INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.1' (ECDSA) to the list of known hosts. 2018/04/20 20:34:11 fuzzer started 2018/04/20 20:34:12 dialing manager at 10.128.0.26:40315 2018/04/20 20:34:18 kcov=true, comps=false 2018/04/20 20:34:21 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000500)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) close(r0) 2018/04/20 20:34:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000005e40)={&(0x7f0000002700)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005d80), 0x0, &(0x7f0000004a00)=""/8, 0x8}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f000000bb40)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f000000bb00)={&(0x7f000000b280)={0x144, 0x0, 0x0, 0x0, 0x0, {0x1}, [{{0x8, 0x1}, {0x128, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}, {0x8, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xe6bb}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6}}}]}}]}, 0x144}, 0x1, 0x0, 0x0, 0x6d4964b0aa567be0}, 0x10) 2018/04/20 20:34:21 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x14, &(0x7f0000000080)=""/4096, &(0x7f0000000040)=0x1276) 2018/04/20 20:34:21 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x237000)=nil, 0x237000, 0xc, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 2018/04/20 20:34:21 executing program 2: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev={0xac, 0x14, 0x14}, 0x0, 0x32}, 0x0, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x0, 0x0, 0x9, 0x5, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, 0x1c) 2018/04/20 20:34:21 executing program 3: r0 = socket$inet(0x2, 0x80a, 0x0) getsockname$packet(r0, &(0x7f0000007d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000007d80)=0x14) 2018/04/20 20:34:21 executing program 5: pipe2(&(0x7f00008df000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000b0c000)="ff2385511173befd8b633d6cddaedff34a72adad9e603388337d63f7ae0e8fd3bc7bc5933a18eb123d705e21a238a5216d7952fd5de771699553eaa81d9270ffadf128c28331b837653a14c9073482aeb4309af5d21653af1df6ffab615d06603397e79355dedaaebb79c197525f2422ff3fcd29e3bf72a9dc57da0de4f589e09fc21d89af7cf6d038ca9d82a7d58bb96226e856699100003086243c80482d59ad9d47728ccfb3fe08a4ae74fa3e6743", 0xb0}], 0x1, 0x0) readv(r0, &(0x7f0000dd1000)=[{&(0x7f0000000040)=""/176, 0xb0}], 0x10000000000001a0) 2018/04/20 20:34:21 executing program 6: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f00000000c0)="1f000000160007f2000094ffa4000800000000000000000000000000f30004", 0x1f) syzkaller login: [ 45.099300] ip (3903) used greatest stack depth: 54200 bytes left [ 45.420275] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.426823] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.461601] device bridge_slave_0 entered promiscuous mode [ 45.486951] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.493410] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.514527] device bridge_slave_0 entered promiscuous mode [ 45.556749] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.563241] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.596809] device bridge_slave_0 entered promiscuous mode [ 45.611315] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.617759] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.640850] device bridge_slave_0 entered promiscuous mode [ 45.681875] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.688400] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.738067] device bridge_slave_1 entered promiscuous mode [ 45.753071] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.759544] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.783984] device bridge_slave_1 entered promiscuous mode [ 45.791117] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.797607] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.805762] device bridge_slave_0 entered promiscuous mode [ 45.820920] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.827395] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.866812] device bridge_slave_1 entered promiscuous mode [ 45.875704] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.882182] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.904648] device bridge_slave_0 entered promiscuous mode [ 45.916547] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.923149] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.936128] device bridge_slave_0 entered promiscuous mode [ 45.946699] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.954657] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.961130] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.993014] device bridge_slave_1 entered promiscuous mode [ 46.024791] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.031260] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.048470] device bridge_slave_1 entered promiscuous mode [ 46.055356] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.063656] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.070116] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.083790] device bridge_slave_0 entered promiscuous mode [ 46.098937] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.106459] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.112958] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.139376] device bridge_slave_1 entered promiscuous mode [ 46.148715] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.155221] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.188605] device bridge_slave_1 entered promiscuous mode [ 46.212977] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.222575] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.232909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.248697] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.255245] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.307072] device bridge_slave_1 entered promiscuous mode [ 46.315913] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.325973] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.343902] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.412121] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.447271] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.524825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.534701] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.566439] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.635556] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.769291] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.207284] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.217294] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.319237] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.385526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.412627] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.433651] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.509380] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.537107] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.596846] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.604213] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.614733] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.700488] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.748682] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.800644] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.811508] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.901424] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.430389] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.450673] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.584327] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.608083] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.655164] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.674971] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.748811] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.784403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.794145] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.806694] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.816092] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.865541] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.876317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.894803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.941479] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.950395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.981371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.998448] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.005867] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.020362] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.027601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.053119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.081917] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.089845] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.103445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.119982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.152105] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.160208] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.168187] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.178550] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.195687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.221361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.246615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.269808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.285656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.304805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.323301] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.330665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.341096] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.351445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.369240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.396464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.416796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.433218] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.445395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.462183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.480962] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.489246] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.502367] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.510468] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.519252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.545417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.584652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.622222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.650598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.660738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.668844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.677199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.717617] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.728798] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.739122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.751251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.780484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.813774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.014217] ip (4337) used greatest stack depth: 53976 bytes left [ 51.559120] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.565598] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.572517] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.579173] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.652279] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.658780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.695097] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.701590] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.708462] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.714925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.805977] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.856577] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.863126] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.869973] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.876439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.916164] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.932843] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.939315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.946228] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.952687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.962799] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.972918] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.979377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.986258] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.992721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.029996] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.039883] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.046354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.053230] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.059689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.123863] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.136522] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.143005] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.150675] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.157152] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.176308] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.233723] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.240223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.247134] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.253593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.337140] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.703152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.711740] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.745346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.754951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.762535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.770522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.777930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.858233] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.187113] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.210862] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.306679] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.407565] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.541985] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.594631] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.603165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.616681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.693975] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.819134] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.949661] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.955989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.964099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.016769] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.023886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.040620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.169306] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.178766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.190232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.255118] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.261552] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.276005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.494780] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.501361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.517294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.548305] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.557541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.569609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.606472] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.614830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.625518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/20 