INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.29' (ECDSA) to the list of known hosts. 2018/04/22 00:52:19 fuzzer started 2018/04/22 00:52:20 dialing manager at 10.128.0.26:42949 syzkaller login: [ 51.233146] can: request_module (can-proto-0) failed. [ 51.244703] can: request_module (can-proto-0) failed. 2018/04/22 00:52:27 kcov=true, comps=false 2018/04/22 00:52:30 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bridge0\x00'}}, 0x1e) write(r0, &(0x7f0000000480), 0x5ea) 2018/04/22 00:52:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065000)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000402ff2)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c0000000a06214e79d082486f78d9a3010000000000000000000000"], 0x1c}, 0x1}, 0x0) 2018/04/22 00:52:30 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000000580)=@generic={0xa, "c8b5edfbf8b1ab4cac8ed75cd4a0b8d86c66d2602bc1631ca5bcf63e5b62213ecbf070a4972c5693b9d145c9009910fa3b07c861485b5d02088225d2f63c71933c905613e2cd98a708a2cb30abf11fec2f649680f60fc4e12d48f918223a404e4df8cbce010891c68841bd5d3df05eb15b6b0a8da58ccfb7d792cf7e45c2"}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000002840)}}], 0x1, 0x0) 2018/04/22 00:52:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}}, [0x0, 0xc0000000000, 0xfffffffffffff226, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad3, 0x8, 0x0, 0x100000001]}, &(0x7f00000002c0)=0x100) sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f00007e0000)=[{&(0x7f0000007000)="fd20932fcc7cfaafcf960802e02348f8fba600069da7b753c31273", 0x1b}], 0x1, &(0x7f0000001100)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000970000)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x65, 0x4000}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2018/04/22 00:52:30 executing program 4: syz_emit_ethernet(0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60d8652b00143c00fe8000000000000000000000000000aafe8000000000000000000000000000aa2f000000", @ANYRES32=0x41424344, @ANYBLOB="5078a5e100000000"], &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0xffffffffffffffff]}) 2018/04/22 00:52:30 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f00000000c0)="260000001a00030207fffd73ffffff188100000003000000031d8568647ba3a2d188637e57e4", 0x26}], 0x1}, 0x0) 2018/04/22 00:52:30 executing program 3: r0 = socket(0x2, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000380)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="12"]}) 2018/04/22 00:52:30 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x101001, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw8={"0761d4767fa3d237484e6aac"}}], 0x30) [ 56.113309] IPVS: ftp: loaded support on port[0] = 21 [ 56.299836] IPVS: ftp: loaded support on port[0] = 21 [ 56.377318] IPVS: ftp: loaded support on port[0] = 21 [ 56.458273] IPVS: ftp: loaded support on port[0] = 21 [ 56.602008] IPVS: ftp: loaded support on port[0] = 21 [ 56.708876] IPVS: ftp: loaded support on port[0] = 21 [ 56.879593] IPVS: ftp: loaded support on port[0] = 21 [ 57.056528] IPVS: ftp: loaded support on port[0] = 21 [ 57.227966] ip (4638) used greatest stack depth: 54312 bytes left [ 58.196715] ip (4714) used greatest stack depth: 53944 bytes left [ 59.000662] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.007193] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.039612] device bridge_slave_0 entered promiscuous mode [ 59.260125] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.266688] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.292411] device bridge_slave_1 entered promiscuous mode [ 59.366957] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.373475] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.411313] device bridge_slave_0 entered promiscuous mode [ 59.535163] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.656894] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.663446] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.712870] device bridge_slave_1 entered promiscuous mode [ 59.825908] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.838095] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.844642] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.898270] device bridge_slave_0 entered promiscuous mode [ 59.947873] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.030397] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.036908] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.085287] device bridge_slave_0 entered promiscuous mode [ 60.122471] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.129124] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.161279] device bridge_slave_1 entered promiscuous mode [ 60.183771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.297890] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.304447] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.357666] device bridge_slave_0 entered promiscuous mode [ 60.379414] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.385948] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.398570] device bridge_slave_1 entered promiscuous mode [ 60.425342] ip (4876) used greatest stack depth: 53656 bytes left [ 60.428336] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.492847] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.592416] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.598942] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.618285] device bridge_slave_1 entered promiscuous mode [ 60.649210] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.655697] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.663502] device bridge_slave_0 entered promiscuous mode [ 60.675882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.712682] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.719194] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.758274] device bridge_slave_0 entered promiscuous mode [ 60.788977] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.799837] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.815457] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.821971] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.860209] device