee80211_register_hw+0xc0b/0x35d0 2018/06/06 15:00:44 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000035}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 567.205956] ieee80211_register_hw+0xc0b/0x35d0 [ 567.210643] ? rcu_is_watching+0x71/0x140 [ 567.214800] ? ieee80211_free_ack_frame+0x60/0x60 [ 567.219659] mac80211_hwsim_new_radio+0x1da2/0x33b0 [ 567.224693] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 567.230848] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 567.236391] ? vsnprintf+0x242/0x1b40 [ 567.240206] ? pointer+0xa10/0xa10 [ 567.243753] ? __lock_acquire+0x7f5/0x5140 [ 567.248004] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 567.253028] ? kvasprintf+0xe2/0x130 2018/06/06 15:00:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 567.256753] ? bust_spinlocks+0xe0/0xe0 [ 567.260743] ? kasprintf+0xa2/0xc0 [ 567.264293] ? kvasprintf_const+0x190/0x190 [ 567.268620] ? graph_lock+0x170/0x170 [ 567.272434] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 567.277636] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 567.283190] hwsim_new_radio_nl+0x7b8/0xa60 [ 567.287513] ? nla_parse+0x358/0x4a0 [ 567.291236] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 567.296437] ? __netlink_ns_capable+0x100/0x130 [ 567.301126] genl_family_rcv_msg+0x889/0x1120 2018/06/06 15:00:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0x3000000000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 567.305634] ? genl_rcv+0x40/0x40 [ 567.309093] ? lock_downgrade+0x8e0/0x8e0 [ 567.313250] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 567.318276] ? kasan_check_read+0x11/0x20 [ 567.322434] ? lock_acquire+0x1dc/0x520 [ 567.326410] ? genl_rcv+0x19/0x40 [ 567.329877] genl_rcv_msg+0xc6/0x170 [ 567.333595] netlink_rcv_skb+0x172/0x440 [ 567.337657] ? genl_family_rcv_msg+0x1120/0x1120 [ 567.342417] ? netlink_ack+0xbc0/0xbc0 [ 567.346311] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 567.351509] ? netlink_skb_destructor+0x210/0x210 [ 567.356362] genl_rcv+0x28/0x40 [ 567.359751] netlink_unicast+0x58b/0x740 [ 567.363825] ? netlink_attachskb+0x970/0x970 [ 567.368244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.373794] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 567.378818] ? security_netlink_send+0x88/0xb0 [ 567.383409] netlink_sendmsg+0x9f0/0xfa0 [ 567.387482] ? netlink_unicast+0x740/0x740 [ 567.391728] ? security_socket_sendmsg+0x94/0xc0 [ 567.396583] ? netlink_unicast+0x740/0x740 [ 567.400827] sock_sendmsg+0xd5/0x120 [ 567.404552] ___sys_sendmsg+0x805/0x940 [ 567.408538] ? copy_msghdr_from_user+0x560/0x560 [ 567.413319] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 567.418863] ? proc_fail_nth_write+0x96/0x1f0 [ 567.423372] ? __fget_light+0x2ef/0x430 [ 567.427366] ? fget_raw+0x20/0x20 [ 567.430825] ? find_held_lock+0x36/0x1c0 [ 567.434901] ? kasan_check_write+0x14/0x20 [ 567.439242] ? wait_for_completion+0x870/0x870 [ 567.443857] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 567.449403] ? sockfd_lookup_light+0xc5/0x160 [ 567.453907] __sys_sendmsg+0x115/0x270 [ 567.457804] ? __ia32_sys_shutdown+0x80/0x80 [ 567.462217] ? __sb_end_write+0xac/0xe0 [ 567.466197] ? fput+0x130/0x1a0 [ 567.469477] ? ksys_write+0x1a6/0x250 [ 567.473294] __x64_sys_sendmsg+0x78/0xb0 [ 567.477364] do_syscall_64+0x1b1/0x800 [ 567.481256] ? finish_task_switch+0x1ca/0x840 [ 567.485757] ? syscall_return_slowpath+0x5c0/0x5c0 [ 567.490692] ? syscall_return_slowpath+0x30f/0x5c0 [ 567.495630] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 567.501004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 567.505863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.511056] RIP: 0033:0x455a09 [ 567.514242] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 567.521953] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 567.529224] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 567.536504] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 567.543777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 567.551048] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000028 2018/06/06 15:00:44 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x8, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)) socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:44 