[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 30.743821] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.485780] random: sshd: uninitialized urandom read (32 bytes read) [ 32.930400] random: sshd: uninitialized urandom read (32 bytes read) [ 34.136875] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.39' (ECDSA) to the list of known hosts. [ 39.674871] random: sshd: uninitialized urandom read (32 bytes read) 2018/05/16 16:30:16 fuzzer started 2018/05/16 16:30:17 dialing manager at 10.128.0.26:36755 [ 61.599529] can: request_module (can-proto-0) failed. [ 61.610828] can: request_module (can-proto-0) failed. 2018/05/16 16:30:40 kcov=true, comps=false 2018/05/16 16:30:44 executing program 0: modify_ldt$write(0x1, &(0x7f0000000000)={0x400, 0x20101800, 0x1000, 0x5, 0x1, 0xfffffffffffffff7, 0xef, 0x100, 0x7, 0x5}, 0x10) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) setns(r0, 0x22000000) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x10) fcntl$setlease(r0, 0x400, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000100)={0xfffffffffffffffb, 0x18, [0x9, 0x20af, 0x7fd1, 0x20, 0x8, 0x3]}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000140)=""/64, &(0x7f0000000180)=0x40) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000001c0)={'lo\x00', {0x2, 0x4e24, @broadcast=0xffffffff}}) ppoll(&(0x7f0000000200)=[{r0, 0x20}, {r0, 0x2000}, {r0, 0x280}, {r1, 0x4}, {r1}], 0x5, &(0x7f0000000240)={0x77359400}, &(0x7f0000000280), 0x8) socket$bt_hidp(0x1f, 0x3, 0x6) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x4800, 0x0) prctl$getreaper(0xf, &(0x7f0000000300)) lookup_dcookie(0x400, &(0x7f0000000340), 0x0) sendmsg$kcm(r1, &(0x7f0000000a40)={&(0x7f0000000380)=@nl=@kern={0x10, 0x0, 0x0, 0x80600}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000400)="f89d93db6af3dd71e3ecfada20601bf9102e5266d8cae74e616060226deb0bea785538a649f53d5275d1ecbf178696c0912f2453d9ff02a20a67177f6becca763b612f0b1673ec210c03e765676646bbcef95af65331749a78e2505af9fdbe68ed6a8d9ae00d1178e41a6fcb78d10a133d769718ecde08540229b4266123f3d008155bf49618105f108857e503373345df85076034f5539b7dc695120087ae0586333894d74386baef19b2592b9f9d1f23984198a50ec2b139", 0xb9}, {&(0x7f00000004c0)="8e9c3078c1cd3097bae104dc4dd9186868e14ed9ef3418fde6ed0e57dd62a0f7aa75d0e786248c566f89753b67a4b440fbfac6bd34d3eb273efa5ad45a190816191650953e66b3dd04c127915180b6c9ba1d2e9e53442fa30e20e18e52309916db8ed0ba7e47f177e77575c296691415f9ad", 0x72}, {&(0x7f0000000540)="bb1c8546aed3067086030639f6a82f2e84c52375", 0x14}, {&(0x7f0000000580)="d28a113e8b8f4be40782f7f2627954addc25b46399c9c16b1e764e5809fe72b051989a664c1c247cea4f7c6a7bf5006f84842f116242ce8c257dba54e7b3dd08893a824d9bac4847e20783a8163a25ddb9426cc8606e1491e2c1f0818df2a711ccf80d1a77aa261c168a6a580c2c402eb635105957e3a958837f818194309fe03e1b0feda7550571772456a55256d5e9b19d7d6384cf594397337e5b70366493fbf8dcb871936ccf8a1599f1eb27425b56c3b2ace48ec7f9768d654aa4d06fcd522b8b381d376314", 0xc8}, {&(0x7f0000000680)="24bab40b1064c1c6cec87826ba6782b4a83ea6d17058af28887342c0ed9ac1e9c3522fbf1c762b09bb3d770cfcf7ac3bc15d67abc4a460f46627c176540b3d1a1b094e96bd6e497ba7569859fa15f3c17b94863de4488a4e09a15d74ea228718867daa70d63d97a0f9fac66f8a1088d5c8d2a2213ff5add6f900fd215a5423e50fe9783a8cdd0a2b44ea651a1734115943e4d8215098cada4e", 0x99}, {&(0x7f0000000740)="c5d67bd79d8feadc8345d8856770ef6bd1a323da7f78d5e6a70c4e402f192ac8235b7a6296bcf819ac1d7ee9921d39a2cdb72864482d6b0047edeefa10ad06ba6ad39076dc130463d06b5ae79776a34d8394f37d8f9bcc2980fe86e211b2cc5f3db9669796b1fe8c3d757d8f046573aaabd3938dd16755516eed15410fa0e730e108084072e9c03c8cbe7faf8d8b286bec35be82480d4fa89e4891b193ae707e7307c3b4e00eac85a6a51e78ba0e6f3e", 0xb0}, {&(0x7f0000000800)="a5a17c81cee75358e4009afb5e20527628b34605aa38955dc6d7dd7ea2b73802badc065f77f592e54bff2e090e0fbf1c452543f24d1850f5456633da003af3ca8a83a7ab325f0e035e671c6acf79b0ff1fb7084ba55e2dcf2cbe7e3de83a7131f4f126f699e84f3396711fcdbd0c904e8d7257e9f3cae61790d36f407b6c97b080f81deaa4abf6b5a6b86ce0", 0x8c}, {&(0x7f00000008c0)="eb149a30e8f143a62625a63166d90d75cffbb552675ea0f60ae13852f4b1ed4d73a0aa7ee8e7a8f86aafb5bbf26b0ab008963ce51918452e2c1db4989ff10cc9af1d4bb7e376baab27579eb2be7224b78a24a03cbfce59f7a11fba788c46fcbcd7bbc0d31b39f976ebfa9f55634092fe456c7e501a2bb37df473f84a04f32ba6a1f09b3ec53635daf7b71aabcf627484dbb9f9dd5c85ac7ba9ed0dee5f50c062a5d3c4a39f588f3711081155bb6c811a0cb6c981e6a159f9ddf55539cc5a9b778fff08a49eb1f9c91c7d4cda0f73022874c6f2e1339dd2e24376597ac7209b5c2494b90d77", 0xe5}], 0x8, 0x0, 0x0, 0x4004014}, 0x800) r3 = syz_open_dev$sndctrl(&(0x7f0000000a80)='/dev/snd/controlC#\x00', 0x3, 0x18000) bind$ax25(r1, &(0x7f0000000ac0)={0x3, {"df38d3bfd2fc56"}, 0x7}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000b00), &(0x7f0000000b40)=0x30) splice(r2, &(0x7f0000000b80)=0x63, r1, &(0x7f0000000bc0), 0x80, 0x0) set_thread_area(&(0x7f0000000c00)={0x2, 0x1000, 0x4000, 0x0, 0x6, 0x7, 0x8, 0xff, 0x25e, 0x7fff}) socketpair(0xf, 0x6, 0x1000, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000c80)=""/171) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000d40)={'ip6tnl0\x00', {0x2, 0x4e24, @multicast2=0xe0000002}}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000d80)=[@in6={0xa, 0x4e23, 0x90, @local={0xfe, 0x80, [], 0xaa}, 0x31b9}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e21, 0x3, @empty, 0x5}, @in6={0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x13}, 0x3}, @in6={0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0x13}, 0x6}, @in={0x2, 0x4e24, @broadcast=0xffffffff}], 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r5, 0x0, 0x2a, &(0x7f0000000e40)={0x80000001, {{0x2, 0x4e21}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000f00)=""/252, &(0x7f0000001000)=0xfc) flock(r2, 0xf) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000001040)={0x0, 0x3, 0x30}, &(0x7f0000001080)=0xc) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f00000010c0)={r6, @in6={{0xa, 0x4e21, 0x40, @loopback={0x0, 0x1}, 0x7}}}, 0x84) 2018/05/16 16:30:44 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5072d35f, 0x20040) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000040)) setns(r0, 0xe000000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r1, 0xffffffff, 0x7, 0x8001, 0xf2a, 0x7}, 0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x7ff, 0x1, 0x907, 0x800, 0x746f, 0x3af, 0x1, r1}, &(0x7f0000000180)=0x20) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x28c02800}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x11c, r3, 0x324, 0x70bd25, 0x25dfdbfc, {0xe}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xb}}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x29715279}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}]}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1=0xe0000001}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10000}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x20000080}, 0x40000) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000400)={0xfffffffffffffe01, 0x3, 0x7, 'queue0\x00', 0x400}) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/snmp\x00') sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000200}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x50, r3, 0x4, 0x70bd28, 0x25dfdbfc, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xd35}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x101}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40011}, 0x40080) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000640)=@int=0x100000000, 0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000680)={r2, 0x200}, &(0x7f00000006c0)=0x8) pwritev(r0, &(0x7f0000001800)=[{&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="6cd731ff94b6cdbccfa4cebad8645bd063bc40888ce42bc223c9218f067442fa5e3a8dc89f217abe3d84b9ce3526259892d6dffc50709f22bbc8155fc68ce209d824f2253d96bda3f951b73b680d0fe1d8a3dc015c218a798a25e14f06b63c97925986831535952162993d3e12370915c21f43b71e920423eb3da9774f1753", 0x7f}, {&(0x7f0000001780)="5eaaf421b86869f2c465dc64408a22575c6229544251b4c0b392159de7f9e2f8fc8b7825faf89b53805c0b3aa61d3fd31796f9bd2ac28388ebe251eac60c3559a5", 0x41}], 0x3, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x7) r5 = fcntl$getown(r0, 0x9) ptrace$setsig(0x4203, r5, 0x80000001, &(0x7f0000001840)={0x19, 0x7, 0x9, 0xffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r4, 0x40086432, &(0x7f0000001880)=0xfc0) syz_open_dev$evdev(&(0x7f00000018c0)='/dev/input/event#\x00', 0x4, 0x2000) getsockopt$inet_dccp_buf(r0, 0x21, 0xc0, &(0x7f0000001900)=""/129, &(0x7f00000019c0)=0x81) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000001a00)={0x6, 0x1}) ptrace$getregset(0x4204, r5, 0x3, &(0x7f0000001a80)={&(0x7f0000001a40)=""/31, 0x1f}) ioctl$GIO_FONTX(r4, 0x4b6b, &(0x7f0000001ac0)=""/127) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000001b40)={@rand_addr, @loopback}, &(0x7f0000001b80)=0x8) lsetxattr(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)=@known='trusted.syz\x00', &(0x7f0000001c40)='$%\x00', 0x3, 0x1) ioctl$TIOCNXCL(r4, 0x540d) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000001c80)={'bridge_slave_1\x00', 0x2}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000001cc0)={0x2, 0x9}) syz_open_dev$mice(&(0x7f0000001d00)='/dev/input/mice\x00', 0x0, 0x0) 2018/05/16 16:30:44 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x1) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000080)=0x14) bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r1}, 0x10) accept$packet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000140)=0x14) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000011c0)=@broute={'broute\x00', 0x20, 0x5, 0xff0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x6, 0x22f8, 'bridge_slave_0\x00', 'bond0\x00', 'ipddp0\x00', 'veth1\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1b}, [0xff, 0xff, 0xe8643f051bd4f8d3, 0xff, 0xff], @random="d269ac154473", [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xf8, 0x128, 0x170, [@ip={'ip\x00', 0x20, {{@local={0xac, 0x14, 0x14, 0xaa}, @empty, 0xff000000, 0xffffffff, 0x0, 0x16, 0x9, 0x0, 0x4e24, 0x4e20, 0x4e21, 0x4e20}}}, @mark_m={'mark_m\x00', 0x18, {{0x9, 0xffffffff, 0x2, 0x2}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x1ff}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"8c230a3f82b0792f01328ccb7825fbb40d19d8de52722ddd8ebfd4a5d0fb"}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x21, 0xe8e7, 'team_slave_0\x00', 'nr0\x00', 'veth0_to_team\x00', 'veth0_to_team\x00', @empty, [0xff, 0x0, 0xff], @random="c95f6caf4d1a", [0xff, 0x0, 0xff, 0xff], 0xa8, 0x130, 0x180, [@realm={'realm\x00', 0x10, {{0x3ff, 0x5}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@empty, 0xfffffffffffffffd}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x80, 'syz0\x00', 0x1}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x0, 0x5}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x3, 0x61, 0x19, 'sit0\x00', 'veth1_to_bond\x00', 'bridge_slave_1\x00', 'bond0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xb}, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xe8, 0x130, 0x168, [@limit={'limit\x00', 0x20, {{0x6, 0x3, 0x1, 0x9, 0x1f, 0x4}}}, @connlabel={'connlabel\x00', 0x8, {{0x6, 0x2}}}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x669, 0x734, 0x8}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x10}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x2, [{{{0x9, 0x0, 0xcaf2859ac15427cf, 'veth1_to_bond\x00', 'bridge_slave_0\x00', 'bcsh0\x00', 'veth0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0x0, 0x0, 0xff, 0x0, 0xff], 0xe8, 0x150, 0x198, [@ip6={'ip6\x00', 0x50, {{@mcast1={0xff, 0x1, [], 0x1}, @local={0xfe, 0x80, [], 0xaa}, [0xffffffff, 0xffffffff, 0xffffffff, 0xffffff00], [0xffffff00, 0xff000000, 0xff, 0xffffffff], 0x1, 0x3c, 0x1, 0x40, 0x4e23, 0x4e21, 0x4e20, 0x4e21}}}]}, [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xffffffffffffffff}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x4, 0xffffffffffffff00}}}}, {{{0xf, 0x8, 0x9bfb, 'veth0_to_bond\x00', 'vcan0\x00', 'dummy0\x00', '\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0x0, 0x0, 0x0, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0xff, 0xff, 0xff, 0xff], 0x8d0, 0x908, 0x940, [@among={'among\x00', 0x838, {{0x1, 0xffff, 0x1, {[0x2, 0x1, 0x2, 0x5, 0x100000001, 0x7f, 0x4, 0x3, 0x5, 0xfffffffffffffff9, 0x1f, 0x4, 0x400, 0x3f, 0x1, 0x101, 0x7b, 0x8, 0x9000000, 0x1000, 0x0, 0x3, 0xd2, 0xffffffff, 0xa0c, 0x0, 0xfffffffffffffca8, 0xffffffffffffff80, 0x8, 0x65197ff0, 0x1f, 0x3ff, 0x101, 0x3ff, 0x4, 0x80, 0x2, 0x8000, 0x5, 0x8, 0x200000000000000, 0x51, 0x8, 0x8, 0x65, 0x6, 0x8000, 0x4, 0xe4, 0x4, 0x0, 0x7ff, 0x9, 0x4, 0x0, 0x3, 0x0, 0x8, 0x1, 0x3ff, 0x7, 0x800, 0x3, 0x1, 0x400, 0x8, 0x8001, 0x80000001, 0x9, 0x7, 0x100000001, 0x7, 0x4, 0x7f, 0x7f, 0x9, 0x3, 0x3ff, 0x1, 0x9, 0x3b0, 0x4, 0x7, 0x2, 0x80000001, 0x80de000, 0x66c, 0x4, 0x9, 0xfffffffffffffffa, 0x200, 0x1, 0xfffffffffffffff7, 0x2cd, 0x7ff, 0x100, 0x0, 0x7, 0x100, 0x32, 0x0, 0x5078000000000000, 0x8, 0xd6a, 0x4, 0x2206, 0x1, 0x101, 0xa28, 0x0, 0x200, 0x2, 0x36, 0x9, 0x1, 0x800, 0x5, 0x3, 0x3c, 0x7f, 0x3, 0x7ec28b26, 0x20, 0x800, 0x80000000, 0x9, 0xffffffff, 0xc9, 0x218a, 0x0, 0x101, 0xfff, 0x1c, 0x1, 0x7, 0x90fe, 0x0, 0x3, 0x6, 0xffffffffffffffff, 0x4bfc3715, 0x6, 0x4, 0x1, 0x6, 0x6, 0x9, 0x2, 0x9, 0x100, 0x8, 0x3ed, 0x3, 0x101, 0x8, 0x80, 0x4d5, 0x0, 0x400, 0x0, 0xffffffffffffff9d, 0x3, 0x9, 0x80000001, 0xff, 0xffffffffffffa067, 0x5, 0x5, 0xc9cf, 0x7ff, 0x16410acf, 0x20, 0x10001, 0x1, 0x1, 0xdd0e, 0x8, 0xfffffffffffffffc, 0x80000001, 0x3c, 0x4556, 0x9, 0xfffffffffffffe00, 0x1, 0x401, 0xfff, 0x1ff, 0x2, 0x3f, 0x7, 0x3ff, 0x2, 0x1, 0xffff, 0x3, 0x9, 0x5, 0x7, 0x4, 0x19, 0xfffffffffffffffc, 0x10001, 0x5, 0x8000, 0x1, 0x2, 0x100, 0xe03, 0x5ef, 0x3, 0x8, 0x0, 0x7f, 0x7fff, 0xc226, 0x200, 0x5, 0x5, 0xffffffffffffffee, 0x9, 0x1, 0x987, 0x2, 0x9, 0x5, 0x3, 0x7, 0x4, 0xc5, 0x7, 0x2, 0x100, 0xb6, 0x5, 0xc7c8, 0x6, 0x1, 0x9, 0x0, 0x4, 0x8000, 0x0, 0x8, 0x1, 0x8, 0x8, 0xfffffffffffffffd, 0x7, 0x2, 0x157, 0x80000001, 0x7fffffff, 0xeec, 0xec4, 0x100000000, 0xf2, 0x6], 0x1, [{[0x7000], @remote={0xac, 0x14, 0x14, 0xbb}}]}, {[0x9, 0xfff, 0x7, 0x3, 0xfffffffffffffffa, 0x0, 0x2, 0x6, 0x4, 0x401, 0x0, 0x100000001, 0x101, 0x7, 0x40, 0xc74, 0x9, 0x4, 0x3, 0x8, 0x80, 0x3, 0x0, 0x7, 0x8, 0x1, 0x5, 0x2, 0x4, 0x4, 0x3, 0xe8, 0x6, 0x100000000, 0xd25, 0x47, 0x6b1, 0x7, 0xffff, 0x8, 0x5, 0x2, 0x1, 0x1, 0x80000001, 0x7fff, 0xfffffffffffffffe, 0x8, 0x3173, 0x8, 0x10000, 0x9, 0xa371, 0x3, 0x81, 0x9, 0x7, 0x1, 0x3, 0x4, 0x2, 0x5, 0x80000000, 0x7, 0x0, 0x2, 0x6, 0x8, 0xff, 0x1, 0x80000001, 0x7, 0x7f, 0x1000, 0x9, 0xfffffffffffffffd, 0x177e, 0x1f, 0x3, 0x1ff, 0x5, 0x8, 0x7, 0x9b, 0x4, 0x2, 0x7f, 0x3, 0x0, 0x0, 0x415, 0x9e, 0x4, 0xffffffff, 0x1, 0xffffffffffffff05, 0x30d6, 0x8, 0x1000, 0x7, 0x7, 0x3, 0x2, 0x1, 0x3f, 0x2, 0x1, 0x200000000000, 0x8, 0x81, 0x8, 0x55e6, 0xc, 0x401, 0x58a4, 0x7, 0x400, 0x3, 0x1ff, 0x1ff, 0xfffffffffffffe40, 0x1, 0x7fff, 0xfffffffffffffffc, 0x7, 0x0, 0x0, 0x1e, 0x0, 0xffffffffffffff76, 0x6, 0x800, 0x1f3, 0x5, 0x20, 0x5, 0x2, 0x1ff, 0x7, 0x3ff, 0xdfa, 0xffffffff, 0xff, 0x0, 0x7, 0xfffffffffffffff7, 0xfffffffffffffffc, 0x80000001, 0x1, 0x1000, 0x80000001, 0x7, 0x7, 0xc79, 0x4, 0x5, 0xffffffffffff0001, 0x5, 0x72b4, 0x81, 0x101, 0x8, 0x6, 0xffffffffffffffa6, 0x5, 0xdb79, 0x7fffffff, 0x7, 0x4, 0x100000000, 0x5, 0xe53, 0xffffffffffffffe3, 0x4, 0xf0, 0x7b, 0x0, 0x3, 0x0, 0x357, 0x7, 0x5, 0x8001, 0x2, 0x1, 0xfffffffffffffff7, 0x9, 0x5, 0x5, 0x5, 0x9fb, 0x0, 0x1, 0x6, 0x1, 0xffff, 0x5, 0x7fff, 0x80, 0x1, 0x100000001, 0xfffffffffffff914, 0xc12, 0x5007, 0xfffffffffffffffa, 0x1ad, 0x9, 0x1, 0x4, 0x3ff, 0x37, 0x6, 0x7, 0x1, 0x1, 0x3, 0x4, 0x6, 0x7, 0x3f, 0x6, 0x5, 0x6, 0x5, 0x8, 0x2, 0x401, 0x1, 0x7, 0x7, 0x80000001, 0x2, 0x400, 0x0, 0x81, 0x77d8, 0x4, 0x3, 0x548, 0x100, 0xf95, 0xea, 0x4, 0x5, 0x5, 0x0, 0x3f, 0x6, 0xfffffffffffffffb, 0x6, 0x52, 0x3, 0x400000000000, 0x4be, 0x200, 0xf8, 0x8], 0x1, [{[0x5], @dev={0xac, 0x14, 0x14, 0x1c}}]}}}}]}, [@common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xffffffffffffffff}}}]}, @common=@mark={'mark\x00', 0x10, {{0xffffffc0, 0xfffffffffffffffd}}}}]}]}, 0x1068) socket$can_raw(0x1d, 0x3, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000001240)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001280)=@assoc_value, &(0x7f00000012c0)=0x8) ioctl$TIOCCONS(r0, 0x541d) syncfs(r0) r2 = syz_open_dev$sndmidi(&(0x7f0000001300)='/dev/snd/midiC#D#\x00', 0xb61, 0x200000) clock_gettime(0x0, &(0x7f0000001380)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000013c0)={0x0, 0x0}) sendmsg$can_bcm(r2, &(0x7f00000014c0)={&(0x7f0000001340)={0x1d, r1}, 0x10, &(0x7f0000001480)={&(0x7f0000001400)={0x2, 0x1, 0x1, {r3, r4/1000+10000}, {r5, r6/1000+10000}, {0x1, 0x1, 0x81, 0x81}, 0x1, @can={{0x4, 0x2, 0x5, 0x8}, 0x5, 0x3, 0x0, 0x0, "f4c3868f5e9af9d1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x10) r7 = add_key$keyring(&(0x7f0000001500)='keyring\x00', &(0x7f0000001540)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r8 = request_key(&(0x7f0000001580)='logon\x00', &(0x7f00000015c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001600)='],posix_acl_access^Elo\x00', 0x0) keyctl$negate(0xd, r7, 0x3, r8) r9 = getpgrp(0xffffffffffffffff) fcntl$setownex(r0, 0xf, &(0x7f0000001640)={0x1, r9}) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000001680)=r1) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f00000016c0)=r0) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000001700)=@generic={0x0, 0x6d7, 0x1}) keyctl$join(0x1, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000001740)=0x64) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000001780), 0x4) ioctl$void(r2, 0x5450) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f00000017c0)={0xaf, @multicast1=0xe0000001, 0x4e23, 0x2, 'dh\x00', 0x18, 0x2000, 0x47}, 0x2c) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000001800)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000002ec0)={&(0x7f0000001840)=@in={0x2, 0x3, @broadcast=0xffffffff}, 