bridge_slave_1 entered promiscuous mode [ 60.901112] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.910455] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.917231] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.952069] device bridge_slave_0 entered promiscuous mode [ 60.961706] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.983139] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.991598] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.998194] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.024473] device bridge_slave_1 entered promiscuous mode [ 61.052914] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.061008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.094162] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.148882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.180658] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.190519] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.197130] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.230806] device bridge_slave_1 entered promiscuous mode [ 61.278273] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.288931] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.297805] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.304929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.352640] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.442328] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.449390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.470350] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.547657] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.587011] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.676348] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.690675] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.729757] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.738193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.818251] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.828854] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.839325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.916373] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.954699] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.053836] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.082838] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.130480] team0: Port device team_slave_0 added [ 62.176752] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.183829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.245305] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.279476] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.286551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.315229] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.377218] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.401168] team0: Port device team_slave_1 added [ 62.419904] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.441608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.476082] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.486547] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.512430] team0: Port device team_slave_0 added [ 62.527218] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.538346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.555662] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.563881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.585478] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.597540] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.605498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.621571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.696331] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.706126] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.745350] team0: Port device team_slave_1 added [ 62.807519] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.816390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.835809] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.843282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.861328] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.880647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.915377] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.967794] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.977922] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.988195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.006829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.016449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.026924] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.041694] team0: Port device team_slave_0 added [ 63.095670] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.104297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.121331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.172398] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.187150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.210877] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.219346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.255669] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.285829] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.304918] team0: Port device team_slave_1 added [ 63.325925] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.345183] team0: Port device team_slave_0 added [ 63.358602] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.366268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.384491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.452827] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.460640] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.468197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.479114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.529748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.564408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.595514] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.603716] team0: Port device team_slave_0 added [ 63.622213] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.635937] team0: Port device team_slave_1 added [ 63.695504] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.707288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.721712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.769798] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.778163] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.795973] team0: Port device team_slave_0 added [ 63.815351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.839599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.862221] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.875097] team0: Port device team_slave_1 added [ 63.891344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.901659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.911145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.941119] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.956364] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.975142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.005659] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.017236] team0: Port device team_slave_0 added [ 64.039296] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.052008] team0: Port device team_slave_0 added [ 64.087789] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.103790] team0: Port device team_slave_1 added [ 64.121290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.131210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.162810] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.201959] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.213528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.240626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.260454] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.268325] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.277570] team0: Port device team_slave_1 added [ 64.300008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.316535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.345509] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.358778] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.380213] team0: Port device team_slave_1 added [ 64.401941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.424012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.447474] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.459880] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.469244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.486481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.505839] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.532310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.562440] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.569851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.581803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.609554] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.629138] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.639735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.665792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.688851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.722502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.742576] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.749987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.762602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.783723] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.790908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.802959] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.825322] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.834652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.851800] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.886273] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.894541] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.904665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.941222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.982623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.007657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.046014] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.053529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.066317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.111369] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.123422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.163684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.197840] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.215696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.250904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.310858] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.321123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.339265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.370292] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.387537] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.429629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.473781] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.481344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.495992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.405755] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.412285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.419279] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.426314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.504469] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.511166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.541834] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.548340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.555288] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.561854] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.588309] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.015741] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.022237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.