executing program 3 (fault-call:1 fault-nth:41): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0xffffff7f}}], 0x1f9, 0x0) 2018/06/06 15:00:44 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010015000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0xffffff97) 2018/06/06 15:00:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0xf0ffffffffffff]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)) socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:44 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x400000000000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)) socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:44 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0xfc, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 567.728439] FAULT_INJECTION: forcing a failure. [ 567.728439] name failslab, interval 1, probability 0, space 0, times 0 [ 567.739823] CPU: 1 PID: 15028 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 567.747102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.756460] Call Trace: [ 567.759059] dump_stack+0x1b9/0x294 [ 567.762698] ? dump_stack_print_info.cold.2+0x52/0x52 [ 567.767904] ? lock_downgrade+0x8e0/0x8e0 [ 567.772062] ? lock_downgrade+0x8e0/0x8e0 [ 567.776226] should_fail.cold.4+0xa/0x1a [ 567.780305] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 567.785421] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 567.790456] ? graph_lock+0x170/0x170 [ 567.794265] ? __debug_object_init+0x57f/0x12c0 [ 567.798947] ? find_held_lock+0x36/0x1c0 [ 567.803020] ? __lock_is_held+0xb5/0x140 [ 567.807101] ? check_same_owner+0x320/0x320 [ 567.811436] ? rcu_note_context_switch+0x710/0x710 [ 567.816373] __should_failslab+0x124/0x180 [ 567.820616] should_failslab+0x9/0x14 [ 567.824422] __kmalloc+0x2c8/0x760 2018/06/06 15:00:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:44 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0xfe80000000000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 567.827974] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 567.833181] ? ieee80211_register_hw+0xc0b/0x35d0 [ 567.838032] ieee80211_register_hw+0xc0b/0x35d0 [ 567.842712] ? rcu_is_watching+0x71/0x140 [ 567.846862] ? ieee80211_free_ack_frame+0x60/0x60 [ 567.851724] mac80211_hwsim_new_radio+0x1da2/0x33b0 [ 567.856763] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 567.862919] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 567.868461] ? vsnprintf+0x242/0x1b40 [ 567.872274] ? pointer+0xa10/0xa10 2018/06/06 15:00:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0x9effffff]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:44 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000003c00}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) [ 567.875820] ? __lock_acquire+0x7f5/0x5140 [ 567.880068] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 567.885089] ? kvasprintf+0xe2/0x130 [ 567.888809] ? bust_spinlocks+0xe0/0xe0 [ 567.892793] ? kasprintf+0xa2/0xc0 [ 567.896340] ? kvasprintf_const+0x190/0x190 [ 567.900662] ? graph_lock+0x170/0x170 [ 567.904466] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 567.909843] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 567.915390] hwsim_new_radio_nl+0x7b8/0xa60 [ 567.919713] ? nla_parse+0x358/0x4a0 [ 567.923430] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 567.928622] ? __netlink_ns_capable+0x100/0x130 [ 567.933302] genl_family_rcv_msg+0x889/0x1120 [ 567.937807] ? genl_rcv+0x40/0x40 [ 567.941528] ? lock_downgrade+0x8e0/0x8e0 [ 567.945682] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 567.950709] ? kasan_check_read+0x11/0x20 [ 567.954858] ? lock_acquire+0x1dc/0x520 [ 567.958833] ? genl_rcv+0x19/0x40 [ 567.962309] genl_rcv_msg+0xc6/0x170 [ 567.966032] netlink_rcv_skb+0x172/0x440 [ 567.970098] ? genl_family_rcv_msg+0x1120/0x1120 [ 567.974858] ? netlink_ack+0xbc0/0xbc0 [ 567.978749] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 567.983951] ? netlink_skb_destructor+0x210/0x210 [ 567.988807] genl_rcv+0x28/0x40 [ 567.992089] netlink_unicast+0x58b/0x740 [ 567.996159] ? netlink_attachskb+0x970/0x970 [ 568.000581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 568.006124] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 