0x80, &(0x7f0000001b40)=[{&(0x7f00000018c0)="4d98ed071a9b2c62ab214e3883402326304b0bd30ec081b7ece35f44a2353af80a38ef3aa464f2937bc2c3a464067d8c5bda2eaba153db7756f931231e27421054ff69b99e206ff098de90bee97cd548514e48cf40a05d305ccfe6a8fe9ffe9fb2491fb1298fcaaf387d05fbcc2c96988b943e1cc48a53bf1aa2ebd04842aef1f2c0d2cc4de8a6ebb002b1ea7c164d6ec4f5835a95c007aac822ddec9c46fa22a34e90c432a49797d3a899939a60b22c31ee46cf95b069a079a248bc8c35385664a492cd330e45008ab4224e1903b0a0d53e31c2306511d6ed7a036c6119a76b80e64492acc21cc839c6983fb06de89d2df39ba217", 0xf5}, {&(0x7f00000019c0)="709626a5b8e82dbdc9e5a925eee2627b09862230240571fb53eef7033c612cd0e729e462dd6cb7628c735abf7d9167f3", 0x30}, {&(0x7f0000001a00)="454722b993cb8456843e7ae71808630bcce6ade4fea288b484ffa5f417f3b6f59c273db2da05b7db69d12cfc0201c12554439e51779fd554e369894c600d1b7968d034799df996cf9f0954651457c3e864ea74c264c520aab9207f767a50ef6061cb82c59541538ff26256fdd8571712fea2db60d9bb4ca2dd0d6a13b93d5fdf506040b3eb3635e383637bc8edcac2", 0x8f}, {&(0x7f0000001ac0)="c0f07bce3fd844b94cf8fa963c84d09232582a13613fc34f7abf5c728edec9f1011158819f9e7d0b1fb34a8fcebc3fab11972ab3bc6633806b925061e3d9365e2536170a48deb3e473223151620710cccbd47c90", 0x54}], 0x4, &(0x7f0000001b80)=[{0x30, 0x0, 0x94, "a509ff1cf70fc68de77b3ff95b98601ac66086887f9d1b11e5765eebd7badd7a"}, {0x1010, 0x29, 0x3f, "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"}, {0x68, 0x29, 0x6c6f5370, "99c0d7a365922c2ad5cacfc9cad4040a685eb27b8bfe33faf03e557bd836cc0eacbb03ec536de51e073efbe7f6b5d01156537b0f6f53e09a5fcbdde31c75309706f05ee700c1ba4dcbcea7598a9f78855f"}, {0x20, 0x0, 0x7ff, "8645b14d8986e509145b"}, {0x48, 0x117, 0x40, "926d59bd1ad69efc337d33db9dc252faecc4975215dbfe8930e9d2510a1614443237182219997c5698c3d5cb9284abbe6714253a"}, {0x90, 0x0, 0xc18f6b6, "6e770a2eef095581501881154e109e093732df880e5046dacfd4d4844585f254ad3d5c7b3561bce160fb599165f977413f3d520a015175d95148dea2f10e4ef4d04200765d96f5624a57ab2cf565869c744341843d8d201f1e4c65c863cef5ee9ccdd284f1d21919f8ba3cb0a55fd725874eef71e01a5c91f93a7a9b"}, {0xe0, 0x12e4eae10513d022, 0xffffffff7fffffff, "bc230adc1a25ce10c00e7a30a6c7df70c42429ca440fa7ab067e50ed15acc79656f61913721f4a829495d1ec34f6db62b92d1f243b74838cc4f9d2fc3559ca1e3b1fc7d04370a5633f6eb0c143e3e18e0abb2cb76712f6f7d46fdeff64af93b6a30d8ed346baefdf07608a9a98f25260c0a640f85e46d4844d9c4f293c8b67557c91ae5c203ef68523511e0d5daa6e36f1fbda3ddc0cf04981f58a45a246561b10b0b938afeb0d26366bd0ebe6f629210f176ccc3ffd755b960c76488936d88263c06080d33417b8eafb42e393904c"}, {0x30, 0x6, 0x497, "8ebce5fff5c47ecb1fc54128a7be639fe3df5b86d486092be8880a"}, {0x68, 0x114, 0x4, "cd6315871deffa7b7daa1c9df7149291426cd6bab55c4f51ffa5373788814088b71329b756f519d97674d05355f77e0a7911e2f54c0d625e9ffe6dcc9dfae0b2de4e0c9b054242b37e74bbaea30d8cac462daa72a76aa33b"}], 0x1318, 0x8000}, 0x24000091) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f0000002f00)={0x0, @loopback=0x7f000001, 0x4e23, 0x0, 'rr\x00', 0x8, 0xccf, 0x58}, 0x2c) 2018/05/16 16:30:44 executing program 7: clock_gettime(0x0, &(0x7f0000004cc0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000004b00)=[{{&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/100, 0x64}], 0x1, &(0x7f0000000140)=""/144, 0x90, 0x7}, 0x9}, {{&(0x7f0000000200)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000280)=""/210, 0xd2}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/250, 0xfa}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/194, 0xc2}, {&(0x7f0000001640)}, {&(0x7f0000001680)=""/232, 0xe8}, {&(0x7f0000001780)=""/120, 0x78}], 0x8, &(0x7f0000001880)=""/98, 0x62, 0x80}, 0x6}, {{0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000001900)=""/204, 0xcc}, {&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/74, 0x4a}, {&(0x7f0000002a80)=""/112, 0x70}, {&(0x7f0000002b00)=""/118, 0x76}, {&(0x7f0000002b80)=""/222, 0xde}], 0x6, &(0x7f0000002d00)=""/27, 0x1b}, 0xffffffffffffffff}, {{&(0x7f0000002d40)=@nfc, 0x80, &(0x7f0000003080)=[{&(0x7f0000002dc0)=""/2, 0x2}, {&(0x7f0000002e00)=""/220, 0xdc}, {&(0x7f0000002f00)=""/69, 0x45}, {&(0x7f0000002f80)=""/242, 0xf2}], 0x4, &(0x7f00000030c0)=""/237, 0xed, 0x2}, 0x9}, {{&(0x7f00000031c0)=@ethernet={0x0, @random}, 0x80, &(0x7f00000032c0)=[{&(0x7f0000003240)=""/68, 0x44}], 0x1, &(0x7f0000003300)=""/170, 0xaa, 0x8000}, 0x6}, {{&(0x7f00000033c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000003740)=[{&(0x7f0000003440)=""/86, 0x56}, {&(0x7f00000034c0)=""/216, 0xd8}, {&(0x7f00000035c0)=""/194, 0xc2}, {&(0x7f00000036c0)=""/98, 0x62}], 0x4, &(0x7f0000003780)=""/157, 0x9d}, 0x57c}, {{&(0x7f0000003840)=@alg, 0x80, &(0x7f0000004a80)=[{&(0x7f00000038c0)=""/236, 0xec}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f00000049c0)=""/163, 0xa3}], 0x3, &(0x7f0000004ac0)=""/37, 0x25, 0x3}, 0x9}], 0x7, 0x3, &(0x7f0000004d00)={r0, r1+30000000}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000004d40)={0x0, @in6={{0xa, 0x4e24, 0x8, @empty, 0x3}}, 0x5d, 0x0, 0x1ff, 0x2, 0x40}, &(0x7f0000004e00)=0x98) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000004e40)=@assoc_id=r3, 0x4) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000004e80)=0x5, 0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000004ec0)={r3, 0x53, "b09b2d18d4705471fd7ae0de07ffcdd97e1149b8b93d241207c0f9ed0cf80dff9be20f22e7ca308a70b39103db10e1919296bb43fbb96968428e1f9e5844d7c5de32278e8773c5a5dbbc4e6127c23141cf303e"}, &(0x7f0000004f40)=0x5b) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000004f80)='/dev/nullb0\x00', 0x8000, 0x0) ioctl$LOOP_SET_CAPACITY(r5, 0x4c07) syz_genetlink_get_family_id$fou(&(0x7f0000004fc0)='fou\x00') getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000005000), 0x10) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000005040)={0x303, 0x33}, 0x4) r6 = syz_open_dev$amidi(&(0x7f0000005080)='/dev/amidi#\x00', 0xc3, 0x4c80) ioctl$RNDZAPENTCNT(r6, 0x5204, &(0x7f00000050c0)=0x100) r7 = openat$cgroup_type(r6, &(0x7f0000005100)='cgroup.type\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000005200)={&(0x7f0000005140)={0x10, 0x0, 0x0, 0x10008}, 0xc, &(0x7f00000051c0)={&(0x7f0000005180)=@ipv6_getanyicast={0x14, 0x3e, 0x206, 0x70bd2b, 0x25dfdbff, {0xa}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004000}, 0x40) ioctl$int_out(r7, 0x5460, &(0x7f0000005240)) ioctl$VHOST_SET_LOG_FD(r6, 0x4004af07, &(0x7f0000005280)=r6) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f00000052c0)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000053c0)=0xe8) r9 = getgid() fchown(r5, r8, r9) getresgid(&(0x7f0000005400), &(0x7f0000005440), &(0x7f0000005480)) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000005500)=@filter={'filter\x00', 0xe, 0x4, 0x3f0, 0xffffffff, 0x208, 0xc0, 0x208, 0xffffffff, 0xffffffff, 0x358, 0x358, 0x358, 0xffffffff, 0x4, &(0x7f00000054c0), {[{{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0xf}}}, {{@ip={@remote={0xac, 0x14, 0x14, 0xbb}, @loopback=0x7f000001, 0xff000000, 0x0, 'bridge_slave_1\x00', 'bridge_slave_1\x00', {}, {0xff}, 0x89, 0x2, 0x40}, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x7, 0x4}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x100000001, [0x80, 0x3, 0x9, 0x8872, 0x4, 0x10000], 0x1baf, 0x7fffffff, 0x100000000000000}, {0x9, [0x9, 0x3, 0x9, 0xea, 0x3f, 0xffffffffffff048f], 0x1ff, 0xb2cb, 0x800}}}}, {{@uncond, 0x0, 0x128, 0x150, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0xf18, [0x2b, 0x3, 0x4000000, 0x7, 0x3, 0x8], 0x7, 0xfb90, 0x3ecd}}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x6, 0x5}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x450) write$rdma_cm(r6, &(0x7f0000005a00)=@join_ip_mcast={0x10, 0x30, 0xfa00, {&(0x7f00000059c0)={0xffffffff}, 0x2, {0xa, 0x4e22, 0x1000, @loopback={0x0, 0x1}, 0x9}}}, 0x38) write$rdma_cm(r6, &(0x7f0000005a40)=@leave_mcast={0x11, 0x10, 0xfa00, {&(0x7f0000005980), r10}}, 0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000005a80)={0x7b, 0x1, 0xfffffffffffffff7, 0x6, r4}, &(0x7f0000005ac0)=0x10) ioctl$KDSKBMODE(r6, 0x4b45, &(0x7f0000005b00)=0x7f) ioctl$sock_inet_SIOCSARP(r6, 0x8955, &(0x7f0000005b40)={{0x2, 0x4e23, @broadcast=0xffffffff}, {0x307}, 0x2, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, 'bpq0\x00'}) ioctl$TIOCLINUX6(r6, 0x541c, &(0x7f0000005bc0)={0x6, 0x46}) fstat(r5, &(0x7f0000005c00)) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000005c80)={r4, 0x40}, 0x8) 2018/05/16 16:30:44 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x40040, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x84, r2, 0x2, 0x70bd29, 0x25dfdbfd, {0x4}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x30}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x800}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote={0xfe, 0x80, [], 0xbb}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x24000881) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'team0\x00', 0x800}) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000280)=""/40, &(0x7f00000002c0)=0x28) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x80002, 0x0) mknod(&(0x7f0000000340)='./file0\x00', 0x0, 0x8) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000380)=0x80, 0x4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000003c0)={0x0, 0x9}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000440)={0x47b, 0x8, 0x8, 0x8, r4}, &(0x7f0000000480)=0x10) r6 = add_key(&(0x7f00000004c0)='id_legacy\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) fstat(r3, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r6, r8, r9) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000640)=@assoc_id=r5, &(0x7f0000000680)=0x4) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f00000006c0)) open$dir(&(0x7f0000000700)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000740)={r10, 0x81, 0xfffffffffffffff8, 0x0, 0x7a5ffda3, 0x8}, &(0x7f0000000780)=0x14) keyctl$update(0x2, r6, 0x0, 0x0) keyctl$join(0x1, &(0x7f00000007c0)={0x73, 0x79, 0x7a, 0x1}) ioctl$sock_inet_sctp_SIOCINQ(r3, 0x541b, &(0x7f0000000800)) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000840)={{0x100000001, 0x4}, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000880)=r7) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000a40)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000a00)={&(0x7f0000000900)={0xfc, r2, 0x300, 0x70bd28, 0x25dfdbfe, {0x7}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffff}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x1f}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x304}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x853a}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x94}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x40}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1ff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4771}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x40}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xe0a}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x100}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4}, 0x4000) timer_create(0x7, &(0x7f0000000a80)={0x0, 0x31, 0x3, @tid=r7}, &(0x7f0000000ac0)=0x0) timer_settime(r11, 0x1, &(0x7f0000000b00)={{0x77359400}, {0x77359400}}, &(0x7f0000000b40)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000c80)=0xe8) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000cc0)={r12, 0x1, 0x6}, 0x10) 2018/05/16 16:30:44 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg(r0, &(0x7f0000003540)=[{{&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000440)="d2", 0x1}], 0x1, &(0x7f0000000480)=[{0x1010, 0x18c, 0x1, "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"}], 0x1010}, 0xffffffffffffffff}], 0x1, 0x0) 2018/05/16 16:30:44 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:30:44 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) [ 68.438698] IPVS: ftp: loaded support on port[0] = 21 [ 68.777725] IPVS: ftp: loaded support on port[0] = 21 [ 68.808985] IPVS: ftp: loaded support on port[0] = 21 [ 68.810406] IPVS: ftp: loaded support on port[0] = 21 [ 68.829510] IPVS: ftp: loaded support on port[0] = 21 [ 68.842214] IPVS: ftp: loaded support on port[0] = 21 [ 68.869615] IPVS: ftp: loaded support on port[0] = 21 [ 68.888002] IPVS: ftp: loaded support on port[0] = 21 [ 70.654200] ip (4682) used greatest stack depth: 54552 bytes left [ 71.101385] ip (4718) used greatest stack depth: 54424 bytes left [ 71.116427] ip (4720) used greatest stack depth: 54344 bytes left [ 71.401373] ip (4743) used greatest stack depth: 54072 bytes left [ 71.753536] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.760131] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.803962] device bridge_slave_0 entered promiscuous mode [ 71.936348] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.942849] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.980134] device bridge_slave_1 entered promiscuous mode [ 72.056124] ip (4793) used greatest stack depth: 53800 bytes left [ 72.121887] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.291904] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.298406] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.315379] device bridge_slave_0 entered promiscuous mode [ 72.338088] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.344565] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.353887] device bridge_slave_0 entered promiscuous mode [ 72.371239] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.377713] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.420168] device bridge_slave_0 entered promiscuous mode [ 72.444790] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.451340] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.466102] device bridge_slave_0 entered promiscuous mode [ 72.480325] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.493818] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.500300] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.508482] device bridge_slave_1 entered promiscuous mode [ 72.518165] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.524688] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.534827] device bridge_slave_0 entered promiscuous mode [ 72.543503] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.549941] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.574172] device bridge_slave_0 entered promiscuous mode [ 72.594004] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.600523] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.625459] device bridge_slave_1 entered promiscuous mode [ 72.642927] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.649410] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.666142] device bridge_slave_0 entered promiscuous mode [ 72.679577] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.686101] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.704689] device bridge_slave_1 entered promiscuous mode [ 72.732509] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.740990] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.747509] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.764226] device bridge_slave_1 entered promiscuous mode [ 72.782144] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.788646] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.808811] device bridge_slave_1 entered promiscuous mode [ 72.818410] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.824895] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.835723] device bridge_slave_1 entered promiscuous mode [ 72.861278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.872739] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.881086] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 72.894454] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 72.902704] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.909287] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.950212] device bridge_slave_1 entered promiscuous mode [ 72.990559] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 73.081672] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.093181] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 73.101730] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.109553] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.167776] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 73.212732] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.221886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.345477] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.397275] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 73.422925] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.550976] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.690154] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.748276] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.786458] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.795920] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.846481] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.874333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.881348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.897793] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.996855] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.003901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.021267] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 74.031614] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.044851] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.062510] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.069573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.115553] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 74.134095] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.223469] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.230541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.260391] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.268914] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.275911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.288778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.317655] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.341170] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.350323] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.386158] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.393191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.415947] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 