029173] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.035684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.072913] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.510409] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.516910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.523820] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.530300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.542062] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.556209] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.578465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.597101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.617964] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.624494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.631422] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.637914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.653211] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.753427] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.759965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.766872] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.773381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.835952] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.055364] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.061882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.068760] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.075228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.091957] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.126301] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.132819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.139688] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.146178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.236885] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.575799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.588164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.625435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.649904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 75.646017] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.795292] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.140883] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.325748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.487119] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.701988] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.822503] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.985893] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.125743] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.192866] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.233068] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.278014] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.313297] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.322669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.345959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.514501] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.520929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.534132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.727923] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.857522] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.863894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.875212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.035598] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.107496] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.113975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.127962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.170928] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.187512] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.238169] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.380531] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.616109] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.622457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.645105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.704592] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.832392] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.838755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.853530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.004636] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.118179] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.124543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.138233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.198665] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.207774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.216522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.626758] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.693906] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.000875] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.062327] 8021q: adding VLAN 0 to HW filter on device team0 [ 84.319453] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. [ 84.362329] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 2018/04/22 00:52:59 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bridge0\x00'}}, 0x1e) write(r0, &(0x7f0000000480), 0x5ea) 2018/04/22 00:52:59 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect(r0, &(0x7f00000fefe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "a2fbe8", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @loopback={0x0, 0x1}, [], "fca967e17f791010"}}}}}}}, 0x0) 2018/04/22 00:52:59 executing program 2: 2018/04/22 00:52:59 executing program 1: 2018/04/22 00:52:59 executing program 6: 2018/04/22 00:52:59 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000000580)=@generic={0xa, "c8b5edfbf8b1ab4cac8ed75cd4a0b8d86c66d2602bc1631ca5bcf63e5b62213ecbf070a4972c5693b9d145c9009910fa3b07c861485b5d02088225d2f63c71933c905613e2cd98a708a2cb30abf11fec2f649680f60fc4e12d48f918223a404e4df8cbce010891c68841bd5d3df05eb15b6b0a8da58ccfb7d792cf7e45c2"}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000002840)}}], 