568.011143] ? security_netlink_send+0x88/0xb0 [ 568.015730] netlink_sendmsg+0x9f0/0xfa0 [ 568.019798] ? netlink_unicast+0x740/0x740 [ 568.024041] ? security_socket_sendmsg+0x94/0xc0 [ 568.028803] ? netlink_unicast+0x740/0x740 [ 568.033052] sock_sendmsg+0xd5/0x120 [ 568.036770] ___sys_sendmsg+0x805/0x940 [ 568.040754] ? copy_msghdr_from_user+0x560/0x560 [ 568.045522] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 568.051066] ? proc_fail_nth_write+0x96/0x1f0 [ 568.055576] ? __fget_light+0x2ef/0x430 [ 568.059555] ? fget_raw+0x20/0x20 [ 568.063019] ? find_held_lock+0x36/0x1c0 [ 568.067095] ? kasan_check_write+0x14/0x20 [ 568.071344] ? wait_for_completion+0x870/0x870 [ 568.075943] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 568.081483] ? sockfd_lookup_light+0xc5/0x160 [ 568.085983] __sys_sendmsg+0x115/0x270 [ 568.089880] ? __ia32_sys_shutdown+0x80/0x80 [ 568.094293] ? __sb_end_write+0xac/0xe0 [ 568.098284] ? fput+0x130/0x1a0 [ 568.101574] ? ksys_write+0x1a6/0x250 [ 568.105396] __x64_sys_sendmsg+0x78/0xb0 [ 568.109468] do_syscall_64+0x1b1/0x800 [ 568.113371] ? finish_task_switch+0x1ca/0x840 [ 568.117876] ? syscall_return_slowpath+0x5c0/0x5c0 [ 568.122898] ? syscall_return_slowpath+0x30f/0x5c0 [ 568.128290] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 568.133665] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 568.138509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.143678] RIP: 0033:0x455a09 [ 568.146851] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 568.154557] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 568.161819] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 568.169075] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/06/06 15:00:45 executing program 3 (fault-call:1 fault-nth:42): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0xffc3}}], 0x1f9, 0x0) 2018/06/06 15:00:45 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x900, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0x2000000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:45 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000020c66}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x200000000000000) [ 568.176327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 568.183583] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000029 [ 568.267635] FAULT_INJECTION: forcing a failure. [ 568.267635] name failslab, interval 1, probability 0, space 0, times 0 [ 568.279018] CPU: 0 PID: 15081 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 568.286305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.295662] Call Trace: [ 568.298257] dump_stack+0x1b9/0x294 [ 568.301895] ? dump_stack_print_info.cold.2+0x52/0x52 [ 568.307103] ? finish_task_switch+0x1ca/0x840 [ 568.311611] ? finish_task_switch+0x182/0x840 [ 568.316119] should_fail.cold.4+0xa/0x1a [ 568.320197] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 568.325317] ? __schedule+0x809/0x1e30 [ 568.329223] ? __sched_text_start+0x8/0x8 [ 568.333383] ? find_held_lock+0x36/0x1c0 [ 568.337460] ? __lock_is_held+0xb5/0x140 [ 568.341545] ? check_same_owner+0x320/0x320 [ 568.345883] __should_failslab+0x124/0x180 [ 568.350126] should_failslab+0x9/0x14 [ 568.353935] __kmalloc+0x2c8/0x760 [ 568.357489] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 568.362688] ? ieee80211_register_hw+0xc0b/0x35d0 [ 568.367546] ieee80211_register_hw+0xc0b/0x35d0 [ 568.372294] ? rcu_is_watching+0x71/0x140 [ 568.376454] ? ieee80211_free_ack_frame+0x60/0x60 [ 568.381321] mac80211_hwsim_new_radio+0x1da2/0x33b0 [ 568.386363] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 568.392523] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 568.398074] ? vsnprintf+0x242/0x1b40 [ 568.402068] ? pointer+0xa10/0xa10 [ 568.405619] ? __lock_acquire+0x7f5/0x5140 [ 568.409869] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 568.414894] ? kvasprintf+0xe2/0x130 [ 568.418617] ? bust_spinlocks+0xe0/0xe0 [ 568.422607] ? kasprintf+0xa2/0xc0 [ 568.426154] ? kvasprintf_const+0x190/0x190 [ 568.430480] ? graph_lock+0x170/0x170 [ 568.434289] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 568.439500] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 568.445054] hwsim_new_radio_nl+0x7b8/0xa60 [ 