74.431474] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.446389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.481796] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.489004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.515255] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.543744] team0: Port device team_slave_0 added [ 74.575054] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.584938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.601615] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.620696] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 74.628706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.661919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.811904] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.819067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.833404] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 74.851267] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.869954] team0: Port device team_slave_1 added [ 74.900633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.962121] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.992528] team0: Port device team_slave_0 added [ 75.026472] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.041793] team0: Port device team_slave_0 added [ 75.100324] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.109688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.130860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.160438] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.179894] team0: Port device team_slave_0 added [ 75.201287] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.226645] team0: Port device team_slave_0 added [ 75.248876] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.266771] team0: Port device team_slave_1 added [ 75.290613] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.305593] team0: Port device team_slave_1 added [ 75.334400] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.350311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.363255] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.395054] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.403893] team0: Port device team_slave_0 added [ 75.430966] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.447364] team0: Port device team_slave_1 added [ 75.466329] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.473876] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.485759] team0: Port device team_slave_1 added [ 75.518798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.537325] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.575229] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.583121] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.597102] team0: Port device team_slave_0 added [ 75.602736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.611576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.629686] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.639158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.648491] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.657578] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 75.665808] team0: Port device team_slave_0 added [ 75.679259] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.695127] team0: Port device team_slave_1 added [ 75.712202] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.726369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.752425] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.783784] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.792344] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.808905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.832131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.856577] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.863904] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.876493] team0: Port device team_slave_1 added [ 75.888873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.901253] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.920675] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 75.936151] team0: Port device team_slave_1 added [ 75.951763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.960513] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.970917] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.978436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.987479] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.029388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.045223] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.063723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.076191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.092964] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.102237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.114975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.142568] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 76.149625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.163917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.174392] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.182625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.193845] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.222375] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.230464] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 76.237421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.249072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.281890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 76.290789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 76.299564] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.315703] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.334448] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.341766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.359528] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.385666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.403313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.418085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.428239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.441453] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.449464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.461865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.480425] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.487852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.503080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.535835] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.543463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.551974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.568182] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 76.578260] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.591395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 76.615583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 76.646234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.674132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.691863] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.700544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.733343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.743011] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.750782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.759607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.773276] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.793265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.811962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.827866] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 76.837800] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 76.855509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.887186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.919898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.950439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.983630] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 77.000589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.016128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.052501] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 77.059855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.082142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.366136] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.372610] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.379445] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.385890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.409759] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.416911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.840745] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.847243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.854106] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.860596] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.920642] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.950319] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.956785] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.963574] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.969995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.014625] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.180021] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.186554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.193390] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.199858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.222153] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.262378] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.268845] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.275643] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.282099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.342470] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.351324] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.357766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.364529] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.371115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.391465] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.413337] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.419805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.426620] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.433070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.489132] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.499457] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.519739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.542346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.561824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.577415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.589853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.651013] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.657527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.664361] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.670804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.732954] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 80.543198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 86.922725] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.332346] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.389704] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.730632] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.812770] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.857778] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.878945] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.906308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.136457] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.187588] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.400334] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.487361] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.493875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.506316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.614703] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.648690] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.668568] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.727688] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 88.970959] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.977308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.989293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.064182] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.083332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.100103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.237246] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 89.339549] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.365309] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.374519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.386863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.470880] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.477265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.488937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.541889] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.548274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.562866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.624511] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 89.639180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.654558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.794098] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.894723] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.099203] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 90.105530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.122315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.293561] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.318964] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.350846] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.432717] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.997334] 8021q: adding VLAN 0 to HW filter on device team0 2018/05/16 16:31:11 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0xd}, @rand_addr=0x9}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f00000000c0)={@multicast1=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 2018/05/16 16:31:12 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:12 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x4, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x31d) 2018/05/16 16:31:12 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:12 executing program 0: unshare(0x2000400) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0xffb6) 2018/05/16 16:31:12 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = syz_fuse_mount(&(0x7f0000000340)='./file0\x00', 0x4001, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0/file0\x00') read(r0, &(0x7f0000003380)=""/4096, 0xf) 2018/05/16 16:31:12 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="891a04000037b1743123606b894666fbf4551bd17eaee01f2b", 0x19) 2018/05/16 16:31:12 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:12 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:12 executing program 4: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x8, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) write$binfmt_elf32(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0xfdef) 2018/05/16 16:31:12 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:12 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:12 executing program 0: unshare(0x2000400) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getsockopt$inet6_mtu(r0, 0x29, 0x10, &(0x7f0000000140), &(0x7f0000000180)=0xffb6) 2018/05/16 16:31:12 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:12 executing program 4: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000040), 0x4) r0 = socket(0x2, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000001280)) semctl$IPC_RMID(0x0, 0x0, 0x10) 2018/05/16 16:31:12 executing program 3: r0 = socket$inet6(0xa, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}, 0x1c) 2018/05/16 16:31:12 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0xb4, 0x4) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) 2018/05/16 16:31:12 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:13 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:13 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00'}) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:13 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0xb4, 0x4) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) 2018/05/16 16:31:13 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5072d35f, 0x20040) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000040)) setns(r0, 0xe000000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r1, 0xffffffff, 0x7, 0x8001, 0xf2a, 0x7}, 0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x7ff, 0x1, 0x907, 0x800, 0x746f, 0x3af, 0x1, r1}, &(0x7f0000000180)=0x20) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x28c02800}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x11c, r3, 0x324, 0x70bd25, 0x25dfdbfc, {0xe}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xb}}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x29715279}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}]}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1=0xe0000001}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10000}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x20000080}, 0x40000) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000400)={0xfffffffffffffe01, 0x3, 0x7, 'queue0\x00', 0x400}) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/snmp\x00') sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000200}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x50, r3, 