0x1, 0x0) 2018/04/22 00:52:59 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f00000000c0)="260000001a00030207fffd73ffffff188100000003000000031d8568647ba3a2d188637e57e4", 0x26}], 0x1}, 0x0) 2018/04/22 00:52:59 executing program 3: 2018/04/22 00:53:00 executing program 2: 2018/04/22 00:53:00 executing program 6: 2018/04/22 00:53:00 executing program 3: 2018/04/22 00:53:00 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xffffffffffffffff) 2018/04/22 00:53:00 executing program 7: 2018/04/22 00:53:00 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bridge0\x00'}}, 0x1e) write(r0, &(0x7f0000000480), 0x5ea) 2018/04/22 00:53:00 executing program 2: 2018/04/22 00:53:00 executing program 4: 2018/04/22 00:53:00 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f00000000c0)="260000001a00030207fffd73ffffff188100000003000000031d8568647ba3a2d188637e57e4", 0x26}], 0x1}, 0x0) 2018/04/22 00:53:00 executing program 7: 2018/04/22 00:53:00 executing program 3: 2018/04/22 00:53:00 executing program 6: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000089000000001e00000000000000000002"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x800008936, &(0x7f0000000000)) 2018/04/22 00:53:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000480)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f284299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d050000000000000000104000000000000000020000003dd06aa3b65988fb000000000000000000000000000000000000000080020000000000700000000000000600000000000000010000000000000000100000001000000010000000100000610000040000000000000002f2ed9ab996", 0xb9, 0x10000}], 0x0, &(0x7f0000014300)) 2018/04/22 00:53:00 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bridge0\x00'}}, 0x1e) write(r0, &(0x7f0000000480), 0x5ea) 2018/04/22 00:53:00 executing program 3: 2018/04/22 00:53:00 executing program 2: add_key(&(0x7f0000000380)='blacklist\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r1, 0x0) 2018/04/22 00:53:00 executing program 4: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000089000000001e00000000000000000002"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x800008936, &(0x7f0000000000)) 2018/04/22 00:53:00 executing program 7: [ 85.502464] BTRFS: device fsid ecf6f284-2997-48ae-b81e-1b00920efd9a devid 0 transid 5 /dev/loop1 2018/04/22 00:53:00 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f00000000c0)="260000001a00030207fffd73ffffff188100000003000000031d8568647ba3a2d188637e57e4", 0x26}], 0x1}, 0x0) 2018/04/22 00:53:00 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) write(r0, &(0x7f0000000480), 0x5ea) 2018/04/22 00:53:00 executing program 6: 2018/04/22 00:53:00 executing program 3: 2018/04/22 00:53:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000480)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f284299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d050000000000000000104000000000000000020000003dd06aa3b65988fb000000000000000000000000000000000000000080020000000000700000000000000600000000000000010000000000000000100000001000000010000000100000610000040000000000000002f2ed9ab996", 0xb9, 0x10000}], 0x0, &(0x7f0000014300)) 2018/04/22 00:53:00 executing program 7: 2018/04/22 00:53:00 executing program 6: 2018/04/22 00:53:00 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f00000000c0)="260000001a00030207fffd73ffffff188100000003000000031d8568647ba3a2d188637e57e4", 0x26}], 0x1}, 0x0) 2018/04/22 00:53:01 executing program 4: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000089000000001e00000000000000000002"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x800008936, &(0x7f0000000000)) 2018/04/22 00:53:01 executing program 2: 2018/04/22 00:53:01 executing program 0: connect$pppoe(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bridge0\x00'}}, 0x1e) write(0xffffffffffffffff, &(0x7f0000000480), 0x5ea) 2018/04/22 00:53:01 executing program 3: 2018/04/22 00:53:01 executing program 6: 2018/04/22 00:53:01 executing program 7: 2018/04/22 00:53:01 executing program 5: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f00000000c0)="260000001a00030207fffd73ffffff188100000003000000031d8568647ba3a2d188637e57e4", 0x26}], 0x1}, 0x0) 2018/04/22 00:53:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000480)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f284299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d050000000000000000104000000000000000020000003dd06aa3b65988fb000000000000000000000000000000000000000080020000000000700000000000000600000000000000010000000000000000100000001000000010000000100000610000040000000000000002f2ed9ab996", 0xb9, 0x10000}], 0x0, &(0x7f0000014300)) 2018/04/22 00:53:01 executing program 6: 2018/04/22 00:53:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/22 00:53:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@setlink={0x20, 0x13, 0x1}, 0x20}, 0x1}, 0x0) 2018/04/22 00:53:01 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={0x0, 0x200}, 0x8) sendto$inet6(r0, &(0x7f00000000c0)='G', 0x1, 0x0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000300)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000003f80)=""/4096, 0x1000}], 0x1}, 0x0) 2018/04/22 00:53:01 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bridge0\x00'}}, 0x1e) write(r0, &(0x7f0000000480), 0x5ea) 2018/04/22 00:53:01 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000080)={0x4, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f0000000040)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 2018/04/22 00:53:01 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f00000000c0)="260000001a00030207fffd73ffffff188100000003000000031d8568647ba3a2d188637e57e4", 0x26}], 0x1}, 0x0) 2018/04/22 00:53:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000480)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f284299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d050000000000000000104000000000000000020000003dd06aa3b65988fb000000000000000000000000000000000000000080020000000000700000000000000600000000000000010000000000000000100000001000000010000000100000610000040000000000000002f2ed9ab996", 