568.449377] ? nla_parse+0x358/0x4a0 [ 568.453094] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 568.458294] ? __netlink_ns_capable+0x100/0x130 [ 568.462970] genl_family_rcv_msg+0x889/0x1120 2018/06/06 15:00:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0x7ed]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:45 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x7f000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb8") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:45 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b01000000002f}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:45 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x10, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb8") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="1494abfc0c5e9300ff6162d1cc9f67f14e2a563fe75b74329bf4ffffe200000d682816df7ccfb579f435150f5f8f22d300000100b28d4085f9af7ec3324bda311e300b1fdf58c7fb03e0b6b4574436c1c1570cbffe000000000000000000000015ae37dc27b96ae1746b0efda504f8b033b13883b613b227d93f59e358821d6616648039d1e55e006956bb58f94bbc71af94d7a41a1ea986f6f82c5a08595c8e9062748b60e43e341695ea493f9d377b02e4329e3bd22b0515ee2269e381792527a17b6c2df6505e71653d41cb2c573c7ab1658435c177e7571e15fd0def1a2cd95f10b0935dc1db53f9491e9837c66c6dd4a5de3f6626ee211fa56e98ab3482942835fedd4aae4d266c9700684b7350d1c114dbda219766e2b4133e5d207cab9c73ed7c8508c871c7ebc50e86da6b866f736a9d3260478116a5de72def3cbda5ef51970d7113dda72610000000000000000000000000000"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) [ 568.467477] ? genl_rcv+0x40/0x40 [ 568.470938] ? lock_downgrade+0x8e0/0x8e0 [ 568.475093] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 568.480120] ? kasan_check_read+0x11/0x20 [ 568.484270] ? lock_acquire+0x1dc/0x520 [ 568.488248] ? genl_rcv+0x19/0x40 [ 568.491721] genl_rcv_msg+0xc6/0x170 [ 568.495446] netlink_rcv_skb+0x172/0x440 [ 568.499514] ? genl_family_rcv_msg+0x1120/0x1120 [ 568.504360] ? netlink_ack+0xbc0/0xbc0 [ 568.508256] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 568.513454] ? netlink_skb_destructor+0x210/0x210 2018/06/06 15:00:45 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b01000000002c}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 568.518310] genl_rcv+0x28/0x40 [ 568.521590] netlink_unicast+0x58b/0x740 [ 568.525657] ? netlink_attachskb+0x970/0x970 [ 568.530084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 568.535628] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 568.540646] ? security_netlink_send+0x88/0xb0 [ 568.545234] netlink_sendmsg+0x9f0/0xfa0 [ 568.549308] ? netlink_unicast+0x740/0x740 [ 568.553553] ? security_socket_sendmsg+0x94/0xc0 [ 568.558314] ? netlink_unicast+0x740/0x740 [ 568.562556] sock_sendmsg+0xd5/0x120 [ 568.566270] ___sys_sendmsg+0x805/0x940 [ 568.570250] ? copy_msghdr_from_user+0x560/0x560 [ 568.575012] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 568.580649] ? proc_fail_nth_write+0x96/0x1f0 [ 568.585147] ? __fget_light+0x2ef/0x430 [ 568.589128] ? fget_raw+0x20/0x20 [ 568.592582] ? find_held_lock+0x36/0x1c0 [ 568.596655] ? kasan_check_write+0x14/0x20 [ 568.600899] ? wait_for_completion+0x870/0x870 [ 568.605496] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 568.611043] ? sockfd_lookup_light+0xc5/0x160 [ 568.615548] __sys_sendmsg+0x115/0x270 [ 568.619441] ? __ia32_sys_shutdown+0x80/0x80 [ 568.623853] ? __sb_end_write+0xac/0xe0 [ 568.627837] ? fput+0x130/0x1a0 [ 568.631125] ? ksys_write+0x1a6/0x250 [ 568.634949] __x64_sys_sendmsg+0x78/0xb0 [ 568.639016] do_syscall_64+0x1b1/0x800 [ 568.642919] ? finish_task_switch+0x1ca/0x840 [ 568.647428] ? syscall_return_slowpath+0x5c0/0x5c0 [ 568.652362] ? syscall_return_slowpath+0x30f/0x5c0 [ 568.657300] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 568.662674] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 568.667536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.672727] RIP: 0033:0x455a09 [ 568.675917] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 568.683629] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 568.690902] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 568.698173] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 568.705444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 