0x4, 0x70bd28, 0x25dfdbfc, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xd35}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x101}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40011}, 0x40080) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000640)=@int=0x100000000, 0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000680)={r2, 0x200}, &(0x7f00000006c0)=0x8) pwritev(r0, &(0x7f0000001800)=[{&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="6cd731ff94b6cdbccfa4cebad8645bd063bc40888ce42bc223c9218f067442fa5e3a8dc89f217abe3d84b9ce3526259892d6dffc50709f22bbc8155fc68ce209d824f2253d96bda3f951b73b680d0fe1d8a3dc015c218a798a25e14f06b63c97925986831535952162993d3e12370915c21f43b71e920423eb3da9774f1753", 0x7f}, {&(0x7f0000001780)="5eaaf421b86869f2c465dc64408a22575c6229544251b4c0b392159de7f9e2f8fc8b7825faf89b53805c0b3aa61d3fd31796f9bd2ac28388ebe251eac60c3559a5", 0x41}], 0x3, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x7) r5 = fcntl$getown(r0, 0x9) ptrace$setsig(0x4203, r5, 0x80000001, &(0x7f0000001840)={0x19, 0x7, 0x9, 0xffff}) ioctl$DRM_IOCTL_AGP_ENABLE(r4, 0x40086432, &(0x7f0000001880)=0xfc0) syz_open_dev$evdev(&(0x7f00000018c0)='/dev/input/event#\x00', 0x4, 0x2000) getsockopt$inet_dccp_buf(r0, 0x21, 0xc0, &(0x7f0000001900)=""/129, &(0x7f00000019c0)=0x81) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000001a00)={0x6, 0x1}) ptrace$getregset(0x4204, r5, 0x3, &(0x7f0000001a80)={&(0x7f0000001a40)=""/31, 0x1f}) ioctl$GIO_FONTX(r4, 0x4b6b, &(0x7f0000001ac0)=""/127) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000001b40)={@rand_addr, @loopback}, &(0x7f0000001b80)=0x8) lsetxattr(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)=@known='trusted.syz\x00', &(0x7f0000001c40)='$%\x00', 0x3, 0x1) ioctl$TIOCNXCL(r4, 0x540d) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000001c80)={'bridge_slave_1\x00', 0x2}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000001cc0)={0x2, 0x9}) syz_open_dev$mice(&(0x7f0000001d00)='/dev/input/mice\x00', 0x0, 0x0) 2018/05/16 16:31:13 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:13 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:13 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:13 executing program 6: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:13 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00'}) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x1000000012) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) sendmsg$nl_route(r0, &(0x7f0000002fe4)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8, 0x13}, @IFLA_NET_NS_FD={0x8, 0x1c}]}, 0x30}, 0x1}, 0x0) 2018/05/16 16:31:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000200)="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", 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1f, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x240, &(0x7f00000000c0)}, 0x10) 2018/05/16 16:31:13 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000040)=r1) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000000), 0x4) 2018/05/16 16:31:13 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:13 executing program 6: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:13 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00'}) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:13 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x4c, 0x200100) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000400), &(0x7f0000000440)=0x8) accept4$inet(r0, &(0x7f0000000340)={0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x80800) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="c626262c8523bf012cf66f") setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0)=0x4, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000200)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000002c0)={0xfff, 0x1, 0x4, 0x7f, 0x3}, 0xc) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000380)={'bridge0\x00', &(0x7f0000000180)=ANY=[@ANYRES32=r1, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES16=r2, @ANYRES16=r2], @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES16=r1, @ANYBLOB="6d65642a7737705424d512c03c7bf407b393595ee93c6f623c4052d0939283e2c458a8a08ded8077f8ac4491e6abfa65a26d6ef038462ab7", @ANYRES16=r2, @ANYRES16=r1, @ANYRES16=r2, @ANYPTR, @ANYPTR, @ANYRES32=r2, @ANYRES64=r1], @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES64=r2]], @ANYRES32]}) setsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f0000000240)=0x8, 0x4) accept4$vsock_stream(r1, &(0x7f0000000280)={0x28, 0x0, 0xffffffff, @any=0xffffffff}, 0x10, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000480)=0x1) 2018/05/16 16:31:13 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x0) 2018/05/16 16:31:13 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:13 executing program 4: ioprio_set$pid(0x1, 0x0, 0x0) ioprio_get$pid(0x1, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) r1 = gettid() ioprio_set$pid(0x2, r1, 0xfffffffffffffd09) 2018/05/16 16:31:13 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:13 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000008080)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/115, 0x73}, {&(0x7f00000011c0)=""/244, 0xf4}], 0x3, &(0x7f0000001340)=""/47, 0x2f}}, {{&(0x7f0000001980)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001bc0)}}, {{&(0x7f00000062c0)=@in6={0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000006780), 0x0, &(0x7f0000006800)}}, {{&(0x7f0000006840)=@can, 0x80, &(0x7f0000007d00), 0x0, &(0x7f0000007dc0)=""/177, 0xb1}}], 0x4, 0x0, &(0x7f0000007e80)={0x77359400}) r2 = shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffa000/0x3000)=nil) shmat(r2, &(0x7f0000ffb000/0x1000)=nil, 0x2000) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000012c0)="4c0000001200ff09fffefd956fa283b724a60080000000000000001180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b0798910000000000000000000000", 0x4c}], 0x1}, 0x40) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001380)='/dev/vcs\x00', 0x40, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) socketpair(0x1b, 0xa54b5da6c8040c1d, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$UFFDIO_ZEROPAGE(r4, 0xc020aa04, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) [ 97.155762] syz-executor1 (6706) used greatest stack depth: 53096 bytes left 2018/05/16 16:31:15 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:15 executing program 4: r0 = dup(0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f00000000c0)=0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x90000, 0x0) write$binfmt_script(r1, &(0x7f0000000280)={'#! ', './file0', [{0x20, 'keyring$'}, {0x20, "76626f786e65743176626f786e657431656d302339de"}, {0x20}, {0x20}, {0x20, '#selfO@'}], 0xa, "f62b2c3a32aeafb186e99b48b5889a12661f585e1b6c7ae2d971ffff4f68b1286602af07e6ac786060ebe4c00046c6ea85a30a5e2efc6985f454113fe67bcae28d5b5bd0eaac93f6c7bb5bb87eed5e35201e93b1929bd467f68abd8bfd9e4d6193b511431091ec32b2bcb7fb32289032eb"}, 0xa6) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000018ff4)={0x10}, 0x7, &(0x7f0000000080)={&(0x7f0000000140)={0xfffffffffffffd7f, 0x128, 0x4fe, 0x0, 0x0, {0x1}, [@generic="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"]}, 0x110}, 0x1}, 0x4000000) 2018/05/16 16:31:15 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:15 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:15 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:15 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:15 executing program 3: semget(0x3, 0x7, 0x100) semget$private(0x0, 0x7, 0x42e) r0 = semget$private(0x0, 0x1, 0x302) semctl$IPC_RMID(r0, 0x0, 0x3) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x800, 0x80002) getdents64(r1, &(0x7f0000000040)=""/158, 0x9e) 2018/05/16 16:31:15 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x2, &(0x7f0000002fe8)=[{0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:15 executing program 3: r0 = add_key(&(0x7f0000000300)='id_legacy\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f00000003c0)="01", 0x1, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000400)="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", &(0x7f0000000000)="1a00") r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x22) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{0x6, 0x7, 0x0, 0xffffffffffffffff}, {0x7, 0x2, 0x401, 0x9}, {0x2, 0x1, 0x7, 0x8001}, {0x1, 0x92, 0x9, 0x8}, {0x7fffffff, 0x1fffc00000, 0x100000001}, {0x5, 0x6448097a, 0xfffffffffffffffd, 0x8}]}, 0x10) 2018/05/16 16:31:15 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x0, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:15 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x2, &(0x7f0000002fe8)=[{0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:15 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:15 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x200000088) r1 = dup2(r0, r0) readv(r1, &(0x7f0000000340)=[{&(0x7f0000000440)=""/205, 0xcd}], 0x1) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) setsockopt$inet_int(r1, 0x0, 0x8, &(0x7f0000000000)=0x3, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet_sctp(r2, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in={0x2, 0x4e23}, 0x10, &(0x7f0000fc8000), 0x1000000000000051}, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c746572000000faff0000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) 2018/05/16 16:31:15 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x0, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:16 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:16 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:16 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:16 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x40, 0x0) connect$llc(r0, &(0x7f0000000200)={0x1a, 0xf, 0x911a, 0xb58f, 0x6, 0x7, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x10}}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000140)={{0x7, 0x7}, 'port1\x00', 0x4, 0x20, 0x77d4, 0x400, 0x4, 0xac1d, 0x6, 0x0, 0x0, 0x80000000}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB='\r?`'], &(0x7f0000000100)=0x15) setsockopt$inet6_int(r1, 0x29, 0x40, &(0x7f0000000000), 0x4) 2018/05/16 16:31:16 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:16 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:16 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x9, 0x2, 0x8, 0x0, 0x0}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r2, 0x9}, 0x8) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") iopl(0x5) getsockopt$inet6_int(r3, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000013000)=0x4) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/05/16 16:31:16 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:16 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x2, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x6}]}, 0x10) 2018/05/16 16:31:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000100)=0x4, 0x4) getsockopt$inet6_int(r0, 0x29, 0x4000000000cf, &(0x7f0000000040), &(0x7f00000001c0)=0x4) 2018/05/16 16:31:16 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:16 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:16 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) ftruncate(0xffffffffffffffff, 0x280080) sendfile(r3, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:16 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:16 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {}, {0x6}]}, 0x10) 2018/05/16 16:31:16 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:17 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:17 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket(0x10, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) getsockname$llc(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000480)=0xa) listen(r0, 0x83) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000003c0)={0x0, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000380)={0x6, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}]}) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000440)=r2, 0x4) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000100)={'nat\x00', 0x0, 0x4, 0x9, [], 0xa, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=""/9}, &(0x7f0000000180)=0x78) r3 = socket$inet6_sctp(0xa, 0x1000000001, 0x84) sendto$inet6(r3, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000200)=@req3={0x6, 0xfffffffffffffff9, 0x2, 0xff, 0x2, 0x1, 0xff}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev={0xac, 0x14, 0x14}}}, 0x0, 0x0, 0x0, 0x0, 0xf401}, 0x98) 2018/05/16 16:31:17 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {}, {0x6}]}, 0x10) 2018/05/16 16:31:17 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:17 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r1}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:17 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:17 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:17 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x9, 0x2, 0x8, 0x0, 0x0}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r2, 0x9}, 0x8) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") iopl(0x5) getsockopt$inet6_int(r3, 0x29, 0x10, &(0x7f0000000100), &(0x7f0000013000)=0x4) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/05/16 16:31:17 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r1}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:17 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:17 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {}, {0x6}]}, 0x10) 2018/05/16 16:31:17 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:17 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:18 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f0000000080), 0x1000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r0]) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="4a1b912cfc8dc64246cf3204cf19645f30f37afeff524b3a75ddaded71051d563c39281b2ff5d7b4", 0x28, 0x400000000}], 0x0, &(0x7f0000000780)=ANY=[]) execve(&(0x7f0000000080)='./bus\x00', &(0x7f0000000280)=[&(0x7f00000000c0)="5e73797374656de973656375726974795e5b2d707070316c6f2e707070302c76626f786e657430706f7369785f61636c5f61636365737300", &(0x7f0000000140)='ntfs\x00', &(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='eth0^[{^{&^user\x00'], &(0x7f00000003c0)=[&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='ppp0$*\x00', &(0x7f0000000340)='ntfs\x00']) write$eventfd(r1, &(0x7f0000000180), 0xfffffc5d) 2018/05/16 16:31:18 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:18 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x2, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}]}, 0x10) 2018/05/16 16:31:18 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:18 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) socket(0x2, 0x1, 0x0) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:18 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r1}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:18 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'bond_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000400)={r1, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) r2 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x20, 0x202) accept$ax25(r2, &(0x7f0000000240), &(0x7f0000000280)=0x10) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x81, 0x2) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6}, 0x10) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x400, 0x40000) sendmsg$nl_route(r3, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100008}, 0xc, &(0x7f0000000440)={&(0x7f0000000740)=ANY=[@ANYBLOB="54000000200000012bbd7000fcdbc08b060045a8b79e00000600000001000014d707b0e7f9c010c48a2e800014000100ff010000b90200000000000000000001080013000800000038e95c4fce7bc028a60800060004000000082d100005000000080017004e244e22c151e8a99c5c9925c127c958ba97e797c2360ebc066e92cb804dcbb380ab3b8af5e82bd6af3f9cc4cb96ba223e9ca3a6b0e00986153740434e5c32e24d"], 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x40) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x121900, 0x0) sendmsg$nl_xfrm(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4042}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@getspdinfo={0x6c, 0x25, 0x714, 0x70bd2b, 0x25dfdbfd, 0x9, [@proto={0x8, 0x19, 0x3b}, @encap={0x1c, 0x4, {0x1, 0x4e21, 0x4e22, @in=@multicast2=0xe0000002}}, @proto={0x8, 0x19, 0x33}, @encap={0x1c, 0x4, {0xffffffffffffffff, 0x4e23, 0x4e21, @in6}}, @etimer_thresh={0x8, 0xc, 0xfb}, @ipv6_hthresh={0x8, 0x4, {0x2d, 0x79}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x4) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f00000002c0)={r1, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x14}}, 0x10) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}, 0x27, r1}) socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000380), &(0x7f0000000700)=0x4) mq_notify(r3, &(0x7f0000000640)={0x0, 0x30, 0x6, @thr={&(0x7f00000004c0)="dd61cd4ff77851a8a1ede80d34d3d42df8f0f817512a71e2fddf70b5ab27d32994dbe2258d59496a881abd6fb6aea84b5998e4cba18a6072a6584567b8e20b70988bbc72e7639785b0a25290b994756758c7bdc022dfd5f4d93053fa5f10d8962e5fa150f359570956a78256ef987af9e356415234450dfb418521143bb8b0f33468eefd64d475edae7b3b7d0755a20af5de8f806548b8195de4da712d422dd1cb1369387494365bf2b7be71e17f889b6e724c2fd89ce7ba63f69c884f803fe06e", &(0x7f00000005c0)="049ef3c032f4e03b363f89d1eb64fea0c262932a65674a7d382e78d9482d0519a18acc13a9f8058a99d67460756e402515bf2a642630460a3028f9e4ed98293608e6e4d6342751ab5504935f58beb965a9adcf433d79af0ad7fd9b3362da324d91a5f085886d4dcb1ec07c776b17f18f087693"}}) [ 101.338212] device bond_slave_1 entered promiscuous mode 2018/05/16 16:31:18 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {}]}, 0x10) 2018/05/16 16:31:18 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) socket(0x2, 0x1, 0x0) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:18 executing program 5: r0 = socket(0x2, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r1}, 0x10) setsockopt(0xffffffffffffffff, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) [ 