0xb9, 0x10000}], 0x0, &(0x7f0000014300)) 2018/04/22 00:53:01 executing program 6: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff80, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}}}}}}}}, 0x0) 2018/04/22 00:53:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000480)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000014300)) 2018/04/22 00:53:01 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bridge0\x00'}}, 0x1e) write(r0, &(0x7f0000000480), 0x5ea) 2018/04/22 00:53:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080)=0xfffffffffffffff7, 0x4) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={0x0, 0x200}, 0x8) sendto$inet6(r0, &(0x7f00000000c0)='G', 0x1, 0x0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000098effc), 0x4) writev(r0, &(0x7f00007f2000)=[{&(0x7f0000001f40)="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", 0x55f}], 0x1) writev(r0, &(0x7f0000000d00)=[{&(0x7f0000000c40)="df", 0x1}], 0x1) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000300)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000003f80)=""/4096, 0x1000}], 0x1}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='\b', 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}}, &(0x7f00000001c0)=0xb0) 2018/04/22 00:53:01 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000080)={0x4, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f0000000040)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 2018/04/22 00:53:01 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f0000000140), 0x150b0000, 0x200007ff, &(0x7f0000003e00)={0x2}, 0x10) [ 86.725232] BTRFS: device label Q devid 0 transid 5 /dev/loop2 2018/04/22 00:53:01 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003000)}, 0x0) 2018/04/22 00:53:01 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000480)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f284299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000014300)) 2018/04/22 00:53:01 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000080)={0x4, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f0000000040)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 2018/04/22 00:53:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000014300)) 2018/04/22 00:53:01 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bridge0\x00'}}, 0x1e) write(0xffffffffffffffff, &(0x7f0000000480), 0x5ea) 2018/04/22 00:53:01 executing program 7: set_mempolicy(0x4, &(0x7f0000000080)=0xf0, 0x8) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffff80, 0x100) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x80000000, 0x4) 2018/04/22 00:53:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000480)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000014300)) 2018/04/22 00:53:02 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003000)}, 0x0) 2018/04/22 00:53:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000014300)) 2018/04/22 00:53:02 executing program 0 (fault-call:2 fault-nth:0): r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bridge0\x00'}}, 0x1e) write(r0, &(0x7f0000000480), 0x5ea) 2018/04/22 00:53:02 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000480)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f284299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000014300)) 2018/04/22 00:53:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080)=0xfffffffffffffff7, 0x4) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={0x0, 0x200}, 0x8) sendto$inet6(r0, &(0x7f00000000c0)='G', 0x1, 0x0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000098effc), 0x4) writev(r0, &(0x7f00007f2000)=[{&(0x7f0000001f40)="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", 0x55f}], 0x1) writev(r0, &(0x7f0000000d00)=[{&(0x7f0000000c40)="df", 0x1}], 0x1) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000300)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000003f80)=""/4096, 0x1000}], 0x1}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='\b', 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}}, &(0x7f00000001c0)=0xb0) 2018/04/22 00:53:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000480)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000014300)) 2018/04/22 00:53:02 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000080)={0x4, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f0000000040)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 2018/04/22 00:53:02 executing program 7: unshare(0x8000400) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x2, 0x19b5, &(0x7f0000000040)=""/4, &(0x7f0000000000)=0x4) [ 87.450965] FAULT_INJECTION: forcing a failure. [ 87.450965] name failslab, interval 1, probability 0, space 0, times 1 [ 87.462660] CPU: 1 PID: 6859 Comm: syz-executor0 Not tainted 4.16.0+ #85 [ 87.469570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.479066] Call Trace: [ 87.481710] dump_stack+0x185/0x1d0 [ 87.485406] should_fail+0x87b/0xab0 [ 87.489191] should_failslab+0x279/0x2a0 [ 87.493323] kmem_cache_alloc_node+0x151/0xc70 2018/04/22 00:53:02 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f0000000040)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) [ 87.498017] ? __alloc_skb+0x203/0x9f0 [ 87.502014] ? kmsan_set_origin_inline+0x6b/0x120 [ 87.506976] __alloc_skb+0x203/0x9f0 [ 87.510793] sock_wmalloc+0x13e/0x6e0 [ 87.514669] pppoe_sendmsg+0x40d/0xbc0 [ 87.518643] ? security_socket_sendmsg+0x9e/0x210 [ 87.523591] ? pppoe_getname+0x190/0x190 [ 87.527742] sock_write_iter+0x3b9/0x470 [ 87.531900] ? sock_read_iter+0x480/0x480 [ 87.536121] __vfs_write+0x7fb/0x9f0 [ 87.539923] vfs_write+0x463/0x8d0 [ 87.543598] SYSC_write+0x172/0x360 [ 87.547352] SyS_write+0x55/0x80 [ 87.550828] do_syscall_64+0x309/0x430 [ 87.554798] ? SYSC_read+0x360/0x360 [ 87.558590] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 87.563960] RIP: 0033:0x455389 [ 87.567192] RSP: 002b:00007f2755e42c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 87.574963] RAX: ffffffffffffffda RBX: 00007f2755e436d4 RCX: 