568.712719] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000002a 2018/06/06 15:00:45 executing program 3 (fault-call:1 fault-nth:43): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:45 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) 2018/06/06 15:00:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb8") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0x3]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x2000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2, 0x80000000000000a, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0xa}]}, 0x38}, 0x1}, 0x80060000000000) 2018/06/06 15:00:45 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000020c6e}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) 2018/06/06 15:00:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:45 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0), 0x0, 0x500000000000000}}], 0x1f9, 0x0) 2018/06/06 15:00:45 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0xa, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 568.857720] FAULT_INJECTION: forcing a failure. [ 568.857720] name failslab, interval 1, probability 0, space 0, times 0 [ 568.869350] CPU: 0 PID: 15137 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 568.876632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.885988] Call Trace: [ 568.888593] dump_stack+0x1b9/0x294 [ 568.892233] ? dump_stack_print_info.cold.2+0x52/0x52 [ 568.897439] ? mutex_trylock+0x2a0/0x2a0 [ 568.901512] should_fail.cold.4+0xa/0x1a 2018/06/06 15:00:45 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @loopback}, &(0x7f0000000140)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={"6c6f0000000009000000f24d9bbded1f", r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000380)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}) 2018/06/06 15:00:45 executing program 7: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010025000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0xc, 0x11, [@typed={0x8, 0x0, @fd}]}]}, 0x20}, 0x1}, 0x0) [ 568.905578] ? save_stack+0x43/0xd0 [ 568.909214] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 568.914326] ? print_usage_bug+0xc0/0xc0 [ 568.918391] ? genl_rcv+0x28/0x40 [ 568.921846] ? netlink_unicast+0x58b/0x740 [ 568.926083] ? netlink_sendmsg+0x9f0/0xfa0 [ 568.930323] ? graph_lock+0x170/0x170 [ 568.934132] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.939506] ? find_held_lock+0x36/0x1c0 [ 568.943578] ? find_held_lock+0x36/0x1c0 [ 568.947649] ? __lock_is_held+0xb5/0x140 [ 568.951728] ? check_same_owner+0x320/0x320 2018/06/06 15:00:46 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4000000000000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 568.956064] ? rcu_note_context_switch+0x710/0x710 [ 568.961000] __should_failslab+0x124/0x180 [ 568.965247] should_failslab+0x9/0x14 [ 568.969070] kmem_cache_alloc_trace+0x2cb/0x780 [ 568.973749] ? kasan_check_write+0x14/0x20 [ 568.978001] ? do_raw_spin_lock+0xc1/0x200 [ 568.982254] get_device_parent.isra.27+0x298/0x5a0 [ 568.987194] device_add+0x2f1/0x16d0 [ 568.990914] ? __sched_text_start+0x8/0x8 [ 568.995071] ? device_private_init+0x230/0x230 [ 568.999661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/06/06 15:00:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000007c0)="0047fc019b254b992409700147bf914fa160efda639c6de12c131c865f630d312445603b52fc3c89d129bfc7a953684e8bea68d4b1fb502632c8d69150cb2d25ff0ebeb37d382aad4cf75a43e1323dfdbfcb5335a417f805") socket$inet6(0xa, 0x800, 0x99b) r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@l2, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000640)=0x4) socket$netlink(0x10, 0x3, 0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x800) pwritev(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)="89be8339", 0x4}], 0x1, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r2, 0x8906, &(0x7f0000000940)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000700)=0xfffffffffffffffd) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r2, 0x9, &(0x7f0000000c40)="dbc34f32f04d15fd67445fdbec4fd373f1804efb07309281f5eec657ea18442cf6c49562241dc3ce5894847422474c4bdf254ac5b112e50beb40d38b13d3bf07d0f29f1bce0a11ea9aa7fcf75b45a9f15c30c5cb9a1e67b911bad42d8aa0e819f7ebc065759dde3b0b55a500c66f1d10327fc34f14e9c6edb898fdbe4cf5f48c9e1a10759a517cae6dee11b277") socketpair$inet(0x2, 