101.601555] device bond_slave_1 left promiscuous mode 2018/05/16 16:31:18 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) ftruncate(0xffffffffffffffff, 0x280080) sendfile(r3, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:18 executing program 6 (fault-call:1 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:18 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:18 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x181000, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r2, 0x1, 0x1, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x7ffffff7) 2018/05/16 16:31:18 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f0000000080), 0x1000, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r0]) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000001c0)="4a1b912cfc8dc64246cf3204cf19645f30f37afeff524b3a75ddaded71051d563c39281b2ff5d7b4", 0x28, 0x400000000}], 0x0, &(0x7f0000000780)=ANY=[]) execve(&(0x7f0000000080)='./bus\x00', &(0x7f0000000280)=[&(0x7f00000000c0)="5e73797374656de973656375726974795e5b2d707070316c6f2e707070302c76626f786e657430706f7369785f61636c5f61636365737300", &(0x7f0000000140)='ntfs\x00', &(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='eth0^[{^{&^user\x00'], &(0x7f00000003c0)=[&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='ppp0$*\x00', &(0x7f0000000340)='ntfs\x00']) write$eventfd(r1, &(0x7f0000000180), 0xfffffc5d) 2018/05/16 16:31:18 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) socket(0x2, 0x1, 0x0) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:18 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x0, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:18 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 101.918085] FAULT_INJECTION: forcing a failure. [ 101.918085] name failslab, interval 1, probability 0, space 0, times 1 [ 101.929625] CPU: 1 PID: 6947 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 101.936857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.946250] Call Trace: [ 101.948899] dump_stack+0x185/0x1d0 [ 101.952589] should_fail+0x87b/0xab0 [ 101.956393] __should_failslab+0x278/0x2a0 [ 101.960705] should_failslab+0x29/0x70 [ 101.964668] __kmalloc_node+0x236/0x11f0 [ 101.968786] ? kmsan_set_origin_inline+0x6b/0x120 [ 101.973693] ? __get_vm_area_node+0x28e/0x810 [ 101.978303] __get_vm_area_node+0x28e/0x810 [ 101.982708] __vmalloc_node_range+0x2a7/0x1170 [ 101.987353] ? bpf_prog_alloc+0xe0/0x500 [ 101.991482] ? kstrtoull+0x766/0x7e0 [ 101.995258] __vmalloc+0xe2/0x100 [ 101.998758] ? bpf_prog_alloc+0xe0/0x500 [ 102.002876] bpf_prog_alloc+0xe0/0x500 [ 102.006834] __get_filter+0x1c4/0x7d0 [ 102.010793] sk_attach_filter+0x72/0x2e0 [ 102.014925] sock_setsockopt+0x336e/0x46f0 [ 102.019237] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 102.024654] ? security_socket_setsockopt+0x1/0x1f0 [ 102.029737] __sys_setsockopt+0x33e/0x560 [ 102.033970] __x64_sys_setsockopt+0x15c/0x1c0 [ 102.038603] do_syscall_64+0x154/0x220 [ 102.042546] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 102.047774] RIP: 0033:0x455a09 [ 102.050999] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 102.058763] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 2018/05/16 16:31:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:19 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:19 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 102.066076] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 102.073399] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 102.080733] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 102.088048] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000000 [ 102.095583] syz-executor6: vmalloc: allocation failure: 4096 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 102.106947] syz-executor6 cpuset=syz6 mems_allowed=0 [ 102.112222] CPU: 1 PID: 6947 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 102.119434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.128830] Call Trace: [ 102.131475] dump_stack+0x185/0x1d0 [ 102.135160] warn_alloc+0x3fc/0x660 [ 102.138881] __vmalloc_node_range+0xa9e/0x1170 [ 102.143529] ? kstrtoull+0x766/0x7e0 [ 102.147308] __vmalloc+0xe2/0x100 [ 102.150855] ? bpf_prog_alloc+0xe0/0x500 [ 102.154975] bpf_prog_alloc+0xe0/0x500 [ 102.158934] __get_filter+0x1c4/0x7d0 [ 102.162822] sk_attach_filter+0x72/0x2e0 2018/05/16 16:31:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') r1 = socket(0xa, 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/216, 0xd8) pread64(r0, &(0x7f00000003c0)=""/4096, 0x1000, 0x0) ioctl(r1, 0x10000, &(0x7f0000000240)="c626262c8523bf012cf66f") read(r0, &(0x7f00000001c0)=""/230, 0xff39) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000000)=0x1, 0x4) [ 102.166960] sock_setsockopt+0x336e/0x46f0 [ 102.171260] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 102.176699] ? security_socket_setsockopt+0x1/0x1f0 [ 102.181795] __sys_setsockopt+0x33e/0x560 [ 102.186042] __x64_sys_setsockopt+0x15c/0x1c0 [ 102.191400] do_syscall_64+0x154/0x220 [ 102.195385] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 102.200613] RIP: 0033:0x455a09 [ 102.203841] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 102.211603] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 102.218912] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 102.226326] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 102.233640] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 102.240952] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000000 [ 102.248423] Mem-Info: [ 102.251018] active_anon:82571 inactive_anon:86 isolated_anon:0 [ 102.251018] active_file:3453 inactive_file:8917 isolated_file:0 [ 102.251018] unevictable:0 dirty:129 writeback:21 unstable:0 [ 102.251018] slab_reclaimable:3487 slab_unreclaimable:9325 [ 102.251018] mapped:74153 shmem:95 pagetables:1060 bounce:0 [ 102.251018] free:1044231 free_pcp:256 free_cma:0 [ 102.285147] Node 0 active_anon:332416kB inactive_anon:344kB active_file:13812kB inactive_file:35668kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:296612kB dirty:516kB writeback:84kB shmem:380kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 118784kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 2018/05/16 16:31:19 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) ftruncate(0xffffffffffffffff, 0x280080) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:19 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x0, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) [ 102.313476] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 102.339798] lowmem_reserve[]: 0 2817 7244 7244 [ 102.344581] Node 0 DMA32 free:2888680kB min:26228kB low:32784kB high:39340kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2889512kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:832kB local_pcp:740kB free_cma:0kB [ 102.372653] lowmem_reserve[]: 0 0 4426 4426 [ 102.377144] Node 0 Normal free:1278760kB min:41208kB low:51508kB high:61808kB active_anon:328200kB inactive_anon:344kB active_file:13812kB inactive_file:35668kB unevictable:0kB writepending:512kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:10240kB pagetables:4240kB bounce:0kB free_pcp:496kB local_pcp:72kB free_cma:0kB [ 102.407075] lowmem_reserve[]: 0 0 0 0 [ 102.411038] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 102.424510] Node 0 DMA32: 2*4kB (M) 2*8kB (M) 3*16kB (M) 3*32kB (M) 1*64kB (M) 2*128kB (M) 4*256kB (M) 1*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2888680kB [ 102.440059] Node 0 Normal: 1*4kB (E) 79*8kB (UME) 163*16kB (UM) 108*32kB (UME) 58*64kB (UME) 53*128kB (UME) 16*256kB (UME) 4*512kB (UE) 2*1024kB (UM) 12*2048kB (UM) 301*4096kB (UM) = 1282860kB [ 102.457724] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 102.466393] 12493 total pagecache pages [ 102.470513] 0 pages in swap cache [ 102.474065] Swap cache stats: add 0, delete 0, find 0/0 [ 102.479505] Free swap = 0kB [ 102.482599] Total swap = 0kB [ 102.485684] 1965969 pages RAM [ 102.488883] 0 pages HighMem/MovableOnly [ 102.492952] 106315 pages reserved 2018/05/16 16:31:19 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:19 executing program 3: r0 = semget$private(0x0, 0x20000000102, 0x200) semop(r0, &(0x7f0000000080)=[{}, {0x0, 0xfffffffffffffff8}], 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x1c, &(0x7f0000000100)=""/173, &(0x7f00000001c0)=0xad) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000200)={0x1, 0xffff}) r2 = geteuid() ioprio_set$uid(0x3, r2, 0x3) semctl$GETNCNT(r0, 0x4, 0xe, &(0x7f0000000000)=""/117) 2018/05/16 16:31:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:19 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") recvfrom(r0, &(0x7f0000000000)=""/238, 0xee, 0x0, &(0x7f0000000380)=@can={0x1d}, 0x80) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000020000000000"], 0x10}, 0x1}, 0x0) 2018/05/16 16:31:19 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:19 executing program 6 (fault-call:1 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:19 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x0, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:19 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:19 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 102.947529] FAULT_INJECTION: forcing a failure. [ 102.947529] name failslab, interval 1, probability 0, space 0, times 0 [ 102.959102] CPU: 1 PID: 6998 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 102.966337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.975808] Call Trace: [ 102.978470] dump_stack+0x185/0x1d0 [ 102.982172] should_fail+0x87b/0xab0 [ 102.985964] __should_failslab+0x278/0x2a0 [ 102.990272] should_failslab+0x29/0x70 2018/05/16 16:31:20 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 102.995180] __kmalloc_node+0x236/0x11f0 [ 102.999314] ? rcu_all_qs+0x32/0x1f0 [ 103.003080] ? alloc_vmap_area+0x1e6/0x15a0 [ 103.007484] ? rcu_all_qs+0x32/0x1f0 [ 103.011256] alloc_vmap_area+0x1e6/0x15a0 [ 103.015479] ? __kmalloc_node+0xe25/0x11f0 [ 103.019772] ? __get_vm_area_node+0x28e/0x810 [ 103.024423] __get_vm_area_node+0x3ab/0x810 [ 103.028820] __vmalloc_node_range+0x2a7/0x1170 [ 103.033465] ? bpf_prog_alloc+0xe0/0x500 [ 103.037617] ? kstrtoull+0x766/0x7e0 [ 103.041399] __vmalloc+0xe2/0x100 [ 103.044908] ? bpf_prog_alloc+0xe0/0x500 [ 103.049032] bpf_prog_alloc+0xe0/0x500 [ 103.053000] __get_filter+0x1c4/0x7d0 [ 103.056883] sk_attach_filter+0x72/0x2e0 [ 103.061022] sock_setsockopt+0x336e/0x46f0 [ 103.065322] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 103.070780] __sys_setsockopt+0x33e/0x560 [ 103.075038] __x64_sys_setsockopt+0x15c/0x1c0 [ 103.079598] do_syscall_64+0x154/0x220 [ 103.083559] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 103.088796] RIP: 0033:0x455a09 [ 103.092025] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 103.099791] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 103.107107] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 103.114421] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 103.121737] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 103.129063] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000001 [ 103.136498] syz-executor6: vmalloc: allocation failure: 4096 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) 2018/05/16 16:31:20 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) [ 103.147769] syz-executor6 cpuset=syz6 mems_allowed=0 [ 103.153079] CPU: 1 PID: 6998 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 103.160491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.169886] Call Trace: [ 103.172544] dump_stack+0x185/0x1d0 [ 103.176246] warn_alloc+0x3fc/0x660 [ 103.179972] __vmalloc_node_range+0xa9e/0x1170 [ 103.184628] ? kstrtoull+0x766/0x7e0 [ 103.188407] __vmalloc+0xe2/0x100 [ 103.191927] ? bpf_prog_alloc+0xe0/0x500 [ 103.196063] bpf_prog_alloc+0xe0/0x500 [ 103.200033] __get_filter+0x1c4/0x7d0 [ 103.203918] sk_attach_filter+0x72/0x2e0 [ 103.208067] sock_setsockopt+0x336e/0x46f0 [ 103.212369] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 103.217859] __sys_setsockopt+0x33e/0x560 [ 103.222105] __x64_sys_setsockopt+0x15c/0x1c0 [ 103.226664] do_syscall_64+0x154/0x220 [ 103.230609] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 103.235846] RIP: 0033:0x455a09 [ 103.239065] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 103.246828] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 103.254144] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 103.261462] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 103.268777] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 103.276105] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000001 [ 103.283505] Mem-Info: [ 103.286060] active_anon:82084 inactive_anon:120 isolated_anon:0 [ 103.286060] active_file:3471 inactive_file:8924 isolated_file:0 2018/05/16 16:31:20 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 103.286060] unevictable:0 dirty:57 writeback:9 unstable:0 [ 103.286060] slab_reclaimable:3497 slab_unreclaimable:9336 [ 103.286060] mapped:74165 shmem:132 pagetables:1083 bounce:0 [ 103.286060] free:1044068 free_pcp:286 free_cma:0 [ 103.319731] Node 0 active_anon:328256kB inactive_anon:480kB active_file:13884kB inactive_file:35696kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:296660kB dirty:228kB writeback:36kB shmem:528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 124928kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 2018/05/16 16:31:20 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 103.348566] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 103.374954] lowmem_reserve[]: 0 2817 7244 7244 [ 103.379743] Node 0 DMA32 free:2888680kB min:26228kB low:32784kB high:39340kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2889512kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:832kB local_pcp:740kB free_cma:0kB [ 103.407615] lowmem_reserve[]: 0 0 4426 4426 [ 103.412073] Node 0 Normal free:1278804kB min:41208kB low:51508kB high:61808kB active_anon:328192kB inactive_anon:364kB active_file:13884kB inactive_file:35696kB unevictable:0kB writepending:152kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:10176kB pagetables:4332kB bounce:0kB free_pcp:264kB local_pcp:120kB free_cma:0kB [ 103.442123] lowmem_reserve[]: 0 0 0 0 [ 103.446088] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 103.459707] Node 0 DMA32: 2*4kB (M) 2*8kB (M) 3*16kB (M) 3*32kB (M) 1*64kB (M) 2*128kB (M) 4*256kB (M) 1*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2888680kB [ 103.475110] Node 0 Normal: 33*4kB (UME) 127*8kB (UME) 199*16kB (UME) 97*32kB (UM) 55*64kB (UME) 50*128kB (UME) 15*256kB (UME) 6*512kB (UME) 2*1024kB (UM) 7*2048kB (UM) 299*4096kB (UM) = 1265356kB [ 103.493065] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 103.501833] 12497 total pagecache pages [ 103.505928] 0 pages in swap cache [ 103.509463] Swap cache stats: add 0, delete 0, find 0/0 [ 103.514935] Free swap = 0kB [ 103.518072] Total swap = 0kB [ 103.521206] 1965969 pages RAM [ 103.524406] 0 pages HighMem/MovableOnly [ 103.528459] 106315 pages reserved [ 103.788798] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 103.788798] The task syz-executor3 (7032) triggered the difference, watch for misbehavior. 2018/05/16 16:31:20 executing program 2: r0 = socket(0x2, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(0xffffffffffffffff, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(0xffffffffffffffff, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:20 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:20 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:20 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:20 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) ptrace$poke(0x5, r1, &(0x7f00000001c0), 0x200) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='msdos\x00', 0x40000, &(0x7f00000003c0)) 2018/05/16 16:31:20 executing program 6 (fault-call:1 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:20 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = socket(0xa, 0x80806, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") write$evdev(r0, &(0x7f0000000140)=[{{0x77359400}, 0x80000001, 0x41e07150}, {}], 0x30) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e23, 0xff, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x5}}, [0x7, 0x9, 0x7, 0x7fff, 0x3, 0x81, 0x80, 0x5, 0x1, 0x0, 0x8, 0xfff, 0x3, 0x8, 0x1000]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r2, 0x3ff}, 0x8) [ 104.000739] FAULT_INJECTION: forcing a failure. [ 104.000739] name failslab, interval 1, probability 0, space 0, times 0 [ 104.012253] CPU: 0 PID: 7045 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 104.019530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.029053] Call Trace: [ 104.031701] dump_stack+0x185/0x1d0 [ 104.035414] should_fail+0x87b/0xab0 [ 104.039207] __should_failslab+0x278/0x2a0 [ 104.043534] should_failslab+0x29/0x70 [ 104.047493] __kmalloc_node+0x236/0x11f0 [ 104.051609] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 104.057148] ? __get_vm_area_node+0x600/0x810 [ 104.061715] ? __vmalloc_node_range+0x611/0x1170 [ 104.066538] __vmalloc_node_range+0x611/0x1170 [ 104.071215] __vmalloc+0xe2/0x100 [ 104.074728] ? bpf_prog_alloc+0xe0/0x500 [ 104.078855] bpf_prog_alloc+0xe0/0x500 [ 104.082820] __get_filter+0x1c4/0x7d0 [ 104.086701] sk_attach_filter+0x72/0x2e0 [ 104.090840] sock_setsockopt+0x336e/0x46f0 [ 104.095135] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 104.100600] __sys_setsockopt+0x33e/0x560 [ 104.104841] __x64_sys_setsockopt+0x15c/0x1c0 [ 104.110378] do_syscall_64+0x154/0x220 [ 104.114339] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 104.119572] RIP: 0033:0x455a09 [ 104.122798] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 104.130568] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 104.137972] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 2018/05/16 16:31:21 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x0, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:21 