0000000000455389 [ 87.582293] RDX: 00000000000005ea RSI: 0000000020000480 RDI: 0000000000000013 [ 87.589615] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/04/22 00:53:02 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f0000000040)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 2018/04/22 00:53:02 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003000)}, 0x0) 2018/04/22 00:53:02 executing program 7: r0 = socket$rds(0x15, 0x5, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x2300, 0x100) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000001280)={{&(0x7f0000001240)=""/28, 0xffd8}, &(0x7f00000000c0)}, 0x20) [ 87.596931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 87.604248] R13: 00000000000006c1 R14: 00000000006fd2b8 R15: 0000000000000000 2018/04/22 00:53:02 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000480)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f284299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000014300)) 2018/04/22 00:53:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000014300)) 2018/04/22 00:53:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000480)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000014300)) 2018/04/22 00:53:02 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x2, 0x800, 0xffffffff00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={r0, &(0x7f0000000340)="6682f85bebac18dba8e39ee83551d96ef5cd1c554591eb9f9f19ce0cdf541955f78f70ae11892ce2cbcd33d67b4e4c81eef938d2a3de6d129bcc447a89589681c92cfa63c5cea147297249a8f102385027ba88a936f88f31236b1e9f2cb59ff7ce22d8a819e36ab7e94ad44092bde891d123b857c11c0bb272f78450f43166da57e04e78b539ebce5c937ada08d397760856284dc02ea9e864386cb2388dc555db647fb346f657b3e90af02f2d15a35217e411bb154e2bfb2105af38749e1af70d0a94ed60b7ccc8bd16ed4f385d626d4fdce9c0c8470108fb", &(0x7f0000000440)="7ec15986f87e911ccd424b514f1274243ac1d6", 0x3}, 0x20) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x1, 0x8, 0x5, 0xff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r2, 0x10000}, &(0x7f00000001c0)=0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000200)={r2, @in={{0x2, 0x4e22}}, [0x7, 0x3, 0x7, 0x10001, 0x0, 0x0, 0x6, 0x8, 0x6851, 0x7, 0x5, 0xffffffffffff00a5, 0x3, 0x100]}, &(0x7f0000000300)=0x100) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100), &(0x7f0000000100), 0x1}, 0x20) 2018/04/22 00:53:02 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 2018/04/22 00:53:03 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f0000000040)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 2018/04/22 00:53:03 executing program 0 (fault-call:2 fault-nth:1): r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bridge0\x00'}}, 0x1e) write(r0, &(0x7f0000000480), 0x5ea) 2018/04/22 00:53:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000480), 0x0, 0x10000}], 0x0, &(0x7f0000014300)) 2018/04/22 00:53:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000014300)) 2018/04/22 00:53:03 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000480)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f284299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000014300)) 2018/04/22 00:53:03 executing program 7: r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xc2, 0x141100) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100201}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r1, 0x0, 0x70bd2b, 0x25dfdbff, {0x2}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x217}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x60}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x20008044}, 0x8000) unshare(0x2040600) mmap(&(0x7f0000000000/0xd15000)=nil, 0xd15000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000000), 0x10) 2018/04/22 00:53:03 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 2018/04/22 00:53:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080)=0xfffffffffffffff7, 0x4) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={0x0, 0x200}, 0x8) sendto$inet6(r0, &(0x7f00000000c0)='G', 0x1, 0x0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f000098effc), 0x4) writev(r0, &(0x7f00007f2000)=[{&(0x7f0000001f40)="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", 0x55f}], 0x1) writev(r0, &(0x7f0000000d00)=[{&(0x7f0000000c40)="df", 0x1}], 0x1) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000300)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000003f80)=""/4096, 0x1000}], 0x1}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='\b', 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}}, &(0x7f00000001c0)=0xb0) [ 88.266209] FAULT_INJECTION: forcing a failure. [ 88.266209] name failslab, interval 1, probability 0, space 0, times 0 [ 88.277666] CPU: 0 PID: 6917 Comm: syz-executor0 Not tainted 4.16.0+ #85 [ 88.284554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.293956] Call Trace: [ 88.296636] dump_stack+0x185/0x1d0 [ 88.300335] should_fail+0x87b/0xab0 [ 88.304130] should_failslab+0x279/0x2a0 [ 88.308356] __kmalloc_node_track_caller+0x243/0x11c0 2018/04/22 00:53:03 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000080)={0x4, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f0000000040)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) [ 88.313663] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 88.319098] ? sock_wmalloc+0x13e/0x6e0 [ 88.323194] ? kmsan_set_origin_inline+0x6b/0x120 [ 88.328146] __alloc_skb+0x2cf/0x9f0 [ 88.331995] ? sock_wmalloc+0x13e/0x6e0 [ 88.336077] sock_wmalloc+0x13e/0x6e0 [ 88.339969] pppoe_sendmsg+0x40d/0xbc0 [ 88.343993] ? security_socket_sendmsg+0x9e/0x210 [ 88.348968] ? pppoe_getname+0x190/0x190 [ 88.353143] sock_write_iter+0x3b9/0x470 [ 88.357302] ? sock_read_iter+0x480/0x480 [ 88.361514] __vfs_write+0x7fb/0x9f0 [ 88.365309] vfs_write+0x463/0x8d0 [ 88.368971] SYSC_write+0x172/0x360 [ 88.372724] SyS_write+0x55/0x80 [ 88.376192] do_syscall_64+0x309/0x430 [ 88.380158] ? SYSC_read+0x360/0x360 [ 88.383949] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 88.389186] RIP: 0033:0x455389 [ 88.392407] RSP: 002b:00007f2755e42c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 