0x20000002, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000008c0)=0x14) read(r5, &(0x7f0000000380)=""/235, 0x4a) r7 = socket(0x400000000010, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x82cb, 0x9, 0x7, 0x3, 0x84}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000980)={0x0, 0x8}, &(0x7f0000000ac0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000d40)=@sack_info={r8, 0x5, 0x5}, &(0x7f0000000840)=0x1a) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000f80)=ANY=[@ANYRES32, @ANYBLOB="e7000000020467080000002e7135533f0000000000000044515db4e77ea253586f4514524ae56b6b9d5ce870d092528c5de1d430e06589edbf02b0429a49f737b12e17f83140953b15812896b727a09cd6d8914f7cdf7f0e116b3d62a2feb2ed47188150d0c1ce5e67acdb2c172724885d1b99a74ecf736aee10ef8da8611ea00941072569d4e11d3f8312fa0ee0c729f3b2f6179c791be9eabe535fb12f35a989aad8f93ab7e3ebf5e21a2778200f5ad896e70ba5894ff1834f289a5718a17082474023d969b648ae8ff7ac2197ae5e544327d25ce83419256764fea1b8d05d3ef300000000000000"], &(0x7f00000006c0)=0x2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r6, r3, 0x1, 0x1}, 0x10) write(r7, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r9, 0x1ff, 0x2000000}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000680)={'vlan0\x00', 0x20051}) getsockname$netlink(r7, &(0x7f0000000600), &(0x7f0000000900)=0xc) sendmsg$nl_route(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000c00)={&(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x3) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000740), &(0x7f0000000780)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @rand_addr}, &(0x7f0000000400)=0xc) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/06/06 15:00:46 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0xfffffffffffff000]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) 2018/06/06 15:00:46 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0xfc00000000000000, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000}, 0x1c) [ 569.005224] wiphy_register+0x182e/0x24e0 [ 569.009393] ? wiphy_unregister+0x12b0/0x12b0 [ 569.013895] ? rcu_read_lock_sched_held+0x108/0x120 [ 569.018916] ? __kmalloc+0x5f9/0x760 [ 569.022642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.028182] ? ieee80211_cs_list_valid+0x7c/0x440 [ 569.033034] ? ieee80211_register_hw+0xc0b/0x35d0 [ 569.037885] ieee80211_register_hw+0x13cd/0x35d0 [ 569.042738] ? rcu_is_watching+0x71/0x140 [ 569.046886] ? ieee80211_free_ack_frame+0x60/0x60 [ 569.051744] mac80211_hwsim_new_radio+0x1da2/0x33b0 [ 569.056790] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 569.062938] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 569.068479] ? vsnprintf+0x242/0x1b40 [ 569.072289] ? pointer+0xa10/0xa10 [ 569.075835] ? __lock_acquire+0x7f5/0x5140 [ 569.080081] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 569.085106] ? kvasprintf+0xe2/0x130 [ 569.088825] ? bust_spinlocks+0xe0/0xe0 [ 569.092818] ? kasprintf+0xa2/0xc0 [ 569.096375] ? kvasprintf_const+0x190/0x190 [ 569.100698] ? graph_lock+0x170/0x170 2018/06/06 15:00:46 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000c80)={&(0x7f0000002480)=@polexpire={0xc0, 0x1b, 0x525, 0x0, 0x0, {{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@dev={0xfe, 0x80, [0x0, 0x2]}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}}}, 0xc0}, 0x1}, 0x0) [ 569.104509] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 569.109708] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 569.115259] hwsim_new_radio_nl+0x7b8/0xa60 [ 569.119675] ? nla_parse+0x358/0x4a0 [ 569.123394] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 569.128596] ? __netlink_ns_capable+0x100/0x130 [ 569.133276] genl_family_rcv_msg+0x889/0x1120 [ 569.137785] ? genl_rcv+0x40/0x40 [ 569.141246] ? lock_downgrade+0x8e0/0x8e0 [ 569.145400] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 569.150422] ? kasan_check_read+0x11/0x20 [ 569.154578] ? lock_acquire+0x1dc/0x520 [ 569.158559] ? genl_rcv+0x19/0x40 [ 569.162053] genl_rcv_msg+0xc6/0x170 [ 569.165780] netlink_rcv_skb+0x172/0x440 [ 569.169848] ? genl_family_rcv_msg+0x1120/0x1120 [ 569.174604] ? netlink_ack+0xbc0/0xbc0 [ 