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:21 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:21 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) [ 104.145286] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 104.152608] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 104.161273] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000002 2018/05/16 16:31:21 executing program 3: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f00000004c0)=@setlink={0x34, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r0}, [@IFLA_XDP={0x14, 0x2b, [@nested={0x10, 0x3, [@typed={0x4, 0x0, @fd}]}]}]}, 0x34}, 0x1}, 0x0) 2018/05/16 16:31:21 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:21 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:21 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:21 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:21 executing program 6 (fault-call:1 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:21 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x0, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:21 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 104.636592] FAULT_INJECTION: forcing a failure. [ 104.636592] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 104.648673] CPU: 0 PID: 7092 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 104.655926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.665327] Call Trace: [ 104.667971] dump_stack+0x185/0x1d0 [ 104.671673] should_fail+0x87b/0xab0 [ 104.675485] __alloc_pages_nodemask+0x61c/0x5dd0 [ 104.680315] ? kmsan_set_origin_inline+0x6b/0x120 [ 104.685221] ? __msan_poison_alloca+0x15c/0x1d0 [ 104.689951] ? __should_failslab+0x278/0x2a0 [ 104.694457] ? should_fail+0x57/0xab0 [ 104.698354] ? __should_failslab+0x278/0x2a0 [ 104.702849] ? kmsan_set_origin_inline+0x6b/0x120 [ 104.707770] ? __msan_poison_alloca+0x15c/0x1d0 [ 104.712508] ? kmsan_set_origin+0x9e/0x160 [ 104.716817] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 104.722388] alloc_pages_current+0x6b5/0x970 [ 104.726871] __vmalloc_node_range+0x83c/0x1170 [ 104.731564] __vmalloc+0xe2/0x100 [ 104.735095] ? bpf_prog_alloc+0xe0/0x500 [ 104.739257] bpf_prog_alloc+0xe0/0x500 [ 104.743239] __get_filter+0x1c4/0x7d0 [ 104.747155] sk_attach_filter+0x72/0x2e0 [ 104.751320] sock_setsockopt+0x336e/0x46f0 [ 104.755626] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 104.761083] __sys_setsockopt+0x33e/0x560 [ 104.765340] __x64_sys_setsockopt+0x15c/0x1c0 [ 104.769906] do_syscall_64+0x154/0x220 [ 104.773881] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 104.779116] RIP: 0033:0x455a09 [ 104.782345] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 104.790106] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 104.797418] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 104.804734] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 104.812059] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 104.819381] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000003 [ 104.827107] syz-executor6: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 104.839701] syz-executor6 cpuset=syz6 mems_allowed=0 [ 104.844964] CPU: 0 PID: 7092 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 104.852205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.861685] Call Trace: [ 104.864340] dump_stack+0x185/0x1d0 [ 104.868037] warn_alloc+0x3fc/0x660 [ 104.871764] __vmalloc_node_range+0xeda/0x1170 [ 104.876618] __vmalloc+0xe2/0x100 [ 104.880145] ? bpf_prog_alloc+0xe0/0x500 [ 104.884302] bpf_prog_alloc+0xe0/0x500 [ 104.888277] __get_filter+0x1c4/0x7d0 [ 104.892176] sk_attach_filter+0x72/0x2e0 [ 104.896325] sock_setsockopt+0x336e/0x46f0 [ 104.900648] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 104.906106] __sys_setsockopt+0x33e/0x560 [ 104.910369] __x64_sys_setsockopt+0x15c/0x1c0 [ 104.914932] do_syscall_64+0x154/0x220 [ 104.918894] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 104.924129] RIP: 0033:0x455a09 [ 104.927360] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 104.935111] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 104.942397] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 104.949672] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 104.956946] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 104.964223] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000003 [ 104.971596] Mem-Info: [ 104.974136] active_anon:80981 inactive_anon:78 isolated_anon:0 [ 104.974136] active_file:3460 inactive_file:8929 isolated_file:0 [ 104.974136] unevictable:0 dirty:64 writeback:0 unstable:0 [ 104.974136] slab_reclaimable:3497 slab_unreclaimable:9352 [ 104.974136] mapped:74180 shmem:84 pagetables:931 bounce:0 [ 104.974136] free:1050244 free_pcp:443 free_cma:0 [ 105.007448] Node 0 active_anon:323924kB inactive_anon:312kB active_file:13840kB inactive_file:35716kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:296720kB dirty:256kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 122880kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 105.035649] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 105.062003] lowmem_reserve[]: 0 2817 7244 7244 [ 105.066753] Node 0 DMA32 free:2888680kB min:26228kB low:32784kB high:39340kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2889512kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:832kB local_pcp:92kB free_cma:0kB [ 105.094560] lowmem_reserve[]: 0 0 4426 4426 [ 105.099045] Node 0 Normal free:1296392kB min:41208kB low:51508kB high:61808kB active_anon:323924kB inactive_anon:312kB active_file:13840kB inactive_file:35716kB unevictable:0kB writepending:256kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:9408kB pagetables:3724kB bounce:0kB free_pcp:940kB local_pcp:364kB free_cma:0kB [ 105.128973] lowmem_reserve[]: 0 0 0 0 [ 105.132945] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 105.146426] Node 0 DMA32: 2*4kB (M) 2*8kB (M) 3*16kB (M) 3*32kB (M) 1*64kB (M) 2*128kB (M) 4*256kB (M) 1*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2888680kB [ 105.161800] Node 0 Normal: 682*4kB (UME) 274*8kB (UME) 169*16kB (UM) 110*32kB (UM) 99*64kB (UME) 50*128kB (UME) 15*256kB (UME) 6*512kB (UME) 2*1024kB (UM) 15*2048kB (UM) 301*4096kB (UM) = 1296456kB [ 105.179893] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 2018/05/16 16:31:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="e92be2df53cf16726c"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) r0 = socket$packet(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000001640)={&(0x7f0000000000)=@rc, 0x80, &(0x7f0000001540)=[{&(0x7f0000000080)=""/255, 0xff}, {&(0x7f0000000180)=""/4096, 0xffffffffffffff28}, {&(0x7f00000016c0)=""/32, 0x20}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/187, 0xbb}, {&(0x7f0000001280)=""/247, 0xf7}, {&(0x7f0000001380)=""/100, 0x64}, {&(0x7f0000001400)=""/155, 0x9b}, {&(0x7f00000014c0)=""/88, 0x58}], 0x9, &(0x7f0000001680)=""/64, 0x40, 0x3}, 0x100) 2018/05/16 16:31:22 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:22 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x0, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:22 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:22 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:22 executing program 6 (fault-call:1 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:22 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 105.188569] 12472 total pagecache pages [ 105.192632] 0 pages in swap cache [ 105.196160] Swap cache stats: add 0, delete 0, find 0/0 [ 105.201626] Free swap = 0kB [ 105.204709] Total swap = 0kB [ 105.207818] 1965969 pages RAM [ 105.210992] 0 pages HighMem/MovableOnly [ 105.215096] 106315 pages reserved 2018/05/16 16:31:22 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 105.349382] FAULT_INJECTION: forcing a failure. [ 105.349382] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 105.362989] CPU: 1 PID: 7121 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 105.370186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.379547] Call Trace: [ 105.382145] dump_stack+0x185/0x1d0 [ 105.385786] should_fail+0x87b/0xab0 [ 105.389533] __alloc_pages_nodemask+0x61c/0x5dd0 [ 105.394302] ? kernel_poison_pages+0x40/0x360 [ 105.398847] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 105.404225] ? kernel_poison_pages+0x1a0/0x360 [ 105.408830] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 105.414296] ? get_page_from_freelist+0xab28/0xb600 [ 105.419332] ? __kernel_text_address+0x34/0xe0 [ 105.423942] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 105.429425] ? __save_stack_trace+0x90d/0xb00 [ 105.433961] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 105.438922] ? kmsan_internal_poison_shadow+0xb8/0x1b0 [ 105.444226] ? __kmalloc_node+0xe25/0x11f0 [ 105.448485] ? sk_attach_filter+0x72/0x2e0 [ 105.452743] ? sock_setsockopt+0x336e/0x46f0 [ 105.457165] ? __sys_setsockopt+0x33e/0x560 [ 105.461498] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.466873] ? kmsan_set_origin_inline+0x6b/0x120 [ 105.471730] ? __msan_poison_alloca+0x15c/0x1d0 [ 105.476416] ? __should_failslab+0x278/0x2a0 [ 105.480843] ? kmsan_set_origin_inline+0x6b/0x120 [ 105.485686] ? __alloc_pages_nodemask+0xb09/0x5dd0 [ 105.490688] kmsan_alloc_page+0x82/0xe0 [ 105.494655] __alloc_pages_nodemask+0xf8e/0x5dd0 [ 105.499423] ? kmsan_set_origin_inline+0x6b/0x120 [ 105.504252] ? __msan_poison_alloca+0x15c/0x1d0 [ 105.508918] ? __should_failslab+0x278/0x2a0 [ 105.513314] ? should_fail+0x57/0xab0 [ 105.517099] ? __should_failslab+0x278/0x2a0 [ 105.521490] ? kmsan_set_origin_inline+0x6b/0x120 [ 105.526330] ? __msan_poison_alloca+0x15c/0x1d0 [ 105.530986] ? kmsan_set_origin+0x9e/0x160 [ 105.535215] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 105.540655] alloc_pages_current+0x6b5/0x970 [ 105.545054] __vmalloc_node_range+0x83c/0x1170 [ 105.549626] __vmalloc+0xe2/0x100 [ 105.553076] ? bpf_prog_alloc+0xe0/0x500 [ 105.557132] bpf_prog_alloc+0xe0/0x500 [ 105.561024] __get_filter+0x1c4/0x7d0 [ 105.564823] sk_attach_filter+0x72/0x2e0 [ 105.568877] sock_setsockopt+0x336e/0x46f0 [ 105.573105] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 105.578457] __sys_setsockopt+0x33e/0x560 [ 105.582596] __x64_sys_setsockopt+0x15c/0x1c0 [ 105.587090] do_syscall_64+0x154/0x220 [ 105.590968] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.596147] RIP: 0033:0x455a09 [ 105.599323] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 105.608405] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 105.615658] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 105.622913] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 105.630175] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 105.637437] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000004 [ 105.645778] syz-executor6: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 105.658366] syz-executor6 cpuset=syz6 mems_allowed=0 [ 105.663615] CPU: 1 PID: 7121 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 105.670838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.680242] Call Trace: [ 105.682908] dump_stack+0x185/0x1d0 [ 105.686596] warn_alloc+0x3fc/0x660 [ 105.690323] __vmalloc_node_range+0xeda/0x1170 [ 105.694995] __vmalloc+0xe2/0x100 [ 105.698516] ? bpf_prog_alloc+0xe0/0x500 [ 105.702648] bpf_prog_alloc+0xe0/0x500 [ 105.706615] __get_filter+0x1c4/0x7d0 [ 105.710512] sk_attach_filter+0x72/0x2e0 [ 105.714655] sock_setsockopt+0x336e/0x46f0 [ 105.718959] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 105.724410] __sys_setsockopt+0x33e/0x560 [ 105.728665] __x64_sys_setsockopt+0x15c/0x1c0 [ 105.733228] do_syscall_64+0x154/0x220 [ 105.737207] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.742441] RIP: 0033:0x455a09 [ 105.745664] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 105.753429] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 105.760743] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 105.768838] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 105.776151] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 105.783462] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000004 2018/05/16 16:31:22 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:22 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:22 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:22 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:22 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:22 executing program 3: fchdir(0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x280002, 0x0) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f00000000c0)=0x1012, 0x4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req={0x1f58}, 0x10) 2018/05/16 16:31:22 executing program 6 (fault-call:1 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) [ 105.957681] FAULT_INJECTION: forcing a failure. [ 105.957681] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 105.969553] CPU: 0 PID: 7148 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 105.976751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.986119] Call Trace: [ 105.988716] dump_stack+0x185/0x1d0 [ 105.992360] should_fail+0x87b/0xab0 [ 105.996083] __alloc_pages_nodemask+0x61c/0x5dd0 [ 106.000854] ? kernel_poison_pages+0x40/0x360 [ 106.005368] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 106.010843] ? kernel_poison_pages+0x1a0/0x360 [ 106.015446] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 106.020917] ? get_page_from_freelist+0xab28/0xb600 [ 106.025947] ? __kernel_text_address+0x34/0xe0 [ 106.030546] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 106.036026] ? __save_stack_trace+0x90d/0xb00 [ 106.040552] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 106.045590] ? kmsan_internal_poison_shadow+0xb8/0x1b0 [ 106.050890] ? __kmalloc_node+0xe25/0x11f0 [ 106.055147] ? sk_attach_filter+0x72/0x2e0 [ 106.059395] ? sock_setsockopt+0x336e/0x46f0 [ 106.063823] ? __sys_setsockopt+0x33e/0x560 [ 106.068182] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 106.073564] ? kmsan_set_origin_inline+0x6b/0x120 [ 106.078416] ? __msan_poison_alloca+0x15c/0x1d0 [ 106.083100] ? __should_failslab+0x278/0x2a0 [ 106.087530] ? kmsan_set_origin_inline+0x6b/0x120 [ 106.092396] ? __alloc_pages_nodemask+0xb09/0x5dd0 [ 106.097363] kmsan_alloc_page+0x82/0xe0 [ 106.101355] __alloc_pages_nodemask+0xf8e/0x5dd0 [ 106.106126] ? kmsan_set_origin_inline+0x6b/0x120 [ 106.110979] ? __msan_poison_alloca+0x15c/0x1d0 [ 106.115657] ? __should_failslab+0x278/0x2a0 [ 106.120099] ? should_fail+0x57/0xab0 [ 106.123914] ? __should_failslab+0x278/0x2a0 [ 106.128356] ? kmsan_set_origin_inline+0x6b/0x120 [ 106.133214] ? __msan_poison_alloca+0x15c/0x1d0 [ 106.137903] ? kmsan_set_origin+0x9e/0x160 [ 106.142157] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 106.147622] alloc_pages_current+0x6b5/0x970 [ 106.152052] __vmalloc_node_range+0x83c/0x1170 [ 106.156657] __vmalloc+0xe2/0x100 [ 106.161094] ? bpf_prog_alloc+0xe0/0x500 [ 106.165265] bpf_prog_alloc+0xe0/0x500 [ 106.169175] __get_filter+0x1c4/0x7d0 [ 106.172995] sk_attach_filter+0x72/0x2e0 [ 106.177072] sock_setsockopt+0x336e/0x46f0 [ 106.181324] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 106.186700] __sys_setsockopt+0x33e/0x560 [ 106.190870] __x64_sys_setsockopt+0x15c/0x1c0 [ 106.195375] do_syscall_64+0x154/0x220 [ 106.199277] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 106.204470] RIP: 0033:0x455a09 2018/05/16 16:31:23 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:23 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x80000) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x31566ce8049f4d07}) close(r1) 2018/05/16 16:31:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:23 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080)={0x1d}, 0x10) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d}, 0x10, &(0x7f0000000380)={&(0x7f0000000480)={0x5, 0xa45, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "d1bdbb8072567f8327d9bd3940a319efeec4fa8957152533f882f7fc6ec5cd73d65bffe11755450e9f884321ae415c73648749f62fb21506441bff3e29a4df8c"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x1d}, 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x6, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x48}, 0x1}, 0x0) [ 106.207742] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 106.215461] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 106.222747] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 106.230023] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 106.237318] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 106.244597] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000005 [ 106.252403] syz-executor6: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 106.265085] syz-executor6 cpuset=syz6 mems_allowed=0 [ 106.270378] CPU: 0 PID: 7148 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 106.277598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.287002] Call Trace: [ 106.289648] dump_stack+0x185/0x1d0 [ 106.293336] warn_alloc+0x3fc/0x660 [ 106.297057] __vmalloc_node_range+0xeda/0x1170 [ 106.301709] __vmalloc+0xe2/0x100 [ 106.305230] ? bpf_prog_alloc+0xe0/0x500 2018/05/16 16:31:23 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) [ 106.309399] bpf_prog_alloc+0xe0/0x500 [ 106.313363] __get_filter+0x1c4/0x7d0 [ 106.317245] sk_attach_filter+0x72/0x2e0 [ 106.321384] sock_setsockopt+0x336e/0x46f0 [ 106.325676] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 106.331115] __sys_setsockopt+0x33e/0x560 [ 106.335339] __x64_sys_setsockopt+0x15c/0x1c0 [ 106.339896] do_syscall_64+0x154/0x220 [ 106.343850] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 106.349078] RIP: 0033:0x455a09 [ 106.352332] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 2018/05/16 16:31:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 106.360101] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 106.367421] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 106.374741] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 106.382050] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 