88.400177] RAX: ffffffffffffffda RBX: 00007f2755e436d4 RCX: 0000000000455389 [ 88.407493] RDX: 00000000000005ea RSI: 0000000020000480 RDI: 0000000000000013 [ 88.414808] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 88.422128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 88.429449] R13: 00000000000006c1 R14: 00000000006fd2b8 R15: 0000000000000001 [ 88.462816] ================================================================== [ 88.470256] BUG: KMSAN: uninit-value in btrfs_scan_one_device+0x4b6/0x920 [ 88.477202] CPU: 0 PID: 6928 Comm: syz-executor1 Not tainted 4.16.0+ #85 [ 88.484053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.493424] Call Trace: [ 88.496050] dump_stack+0x185/0x1d0 [ 88.499696] ? btrfs_scan_one_device+0x4b6/0x920 [ 88.504479] kmsan_report+0x142/0x240 [ 88.508303] __msan_warning_32+0x6c/0xb0 2018/04/22 00:53:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000014300)) [ 88.512389] btrfs_scan_one_device+0x4b6/0x920 [ 88.517020] btrfs_mount_root+0x332/0x21b0 [ 88.521294] ? kmsan_set_origin+0x9e/0x160 [ 88.525651] ? btrfs_control_open+0x80/0x80 [ 88.530005] mount_fs+0x296/0x780 [ 88.533483] vfs_kern_mount+0x222/0x990 [ 88.537484] btrfs_mount+0x7fe/0x2db0 [ 88.541320] ? kmsan_set_origin+0x9e/0x160 [ 88.545578] ? btrfs_resize_thread_pool+0x5b0/0x5b0 [ 88.550614] mount_fs+0x296/0x780 [ 88.554191] vfs_kern_mount+0x222/0x990 [ 88.558194] do_mount+0xca5/0x4ed0 2018/04/22 00:53:03 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x58) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x58) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)="0a5ca12e00") r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000a2effc), 0x400) [ 88.561759] ? __kmalloc+0x23c/0x350 [ 88.565502] ? copy_mount_options+0x91/0x540 [ 88.569944] SYSC_mount+0x32e/0x3d0 [ 88.573606] SyS_mount+0x77/0xa0 [ 88.577019] do_syscall_64+0x309/0x430 [ 88.580935] ? put_mnt_ns+0x2f0/0x2f0 [ 88.584763] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 88.589970] RIP: 0033:0x457dba [ 88.593169] RSP: 002b:00007ff4756c0ba8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 88.600902] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000457dba [ 88.608186] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff4756c0bf0 [ 88.615473] RBP: 0000000000000001 R08: 0000000020014300 R09: 0000000020000000 [ 88.622755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 88.630051] R13: 0000000000000001 R14: 00000000006fcb50 R15: 0000000000000000 [ 88.637417] [ 88.639034] Uninit was stored to memory at: [ 88.643381] kmsan_internal_chain_origin+0x12b/0x210 [ 88.648518] kmsan_memcpy_origins+0x11d/0x170 [ 88.653034] __msan_memcpy+0x109/0x160 [ 88.656951] _copy_to_iter+0x852/0x28f0 [ 88.660944] copy_page_to_iter+0x383/0x1b70 [ 88.665307] shmem_file_read_iter+0x99f/0x1180 [ 88.669905] do_iter_readv_writev+0x84d/0xa00 [ 88.674419] do_iter_read+0x303/0xd70 [ 88.678240] vfs_iter_read+0x118/0x180 [ 88.682140] loop_queue_work+0x270e/0x3ef0 [ 88.686376] kthread_worker_fn+0x58f/0x900 [ 88.690635] loop_kthread_worker_fn+0x90/0xb0 [ 88.695151] kthread+0x539/0x720 [ 88.698520] ret_from_fork+0x35/0x40 [ 88.702227] Uninit was created at: [ 88.705792] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 88.710832] kmsan_alloc_page+0x82/0xe0 [ 88.714831] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 88.719613] alloc_pages_vma+0xcc8/0x1800 [ 88.723788] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 88.728828] shmem_getpage_gfp+0x35db/0x5770 [ 88.733263] shmem_file_read_iter+0x508/0x1180 [ 88.737864] do_iter_readv_writev+0x84d/0xa00 [ 88.742382] do_iter_read+0x303/0xd70 [ 88.746208] vfs_iter_read+0x118/0x180 [ 88.750248] loop_queue_work+0x270e/0x3ef0 [ 88.754509] kthread_worker_fn+0x58f/0x900 [ 88.758769] loop_kthread_worker_fn+0x90/0xb0 2018/04/22 00:53:03 executing program 0 (fault-call:2 fault-nth:2): r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bridge0\x00'}}, 0x1e) write(r0, &(0x7f0000000480), 0x5ea) [ 88.763287] kthread+0x539/0x720 [ 88.766671] ret_from_fork+0x35/0x40 [ 88.770397] ================================================================== [ 88.777759] Disabling lock debugging due to kernel taint [ 88.783219] Kernel panic - not syncing: panic_on_warn set ... [ 88.783219] [ 88.790623] CPU: 0 PID: 6928 Comm: syz-executor1 Tainted: G B 4.16.0+ #85 [ 88.798775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.808140] Call Trace: [ 88.810746] dump_stack+0x185/0x1d0 [ 88.814398] panic+0x39d/0x940 [ 88.817632] ? btrfs_scan_one_device+0x4b6/0x920 [ 88.822409] kmsan_report+0x238/0x240 [ 88.826225] __msan_warning_32+0x6c/0xb0 [ 88.830306] btrfs_scan_one_device+0x4b6/0x920 [ 88.834913] btrfs_mount_root+0x332/0x21b0 [ 88.839176] ? kmsan_set_origin+0x9e/0x160 [ 88.843447] ? btrfs_control_open+0x80/0x80 [ 88.847783] mount_fs+0x296/0x780 [ 88.851260] vfs_kern_mount+0x222/0x990 [ 88.855252] btrfs_mount+0x7fe/0x2db0 [ 88.859085] ? kmsan_set_origin+0x9e/0x160 [ 88.863339] ? btrfs_resize_thread_pool+0x5b0/0x5b0 [ 88.868369] mount_fs+0x296/0x780 [ 88.871843] vfs_kern_mount+0x222/0x990 [ 88.875842] do_mount+0xca5/0x4ed0 [ 88.879460] ? __kmalloc+0x23c/0x350 [ 88.883192] ? copy_mount_options+0x91/0x540 [ 88.887620] SYSC_mount+0x32e/0x3d0 [ 88.891268] SyS_mount+0x77/0xa0 [ 88.894655] do_syscall_64+0x309/0x430 [ 88.898565] ? put_mnt_ns+0x2f0/0x2f0 [ 88.902389] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 88.907590] RIP: 0033:0x457dba [ 88.910784] RSP: 002b:00007ff4756c0ba8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 88.918684] RAX: ffffffffffffffda RBX: 0000000020000000 RCX: 0000000000457dba [ 88.927130] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff4756c0bf0 [ 88.934414] RBP: 0000000000000001 R08: 0000000020014300 R09: 0000000020000000 [ 88.941747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 88.949051] R13: 0000000000000001 R14: 00000000006fcb50 R15: 0000000000000000 [ 88.957062] Dumping ftrace buffer: [ 88.960603] (ftrace buffer empty) [ 88.964291] Kernel Offset: disabled [ 88.967904] Rebooting in 86400 seconds..