569.178497] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 569.183695] ? netlink_skb_destructor+0x210/0x210 [ 569.188546] genl_rcv+0x28/0x40 [ 569.191829] netlink_unicast+0x58b/0x740 [ 569.195898] ? netlink_attachskb+0x970/0x970 [ 569.200311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.205855] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 569.210878] ? security_netlink_send+0x88/0xb0 [ 569.215468] netlink_sendmsg+0x9f0/0xfa0 [ 569.219537] ? netlink_unicast+0x740/0x740 [ 569.223781] ? security_socket_sendmsg+0x94/0xc0 [ 569.228627] ? netlink_unicast+0x740/0x740 [ 569.232871] sock_sendmsg+0xd5/0x120 [ 569.236591] ___sys_sendmsg+0x805/0x940 [ 569.240577] ? copy_msghdr_from_user+0x560/0x560 [ 569.245437] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 569.250980] ? proc_fail_nth_write+0x96/0x1f0 [ 569.255477] ? __fget_light+0x2ef/0x430 [ 569.259433] ? fget_raw+0x20/0x20 [ 569.262867] ? find_held_lock+0x36/0x1c0 [ 569.266928] ? kasan_check_write+0x14/0x20 [ 569.271174] ? wait_for_completion+0x870/0x870 [ 569.275762] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 569.281286] ? sockfd_lookup_light+0xc5/0x160 [ 569.285771] __sys_sendmsg+0x115/0x270 [ 569.289655] ? __ia32_sys_shutdown+0x80/0x80 [ 569.294068] ? __sb_end_write+0xac/0xe0 [ 569.298049] ? fput+0x130/0x1a0 [ 569.301321] ? ksys_write+0x1a6/0x250 [ 569.305117] __x64_sys_sendmsg+0x78/0xb0 [ 569.309173] do_syscall_64+0x1b1/0x800 [ 569.313055] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 569.317898] ? syscall_return_slowpath+0x5c0/0x5c0 [ 569.322813] ? syscall_return_slowpath+0x30f/0x5c0 [ 569.327730] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 569.333098] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 569.337943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.343129] RIP: 0033:0x455a09 [ 569.346306] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 569.354020] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 569.361283] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 569.368537] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 569.375798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 569.383064] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000002b [ 569.392118] ------------[ cut here ]------------ [ 569.397497] kernfs: ns required in 'ieee80211' for 'phy112' [ 569.403461] WARNING: CPU: 1 PID: 15137 at fs/kernfs/dir.c:759 kernfs_add_one+0x406/0x4d0 [ 569.411691] Kernel panic - not syncing: panic_on_warn set ... [ 569.411691] [ 569.419055] CPU: 1 PID: 15137 Comm: syz-executor3 Not tainted 4.17.0-rc7+ #80 [ 569.426335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.435689] Call Trace: [ 569.438283] dump_stack+0x1b9/0x294 [ 569.441902] ? dump_stack_print_info.cold.2+0x52/0x52 [ 569.447087] ? kernfs_add_one+0x3f0/0x4d0 [ 569.451237] panic+0x22f/0x4de [ 569.454430] ? add_taint.cold.5+0x16/0x16 [ 569.458567] ? __warn.cold.8+0x148/0x1b3 [ 569.462611] ? kernfs_add_one+0x406/0x4d0 [ 569.466751] __warn.cold.8+0x163/0x1b3 [ 569.470632] ? kernfs_add_one+0x406/0x4d0 [ 569.474767] report_bug+0x252/0x2d0 [ 569.478393] do_error_trap+0x1de/0x490 [ 569.482277] ? math_error+0x420/0x420 [ 569.486067] ? vprintk_default+0x28/0x30 [ 569.490123] ? vprintk_func+0x81/0xe7 [ 569.493916] ? printk+0x9e/0xba [ 569.497202] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 569.502047] do_invalid_op+0x1b/0x20 [ 569.505761] invalid_op+0x14/0x20 [ 569.509206] RIP: 0010:kernfs_add_one+0x406/0x4d0 [ 569.513954] RSP: 0018:ffff8801b2926ce0 EFLAGS: 00010286 [ 569.519312] RAX: 000000000000002f RBX: ffffffff87d5d6e0 RCX: ffffc90005ca0000 [ 569.526578] RDX: 0000000000040000 RSI: ffffffff81610561 RDI: ffff8801b2926840 [ 569.533847] RBP: ffff8801b2926d20 R08: ffff8801b0e0a6c0 R09: 0000000000000006 [ 569.541105] R10: ffff8801b0e0a6c0 R11: 0000000000000000 R12: ffff8801d7605b80 [ 569.548362] R13: ffffffff885e19c0 R14: 0000000000000020 R15: 0000000000000000 [ 569.555640] ? vprintk_func+0x81/0xe7 [ 569.559436] kernfs_create_link+0x112/0x180 [ 569.563761] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 569.569032] sysfs_create_link+0x65/0xc0 [ 569.573093] device_add+0x7a0/0x16d0 [ 569.576811] ? device_private_init+0x230/0x230 [ 569.581376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.586913] wiphy_register+0x182e/0x24e0 [ 569.591062] ? wiphy_unregister+0x12b0/0x12b0 [ 569.595561] ? rcu_read_lock_sched_held+0x108/0x120 [ 569.600568] ? __kmalloc+0x5f9/0x760 [ 569.604265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.609796] ? ieee80211_cs_list_valid+0x7c/0x440 [ 569.614629] ? ieee80211_register_hw+0xc0b/0x35d0 [ 569.619466] ieee80211_register_hw+0x13cd/0x35d0 [ 569.624222] ? rcu_is_watching+0x71/0x140 [ 569.628358] ? ieee80211_free_ack_frame+0x60/0x60 [ 569.633196] mac80211_hwsim_new_radio+0x1da2/0x33b0 [ 569.638214] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 569.644367] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 569.649902] ? vsnprintf+0x242/0x1b40 [ 569.653688] ? pointer+0xa10/0xa10 [ 569.657217] ? __lock_acquire+0x7f5/0x5140 [ 569.661444] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 569.666447] ? kvasprintf+0xe2/0x130 [ 569.670145] ? bust_spinlocks+0xe0/0xe0 [ 569.674115] ? kasprintf+0xa2/0xc0 [ 569.677652] ? kvasprintf_const+0x190/0x190 [ 569.681975] ? graph_lock+0x170/0x170 [ 569.685778] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 569.690962] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 569.696505] hwsim_new_radio_nl+0x7b8/0xa60 [ 569.700833] ? nla_parse+0x358/0x4a0 [ 569.704541] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 569.709718] ? __netlink_ns_capable+0x100/0x130 [ 569.714376] genl_family_rcv_msg+0x889/0x1120 [ 569.718859] ? genl_rcv+0x40/0x40 [ 569.722308] ? lock_downgrade+0x8e0/0x8e0 [ 569.726454] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 569.731477] ? kasan_check_read+0x11/0x20 [ 569.735620] ? lock_acquire+0x1dc/0x520 [ 569.739587] ? genl_rcv+0x19/0x40 [ 569.743468] genl_rcv_msg+0xc6/0x170 [ 569.747168] netlink_rcv_skb+0x172/0x440 [ 569.751219] ? genl_family_rcv_msg+0x1120/0x1120 [ 569.755965] ? netlink_ack+0xbc0/0xbc0 [ 569.759842] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 569.765043] ? netlink_skb_destructor+0x210/0x210 [ 569.769881] genl_rcv+0x28/0x40 [ 569.773162] netlink_unicast+0x58b/0x740 [ 569.777219] ? netlink_attachskb+0x970/0x970 [ 569.781638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.787189] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 569.792216] ? security_netlink_send+0x88/0xb0 [ 569.796805] netlink_sendmsg+0x9f0/0xfa0 [ 569.800851] ? netlink_unicast+0x740/0x740 [ 569.805073] ? security_socket_sendmsg+0x94/0xc0 [ 569.809820] ? netlink_unicast+0x740/0x740 [ 569.814042] sock_sendmsg+0xd5/0x120 [ 569.817741] ___sys_sendmsg+0x805/0x940 [ 569.821713] ? copy_msghdr_from_user+0x560/0x560 [ 569.826464] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 569.831985] ? proc_fail_nth_write+0x96/0x1f0 [ 569.836480] ? __fget_light+0x2ef/0x430 [ 569.840437] ? fget_raw+0x20/0x20 [ 569.843873] ? find_held_lock+0x36/0x1c0 [ 569.847922] ? kasan_check_write+0x14/0x20 [ 569.852157] ? wait_for_completion+0x870/0x870 [ 569.856729] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 569.862254] ? sockfd_lookup_light+0xc5/0x160 [ 569.866747] __sys_sendmsg+0x115/0x270 [ 569.870637] ? __ia32_sys_shutdown+0x80/0x80 [ 569.875050] ? __sb_end_write+0xac/0xe0 [ 569.879036] ? fput+0x130/0x1a0 [ 569.882302] ? ksys_write+0x1a6/0x250 [ 569.886096] __x64_sys_sendmsg+0x78/0xb0 [ 569.890155] do_syscall_64+0x1b1/0x800 [ 569.894041] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 569.898880] ? syscall_return_slowpath+0x5c0/0x5c0 [ 569.903801] ? syscall_return_slowpath+0x30f/0x5c0 [ 569.908719] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 569.914082] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 569.918921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.924093] RIP: 0033:0x455a09 [ 569.927273] RSP: 002b:00007f9b3bca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 569.934973] RAX: ffffffffffffffda RBX: 00007f9b3bca26d4 RCX: 0000000000455a09 [ 569.942231] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 569.949495] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 569.956748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 569.964002] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000002b [ 569.972121] Dumping ftrace buffer: [ 569.975927] (ftrace buffer empty) [ 569.979619] Kernel Offset: disabled [ 569.983227] Rebooting in 86400 seconds..