106.389366] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000005 [ 106.396786] warn_alloc_show_mem: 1 callbacks suppressed [ 106.396794] Mem-Info: 2018/05/16 16:31:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:23 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:23 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 106.404805] active_anon:80994 inactive_anon:78 isolated_anon:0 [ 106.404805] active_file:3460 inactive_file:8930 isolated_file:0 [ 106.404805] unevictable:0 dirty:73 writeback:0 unstable:0 [ 106.404805] slab_reclaimable:3501 slab_unreclaimable:9365 [ 106.404805] mapped:74207 shmem:84 pagetables:992 bounce:0 [ 106.404805] free:1049325 free_pcp:391 free_cma:0 [ 106.438570] Node 0 active_anon:323976kB inactive_anon:312kB active_file:13840kB inactive_file:35720kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:296828kB dirty:292kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 120832kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 106.466844] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 106.493141] lowmem_reserve[]: 0 2817 7244 7244 [ 106.497918] Node 0 DMA32 free:2888680kB min:26228kB low:32784kB high:39340kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2889512kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:832kB local_pcp:92kB free_cma:0kB [ 106.525720] lowmem_reserve[]: 0 0 4426 4426 [ 106.530217] Node 0 Normal free:1251380kB min:41208kB low:51508kB high:61808kB active_anon:332556kB inactive_anon:312kB active_file:13840kB inactive_file:35720kB unevictable:0kB writepending:292kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:10368kB pagetables:4484kB bounce:0kB free_pcp:508kB local_pcp:192kB free_cma:0kB [ 106.560286] lowmem_reserve[]: 0 0 0 0 [ 106.564272] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 106.577773] Node 0 DMA32: 2*4kB (M) 2*8kB (M) 3*16kB (M) 3*32kB (M) 1*64kB (M) 2*128kB (M) 4*256kB (M) 1*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2888680kB [ 106.593286] Node 0 Normal: 16*4kB (UE) 17*8kB (UME) 143*16kB (UME) 103*32kB (UME) 57*64kB (UM) 49*128kB (UME) 16*256kB (UME) 6*512kB (UME) 2*1024kB (UM) 1*2048kB (M) 296*4096kB (UM) = 1239384kB [ 106.611062] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 106.619736] 12582 total pagecache pages [ 106.623852] 0 pages in swap cache [ 106.627409] Swap cache stats: add 0, delete 0, find 0/0 [ 106.632894] Free swap = 0kB [ 106.636052] Total swap = 0kB [ 106.639188] 1965969 pages RAM [ 106.642389] 0 pages HighMem/MovableOnly [ 106.646480] 106315 pages reserved 2018/05/16 16:31:23 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:23 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:23 executing program 3: r0 = socket(0x1e, 0x804, 0x0) r1 = semget$private(0x0, 0x0, 0x240) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000000)=""/130) sendto(r0, &(0x7f0000000000), 0xffffffffffffff7a, 0x0, 0x0, 0x21a) 2018/05/16 16:31:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:23 executing program 6 (fault-call:1 fault-nth:6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:23 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:23 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) [ 106.950014] FAULT_INJECTION: forcing a failure. [ 106.950014] name failslab, interval 1, probability 0, space 0, times 0 [ 106.961498] CPU: 1 PID: 7207 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 106.968729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.978135] Call Trace: [ 106.980791] dump_stack+0x185/0x1d0 [ 106.984482] should_fail+0x87b/0xab0 [ 106.988271] __should_failslab+0x278/0x2a0 [ 106.993475] should_failslab+0x29/0x70 [ 106.997439] __kmalloc+0xc5/0x350 [ 107.000950] ? bpf_prog_alloc+0xe0/0x500 [ 107.005064] ? bpf_prog_alloc+0x14c/0x500 [ 107.009297] bpf_prog_alloc+0x14c/0x500 [ 107.013352] __get_filter+0x1c4/0x7d0 [ 107.017245] sk_attach_filter+0x72/0x2e0 [ 107.021416] sock_setsockopt+0x336e/0x46f0 [ 107.025720] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 107.031177] __sys_setsockopt+0x33e/0x560 [ 107.035423] __x64_sys_setsockopt+0x15c/0x1c0 [ 107.040084] do_syscall_64+0x154/0x220 [ 107.044038] entry_SYSCALL_64_after_hwframe+0x44/0xa9 2018/05/16 16:31:24 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) prctl$void(0x1f) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003340)=[{{&(0x7f00000000c0)=@sco, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000140)=""/94, 0x5e}}, {{&(0x7f0000002f40)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000003100)=""/226, 0xd1}], 0x0, &(0x7f0000000240)=""/239, 0xef}}], 0x40003d5, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 2018/05/16 16:31:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 107.049271] RIP: 0033:0x455a09 [ 107.052489] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 107.060257] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 107.067578] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 107.074890] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 107.082206] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 107.089528] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000006 2018/05/16 16:31:24 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:24 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:24 executing program 4: bind$can_raw(0xffffffffffffffff, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(0xffffffffffffffff, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:24 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:24 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:24 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:24 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:24 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:24 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:24 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:24 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) sendmsg$inet_sctp(r1, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x4, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[@dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, @prinfo={0x18, 0x84, 0x5, {0x20}}], 0x38, 0x4}, 0x24000000) syz_emit_ethernet(0x13e, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000001640)) 2018/05/16 16:31:24 executing program 6 (fault-call:1 fault-nth:7): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:24 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) [ 107.794205] FAULT_INJECTION: forcing a failure. [ 107.794205] name failslab, interval 1, probability 0, space 0, times 0 [ 107.805699] CPU: 0 PID: 7259 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 107.812930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.823892] Call Trace: [ 107.826533] dump_stack+0x185/0x1d0 [ 107.830216] should_fail+0x87b/0xab0 [ 107.833989] __should_failslab+0x278/0x2a0 [ 107.838294] should_failslab+0x29/0x70 2018/05/16 16:31:24 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) [ 107.842265] __kmalloc+0xc5/0x350 [ 107.845766] ? __get_filter+0x419/0x7d0 [ 107.849806] __get_filter+0x419/0x7d0 [ 107.853680] sk_attach_filter+0x72/0x2e0 [ 107.857810] sock_setsockopt+0x336e/0x46f0 [ 107.862098] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 107.867536] __sys_setsockopt+0x33e/0x560 [ 107.871779] __x64_sys_setsockopt+0x15c/0x1c0 [ 107.876335] do_syscall_64+0x154/0x220 [ 107.880284] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 107.885520] RIP: 0033:0x455a09 2018/05/16 16:31:24 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:24 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) [ 107.888745] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 107.896595] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 107.903904] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 107.911222] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 107.918541] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 107.926124] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000007 2018/05/16 16:31:25 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:25 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:25 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:25 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={"6c6f0000000000000500200d00", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}}, 0x18}, 0x1}, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000200)=""/148) 2018/05/16 16:31:25 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:25 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(0xffffffffffffffff, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:25 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:25 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:25 executing program 6 (fault-call:1 fault-nth:8): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:25 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={"6c6f0000000000000500200d00", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=@ipv4_deladdr={0x18, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}}, 0x18}, 0x1}, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000200)=""/148) 2018/05/16 16:31:25 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x0, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:25 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:25 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) [ 108.607691] FAULT_INJECTION: forcing a failure. [ 108.607691] name failslab, interval 1, probability 0, space 0, times 0 [ 108.619170] CPU: 1 PID: 7327 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 108.626401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.635815] Call Trace: [ 108.638459] dump_stack+0x185/0x1d0 [ 108.642144] should_fail+0x87b/0xab0 [ 108.645923] __should_failslab+0x278/0x2a0 [ 108.650229] should_failslab+0x29/0x70 [ 108.654192] __kmalloc_track_caller+0x209/0xcd0 [ 108.658934] ? __get_filter+0x520/0x7d0 [ 108.662984] ? trace_kmalloc+0xb6/0x2b0 [ 108.667030] kmemdup+0x95/0x140 [ 108.670402] __get_filter+0x520/0x7d0 [ 108.674283] sk_attach_filter+0x72/0x2e0 [ 108.678429] sock_setsockopt+0x336e/0x46f0 [ 108.682731] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 108.688295] __sys_setsockopt+0x33e/0x560 [ 108.692565] __x64_sys_setsockopt+0x15c/0x1c0 [ 108.697153] do_syscall_64+0x154/0x220 [ 108.701186] entry_SYSCALL_64_after_hwframe+0x44/0xa9 2018/05/16 16:31:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:25 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:25 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:25 executing program 3: unshare(0x24020400) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x81, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)={0xa, [0x5, 0x6, 0x0, 0x1, 0x9, 0x9, 0x3, 0x3, 0x7, 0x3]}, 0x18) [ 108.706416] RIP: 0033:0x455a09 [ 108.709634] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 108.717396] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 108.724708] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 108.732020] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 108.739333] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 108.746642] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000008 2018/05/16 16:31:26 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x0, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:26 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:26 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:26 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:26 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5406, 0xfffffffffffffffd) 2018/05/16 16:31:26 executing program 6 (fault-call:1 fault-nth:9): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) [ 109.084799] FAULT_INJECTION: forcing a failure. [ 109.084799] name failslab, interval 1, probability 0, space 0, times 0 [ 109.096281] CPU: 0 PID: 7359 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 109.103512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.112900] Call Trace: [ 109.115549] dump_stack+0x185/0x1d0 [ 109.119238] should_fail+0x87b/0xab0 [ 109.123011] __should_failslab+0x278/0x2a0 [ 109.127313] should_failslab+0x29/0x70 [ 109.131269] __kmalloc+0xc5/0x350 [ 109.134798] ? bpf_prepare_filter+0x81/0x1b10 [ 109.139344] ? bpf_prepare_filter+0x84e/0x1b10 [ 109.143980] bpf_prepare_filter+0x84e/0x1b10 [ 109.148440] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 109.153887] __get_filter+0x5b7/0x7d0 [ 109.157763] sk_attach_filter+0x72/0x2e0 [ 109.161898] sock_setsockopt+0x336e/0x46f0 [ 109.166193] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 109.171630] __sys_setsockopt+0x33e/0x560 [ 109.175880] __x64_sys_setsockopt+0x15c/0x1c0 [ 109.180438] do_syscall_64+0x154/0x220 [ 109.184390] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 109.189615] RIP: 0033:0x455a09 [ 109.192827] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 109.200585] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 109.207901] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 109.215212] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 109.222547] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 2018/05/16 16:31:26 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="7f"], 0x1) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000eb30000000000000000f8dede4d124fea26c289c30000200000000000000000a6040000000700000000e0ffffffffffffff00000000000000000000000000000000000000c09a3acddc06d91133c18e2321642b873143"], 0x58) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002a80)=""/95, 0x5f}], 0x1, &(0x7f0000002b80)=""/62, 0x3e}}], 0x1, 0x0, 0x0) 2018/05/16 16:31:26 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000), 0x0) [ 109.229886] R13: 00000000000005de R14: 00000000006fcd70 R15: 0000000000000009 2018/05/16 16:31:26 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:26 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:26 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=@dstopts, 0x8) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=""/101, &(0x7f0000000040)=0x65) 2018/05/16 16:31:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:26 executing program 6 (fault-call:1 fault-nth:10): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:26 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:26 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d6", 0x2) 2018/05/16 16:31:26 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:26 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:26 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:26 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f", 0x3) 2018/05/16 16:31:26 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:26 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:26 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:26 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x400f00, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400000) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x300, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x7, 0x100, 0x400}, 0x10) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) r1 = socket(0x11, 0x4000000000080001, 0x80000) setsockopt(r1, 0x107, 0xd, &(0x7f0000001000), 0x47e) mmap(&(0x7f0000399000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) 2018/05/16 16:31:26 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf6") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:26 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 109.906711] FAULT_INJECTION: forcing a failure. [ 109.906711] name failslab, interval 1, probability 0, space 0, times 0 [ 109.918141] CPU: 1 PID: 7428 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 109.925365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.934759] Call Trace: [ 109.937402] dump_stack+0x185/0x1d0 [ 109.941107] should_fail+0x87b/0xab0 [ 109.944901] __should_failslab+0x278/0x2a0 [ 109.949219] should_failslab+0x29/0x70 [ 109.953161] __kmalloc_track_caller+0x209/0xcd0 [ 109.957897] ? bpf_prepare_filter+0x140e/0x1b10 [ 109.962626] ? trace_kmalloc+0xb6/0x2b0 [ 109.966690] kmemdup+0x95/0x140 [ 109.970029] bpf_prepare_filter+0x140e/0x1b10 [ 109.974614] __get_filter+0x5b7/0x7d0 [ 109.978579] sk_attach_filter+0x72/0x2e0 [ 109.982706] sock_setsockopt+0x336e/0x46f0 [ 109.986995] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 109.992428] __sys_setsockopt+0x33e/0x560 [ 109.996657] __x64_sys_setsockopt+0x15c/0x1c0 [ 110.001200] do_syscall_64+0x154/0x220 [ 110.005132] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.010350] RIP: 0033:0x455a09 [ 110.013568] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 110.021319] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 110.028621] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 110.035923] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 110.043224] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 2018/05/16 16:31:27 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf6") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) [ 110.050529] R13: 00000000000005de R14: 00000000006fcd70 R15: 000000000000000a 2018/05/16 16:31:27 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:27 executing program 4 (fault-call:2 fault-nth:0): r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:27 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x82, 0x0) syz_open_pts(r1, 0x2000) sync_file_range(r0, 0x8, 0x7fffffff, 0x4) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) io_setup(0x8, &(0x7f0000000000)) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) r2 = dup2(r0, r0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) 2018/05/16 16:31:27 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:27 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf6") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:27 executing program 6 (fault-call:1 fault-nth:11): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) [ 110.247175] FAULT_INJECTION: forcing a failure. [ 110.247175] name failslab, interval 1, probability 0, space 0, times 0 [ 110.258564] CPU: 0 PID: 7455 Comm: syz-executor4 Not tainted 4.17.0-rc5+ #95 [ 110.265793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.275206] Call Trace: [ 110.277850] dump_stack+0x185/0x1d0 [ 110.281536] should_fail+0x87b/0xab0 [ 110.285342] __should_failslab+0x278/0x2a0 [ 110.289657] should_failslab+0x29/0x70 2018/05/16 16:31:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 110.293614] kmem_cache_alloc+0x12e/0xb90 [ 110.297836] ? can_rx_register+0x2ae/0xf00 [ 110.302124] ? kmsan_set_origin_inline+0x6b/0x120 [ 110.307007] ? __msan_poison_alloca+0x15c/0x1d0 [ 110.311726] ? can_rx_register+0x1f0/0xf00 [ 110.316039] can_rx_register+0x2ae/0xf00 [ 110.320182] ? raw_recvmsg+0x980/0x980 [ 110.324138] raw_setsockopt+0x14dc/0x1db0 [ 110.328352] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 110.329897] FAULT_INJECTION: forcing a failure. [ 110.329897] name failslab, interval 1, probability 0, space 0, times 0 [ 110.333745] ? __fget_light+0x6b9/0x710 [ 110.333808] ? security_socket_setsockopt+0x5b/0x1f0 [ 110.333873] ? raw_getname+0x1a0/0x1a0 [ 110.333911] __sys_setsockopt+0x4af/0x560 [ 110.333987] __x64_sys_setsockopt+0x15c/0x1c0 [ 110.366723] do_syscall_64+0x154/0x220 [ 110.370641] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.375841] RIP: 0033:0x455a09 [ 110.379044] RSP: 002b:00007fdbceb44c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 110.386766] RAX: ffffffffffffffda RBX: 00007fdbceb456d4 RCX: 0000000000455a09 [ 110.394043] RDX: 0000010000000002 RSI: 0000000000000065 RDI: 0000000000000013 [ 110.401322] RBP: 000000000072bea0 R08: 0000000000000004 R09: 0000000000000000 [ 110.408602] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000014 [ 110.415876] R13: 00000000000005c2 R14: 00000000006fcad0 R15: 0000000000000000 [ 110.423184] CPU: 1 PID: 7463 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 110.430403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.439799] Call Trace: [ 110.442441] dump_stack+0x185/0x1d0 [ 110.446121] should_fail+0x87b/0xab0 [ 110.449899] __should_failslab+0x278/0x2a0 [ 110.454188] should_failslab+0x29/0x70 [ 110.458114] __kmalloc+0xc5/0x350 [ 110.461622] ? bpf_convert_filter+0xaf/0x3390 [ 110.466182] ? bpf_convert_filter+0x1a8/0x3390 [ 110.470893] ? bpf_convert_filter+0x3285/0x3390 [ 110.475646] bpf_convert_filter+0x1a8/0x3390 [ 110.480211] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 110.485639] ? bpf_prog_realloc+0x184/0x540 [ 110.490016] bpf_prepare_filter+0x18e9/0x1b10 [ 110.494588] __get_filter+0x5b7/0x7d0 [ 110.498467] sk_attach_filter+0x72/0x2e0 [ 110.502603] sock_setsockopt+0x336e/0x46f0 [ 110.506895] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 110.512331] __sys_setsockopt+0x33e/0x560 [ 110.516557] __x64_sys_setsockopt+0x15c/0x1c0 [ 110.521104] do_syscall_64+0x154/0x220 [ 110.525041] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.530261] RIP: 0033:0x455a09 [ 110.533484] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 110.541237] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 2018/05/16 16:31:27 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) [ 110.548541] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 110.555844] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 110.563243] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 110.570546] R13: 00000000000005de R14: 00000000006fcd70 R15: 000000000000000b 2018/05/16 16:31:27 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:27 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:27 executing program 4 (fault-call:2 fault-nth:1): r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:27 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:27 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x82, 0x0) syz_open_pts(r1, 0x2000) sync_file_range(r0, 0x8, 0x7fffffff, 0x4) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) io_setup(0x8, &(0x7f0000000000)) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) r2 = dup2(r0, r0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) 2018/05/16 16:31:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:27 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:27 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x84, 0x400040) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000000c0)={0xd2, 0x5b, 0x5, 0x3, 0x2, 0x3, 0x6, 0x80000001, 0x1, 0x80000001}) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000040)="c8d63f23", 0xfe2b) 2018/05/16 16:31:27 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x82, 0x0) syz_open_pts(r1, 0x2000) sync_file_range(r0, 0x8, 0x7fffffff, 0x4) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) io_setup(0x8, &(0x7f0000000000)) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) r2 = dup2(r0, r0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) 2018/05/16 16:31:28 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:28 executing program 6 (fault-call:1 fault-nth:12): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:28 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:28 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:28 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:28 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x82, 0x0) syz_open_pts(r1, 0x2000) sync_file_range(r0, 0x8, 0x7fffffff, 0x4) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) io_setup(0x8, &(0x7f0000000000)) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) r2 = dup2(r0, r0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) 2018/05/16 16:31:28 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000080)="6d99d152a44c59e1820f35113b7a5e80556a4000000000000000000000", 0x1d) 2018/05/16 16:31:28 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 111.230832] FAULT_INJECTION: forcing a failure. [ 111.230832] name failslab, interval 1, probability 0, space 0, times 0 [ 111.242342] CPU: 0 PID: 7521 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 111.249585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.258980] Call Trace: [ 111.261619] dump_stack+0x185/0x1d0 [ 111.265303] should_fail+0x87b/0xab0 [ 111.269069] __should_failslab+0x278/0x2a0 [ 111.273374] should_failslab+0x29/0x70 [ 111.277395] __kmalloc+0xc5/0x350 [ 111.280910] ? __sk_attach_prog+0x8c/0x570 [ 111.285197] ? sk_attach_filter+0x107/0x2e0 [ 111.289583] __sk_attach_prog+0x8c/0x570 [ 111.293717] sk_attach_filter+0x107/0x2e0 [ 111.297940] sock_setsockopt+0x336e/0x46f0 [ 111.302234] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 111.307670] __sys_setsockopt+0x33e/0x560 [ 111.311905] __x64_sys_setsockopt+0x15c/0x1c0 [ 111.316464] do_syscall_64+0x154/0x220 [ 111.320411] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 111.325630] RIP: 0033:0x455a09 2018/05/16 16:31:28 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x82, 0x0) syz_open_pts(r1, 0x2000) sync_file_range(r0, 0x8, 0x7fffffff, 0x4) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) io_setup(0x8, &(0x7f0000000000)) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) dup2(r0, r0) 2018/05/16 16:31:28 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:28 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:28 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r3, 0x280080) sendfile(0xffffffffffffffff, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 111.328840] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 111.336592] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 111.343895] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 111.351206] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 111.358510] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 111.365821] R13: 00000000000005de R14: 00000000006fcd70 R15: 000000000000000c 2018/05/16 16:31:28 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:28 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) getpeername(r0, &(0x7f0000000040)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000100)=0x5, 0x4) 2018/05/16 16:31:28 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x82, 0x0) syz_open_pts(r1, 0x2000) sync_file_range(r0, 0x8, 0x7fffffff, 0x4) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) io_setup(0x8, &(0x7f0000000000)) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) 2018/05/16 16:31:28 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:28 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socket$inet(0x10, 0x80800, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000005c0), 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:28 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:28 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(r1, &(0x7f0000000500)={&(0x7f00000001c0)=@ipx={0x4, 0x6, 0x1, "5ac87c58ebe4", 0x3eaa}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004840}, 0x4811) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r3 = dup(r2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r3, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r4, 0x280080) sendfile(r3, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/16 16:31:28 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000000)={0x1d}, 0x10) sendmsg(r0, &(0x7f0000001640)={&(0x7f0000000040)=@nfc={0x27, 0x1, 0x2, 0x6}, 0x80, &(0x7f0000000480)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="4e7eb1bcac76b9e8fd73760f51f9b6854313f202c3a99a8b5fb778ce7f3263282786563dfa88095e6b6774b54feba33c449bf4a4a152bd7fd8ccab44cd3c0634c6a67ed9b769966f3d5550367bbec1cd97df45dd9b9e4b74e5fb6a492c810b593fdac677227c01a141d92ca17b687645e9278e1e75e9184c", 0x78}, {&(0x7f0000000180)="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", 0xfd}, {&(0x7f0000000280)="d5600bf292ecea7035e548f45effaeead4c57dde054f1ea9f9148da8e27bf5d9558739869f112aae342607aae55e5650d0851c95c63bfab14492b0477fcd06348a557a4985b8e832cc0a527084ae9034c2a9e85e50cc0b685723aed457e40df362701848182a0b8b31de3954088d65", 0x6f}, {&(0x7f0000000300)="36694ca6796dbb10184491aa3cc942811a66cde5324d8457f2849b347a6f06", 0x1f}, {&(0x7f0000000340)="bc9498b683ae0c2a4a20e981023e039ad13277caab04cc2e74292c016c28a5f364751d1c546a9f884da24ef52f7c09350122514cf424", 0x36}, {&(0x7f0000000380)="a1d3550f9f6b9c3443b29ab0fadd551567c599e4754c5ff64beadc7d4c1211147957747fb395649ce67f1958c3c773feb4a37ebbdcf9c73cd6f520bd178acdd07488bc6493a7e38aaff795cf308665da879bb2ded87a961993bae43a16c428d3ccf73f52b84b2a8c03", 0x69}, {&(0x7f0000000400)="6ca80af312c2a6f6594352bb19b19da11f7bd477bcb52d48200fe0612bd0e3bfcba110c0ea803c89d1fa8ee22c46f223469ee938a520e15c0bd9c9aec4075d283ba3d49034f5f5", 0x47}], 0x8, &(0x7f0000000500)=[{0x70, 0x18c, 0x5, "8fcfa5c73f9b4b7e2baa3ac1eb74c461273d6fe9004ffa159aca1d507a078d7f050746b42e1d4238be4a6431cdd7f328c1b58d75d4034799fc61c8f75b74b7d50916263627d5ce65596b5bd78e7034fa6ca14c7a1dba97faa791fb63cd7d15af"}, {0x60, 0x1ff, 0xff, "56729089c42afcbb393ff563fac9c235a3f0f8c42579df47d14ff8d247da5ed9aacc90561d082522ce85116b421bebcabf8a30d4421717525344f398b8779a6d90098e63ad614045e1b0eed678fcee"}, {0x1010, 0x1ff, 0x101, "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"}, {0x58, 0x115, 0x80000001, "33637875a92be53d8dbddf1f075bd26796970e979f10713081b3b9e323929d7d991f16f3f7aac924d8ce34f0d658532feab154ad8dff63be2d505dfae0592f3e5bf5c7b6db71ff"}], 0x1138}, 0x4800) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:28 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000007000)={'vcan0\x00', 0x0}) bind$can_raw(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r2}, 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="c8d63f23", 0x4) 2018/05/16 16:31:28 executing program 6 (fault-call:1 fault-nth:13): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 2018/05/16 16:31:28 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x82, 0x0) syz_open_pts(r1, 0x2000) sync_file_range(r0, 0x8, 0x7fffffff, 0x4) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) io_setup(0x8, &(0x7f0000000000)) [ 111.811265] FAULT_INJECTION: forcing a failure. [ 111.811265] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 111.823138] CPU: 1 PID: 7572 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 111.830335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.839695] Call Trace: [ 111.842319] dump_stack+0x185/0x1d0 [ 111.845982] should_fail+0x87b/0xab0 [ 111.849767] __alloc_pages_nodemask+0x61c/0x5dd0 [ 111.854542] ? kernel_poison_pages+0x40/0x360 [ 111.859052] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 111.864429] ? kernel_poison_pages+0x1a0/0x360 [ 111.869048] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 111.874523] ? get_page_from_freelist+0xab28/0xb600 [ 111.879553] ? queued_spin_lock_slowpath+0x96a/0xab0 [ 111.884676] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 111.890057] ? kernel_poison_pages+0x1a0/0x360 [ 111.894663] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 111.899620] ? kmsan_set_origin_inline+0x6b/0x120 [ 111.904477] ? __alloc_pages_nodemask+0xb09/0x5dd0 [ 111.909422] kmsan_alloc_page+0x82/0xe0 [ 111.913417] __alloc_pages_nodemask+0xf8e/0x5dd0 [ 111.918178] ? is_bpf_text_address+0xb4/0x4b0 [ 111.922678] ? kernel_text_address+0x34d/0x3a0 [ 111.928399] ? __kernel_text_address+0x34/0xe0 [ 111.932995] ? __alloc_pages_nodemask+0xf8e/0x5dd0 [ 111.937935] alloc_pages_current+0x6b5/0x970 [ 111.942361] __change_page_attr_set_clr+0x1904/0x5de0 [ 111.947671] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 111.953050] ? update_load_avg+0x21fe/0x2d00 [ 111.957497] __change_page_attr_set_clr+0x4f86/0x5de0 [ 111.962700] ? rcu_segcblist_enqueue+0x189/0x2d0 [ 111.967489] ? kmsan_set_origin_inline+0x6b/0x120 [ 111.972356] ? __msan_poison_alloca+0x15c/0x1d0 [ 111.977048] ? __purge_vmap_area_lazy+0x2f0/0x3b0 [ 111.981921] ? __purge_vmap_area_lazy+0x2f0/0x3b0 [ 111.986823] ? __purge_vmap_area_lazy+0x369/0x3b0 [ 111.991698] ? mutex_unlock+0x15/0x80 [ 111.995526] change_page_attr_set_clr+0x8ea/0x1e00 [ 112.000483] set_memory_ro+0xd0/0x100 [ 112.004301] bpf_prog_select_runtime+0x3a5/0xa40 [ 112.009077] bpf_prepare_filter+0x1a96/0x1b10 [ 112.013589] __get_filter+0x5b7/0x7d0 [ 112.017401] sk_attach_filter+0x72/0x2e0 [ 112.021469] sock_setsockopt+0x336e/0x46f0 [ 112.025713] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 112.031083] __sys_setsockopt+0x33e/0x560 [ 112.035242] __x64_sys_setsockopt+0x15c/0x1c0 [ 112.039761] do_syscall_64+0x154/0x220 [ 112.043667] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 112.048857] RIP: 0033:0x455a09 [ 112.052047] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 112.059760] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 112.067030] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 112.074306] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 112.081772] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 112.089058] R13: 00000000000005de R14: 00000000006fcd70 R15: 000000000000000d [ 112.096830] WARNING: CPU: 1 PID: 7572 at ./include/linux/filter.h:651 bpf_prog_select_runtime+0x95b/0xa40 [ 112.106582] Kernel panic - not syncing: panic_on_warn set ... 2018/05/16 16:31:28 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x82, 0x0) syz_open_pts(r1, 0x2000) sync_file_range(r0, 0x8, 0x7fffffff, 0x4) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/05/16 16:31:28 executing program 7: socket$inet(0x10, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0x4004743c, &(0x7f00000007c0)=""/174) r1 = dup(r0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14, 0x0) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x84) unlink(&(0x7f0000000600)='./file0\x00') bind$netrom(0xffffffffffffffff, &(0x7f0000000540)=@full={{0x3, {"d3a1c5aff2b1e3"}}, [{"bf9399cb234deb"}, {"5fa1e2dd59c527"}, {"328d8df869bcd2"}, {"745815688ffccb"}, {"0464405ab94326"}, {"ff37f6f4a37b1d"}, {"e680a882a4b123"}, {"3311e1a1ce0639"}]}, 0x48) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x202, 0x4) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x66) ftruncate(r2, 0x280080) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2008000fffffffe) [ 112.106582] [ 112.114016] CPU: 1 PID: 7572 Comm: syz-executor6 Not tainted 4.17.0-rc5+ #95 [ 112.121269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.130659] Call Trace: [ 112.133297] dump_stack+0x185/0x1d0 [ 112.136989] panic+0x39d/0x940 [ 112.140261] ? disable_trace_on_warning+0x18/0xd0 [ 112.145163] __warn+0x40f/0x580 [ 112.148490] ? bpf_prog_select_runtime+0x95b/0xa40 [ 112.153485] report_bug+0x72a/0x880 [ 112.157168] ? bpf_prog_select_runtime+0x95b/0xa40 [ 112.162156] do_error_trap+0x1cc/0x620 [ 112.166134] ? change_page_attr_set_clr+0xb1c/0x1e00 [ 112.171333] do_invalid_op+0x46/0x50 [ 112.175119] invalid_op+0x14/0x20 [ 112.178615] RIP: 0010:bpf_prog_select_runtime+0x95b/0xa40 [ 112.184177] RSP: 0018:ffff88014d87fa00 EFLAGS: 00010287 [ 112.189610] RAX: ffffffff8176dc5b RBX: ffff88014e5a4358 RCX: 0000000000040000 [ 112.196917] RDX: ffffc90003fac000 RSI: 000000000001fa8a RDI: 000000000001fa8b [ 112.204240] RBP: ffff88014d87fad0 R08: 00000000000000d9 R09: ffff88014e45f7a0 [ 112.211552] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 112.218863] R13: 0000000000000004 R14: 00000000fffffff4 R15: ffffc90001581000 [ 112.226206] ? bpf_prog_select_runtime+0x95b/0xa40 [ 112.231212] bpf_prepare_filter+0x1a96/0x1b10 [ 112.235805] __get_filter+0x5b7/0x7d0 [ 112.239778] sk_attach_filter+0x72/0x2e0 [ 112.243953] sock_setsockopt+0x336e/0x46f0 [ 112.248256] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 112.253701] __sys_setsockopt+0x33e/0x560 [ 112.257936] __x64_sys_setsockopt+0x15c/0x1c0 [ 112.262492] do_syscall_64+0x154/0x220 [ 112.266420] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 112.271623] RIP: 0033:0x455a09 [ 112.274828] RSP: 002b:00007fed316bfc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 112.282546] RAX: ffffffffffffffda RBX: 00007fed316c06d4 RCX: 0000000000455a09 [ 112.289822] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 112.297109] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 112.304392] R10: 0000000020004ff0 R11: 0000000000000246 R12: 0000000000000015 [ 112.311682] R13: 00000000000005de R14: 00000000006fcd70 R15: 000000000000000d [ 112.319492] Dumping ftrace buffer: [ 112.323034] (ftrace buffer empty) [ 112.326733] Kernel Offset: disabled [ 112.330356] Rebooting in 86400 seconds..