20:34:47 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000a09000)='./file0\x00', 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x89d7fd34f9410f87, 0x0) [ 67.720393] syz-executor3 uses obsolete (PF_INET,SOCK_PACKET) 2018/04/20 20:34:47 executing program 6: 2018/04/20 20:34:47 executing program 3: 2018/04/20 20:34:47 executing program 6: 2018/04/20 20:34:48 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f000086c000)='./file0\x00', 0x103d, 0x0) open$dir(&(0x7f00004be000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000c89000)='./file0\x00', 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2, 0x0) 2018/04/20 20:34:48 executing program 6: 2018/04/20 20:34:48 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f0000004640)={&(0x7f0000000000)=@kern={0x10}, 0xc, &(0x7f0000000180)=[{&(0x7f0000000240)={0x10, 0x38, 0x801}, 0x10}], 0x1, &(0x7f0000004600)}, 0x0) 2018/04/20 20:34:48 executing program 3: 2018/04/20 20:34:48 executing program 7: r0 = getpgrp(0x0) capget(&(0x7f0000000380)={0x20080522, r0}, &(0x7f00000003c0)) 2018/04/20 20:34:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0xaf01, &(0x7f0000000280)) r1 = eventfd(0x80000002) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000857ff8)={0x0, r1}) write$eventfd(r1, &(0x7f0000000040), 0x8) 2018/04/20 20:34:48 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0xaf01, &(0x7f0000000280)) r1 = eventfd(0x80000002) write$eventfd(r1, &(0x7f0000000080)=0xffffffffffffff90, 0x8) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000857ff8)={0x0, r1}) write$eventfd(r1, &(0x7f0000000040), 0x8) 2018/04/20 20:34:48 executing program 2: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev={0xac, 0x14, 0x14}, 0x0, 0x32}, 0x0, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x0, 0x0, 0x9, 0x5, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, 0x1c) 2018/04/20 20:34:48 executing program 3: 2018/04/20 20:34:48 executing program 6: 2018/04/20 20:34:48 executing program 7: 2018/04/20 20:34:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000062fec), &(0x7f00004e0000)=0x14) 2018/04/20 20:34:49 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0xaf01, &(0x7f0000000280)) r1 = eventfd(0x80000002) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000857ff8)={0x0, r1}) write$eventfd(r1, &(0x7f0000000040), 0x8) 2018/04/20 20:34:49 executing program 1: 2018/04/20 20:34:49 executing program 6: 2018/04/20 20:34:49 executing program 3: 2018/04/20 20:34:49 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_getres(0xffffdffffffffff1, &(0x7f0000000300)) 2018/04/20 20:34:49 executing program 5: clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) wait4(0x0, 0x0, 0x40000000, &(0x7f0000781f70)) getrusage(0xffffffffffffffff, &(0x7f0000000000)) 2018/04/20 20:34:49 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f000086c000)='./file0\x00', 0x103d, 0x0) open$dir(&(0x7f00004be000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000c89000)='./file0\x00', 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2, 0x0) 2018/04/20 20:34:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000fea000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f000079bff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x8f78, 0x1) sendfile(r1, r2, &(0x7f00009caff8), 0x1000000008) 2018/04/20 20:34:49 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000100)={"62726f7574658400"}, &(0x7f0000000040)=0x78) 2018/04/20 20:34:49 executing program 1: r0 = socket$inet(0x2, 0x20000000000003, 0x40000000000002) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xc9, &(0x7f0000000d08)=@security={'security\x00', 0xe, 0x4, 0x310, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0x4, &(0x7f0000d31000), {[{{@uncond, 0x0, 0x98, 0xc0}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@loopback=0x7f000001, @rand_addr}, 0x0, 0x98, 0xc0}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00'}}, {{@ip={@multicast1=0xe0000001}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0x70}}}}, 0x370) 2018/04/20 20:34:49 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigsuspend(&(0x7f000069dff8), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000013) 2018/04/20 20:34:49 executing program 7: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000032fef)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000ff4)) 2018/04/20 20:34:49 executing program 2: r0 = socket(0x1f, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000040)=@ethtool_ts_info={0x32}}) 2018/04/20 20:34:50 executing program 6: r0 = socket(0x18, 0x0, 0x1) mmap(&(0x7f0000000000/0xfd5000)=nil, 0xfd5000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x111, 0x11, &(0x7f000087bff8), &(0x7f0000f5fffc)=0x8) 2018/04/20 20:34:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000000040)={0x14, 0x25, 0xaff, 0x0, 0x0, {0x3801}}, 0x14}, 0x1}, 0x0) 2018/04/20 20:34:50 executing program 1: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0xa4}) bpf$PROG_LOAD(0x5, &(0x7f000095c000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, [@jmp={0x5, 0x0, 0x1, 0x0, 0x0, 0x1}], {0x95}}, &(0x7f000040dff6)='syzkaller\x00', 0x1, 0x29e, &(0x7f000000a000)=""/195}, 0x48) 2018/04/20 20:34:50 executing program 2: clock_adjtime(0x5, &(0x7f0000000200)) 2018/04/20 20:34:50 executing program 7: mmap(&(0x7f0000ee5000/0x2000)=nil, 0x2000, 0x5, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}, {0xa}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, 0x5c) 2018/04/20 20:34:50 executing program 5: clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) wait4(0x0, 0x0, 0x40000000, &(0x7f0000781f70)) getrusage(0xffffffffffffffff, &(0x7f0000000000)) 2018/04/20 20:34:50 executing program 0: timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x14, 0x0, @thr={&(0x7f0000a85f68), &(0x7f00009d0000)}}, &(0x7f0000454000)) clock_gettime(0x0, &(0x7f0000634ff0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000ee7fe0)={{}, {0x0, r0+10000000}}, &(0x7f0000557000)) timer_settime(0x0, 0x0, &(0x7f00007af000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 2018/04/20 20:34:50 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2004c000, &(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 2018/04/20 20:34:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x3, 0xa96, 0xfffffffffffffffc, 0x12}, 0x2c) 2018/04/20 20:34:50 executing program 1: r0 = socket$inet(0x2, 0x80006, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x100000000000001, 0x31, &(0x7f00001a4000)=@security={'-ecurity\x00', 0xe, 0x4, 0x260, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0x4, &(0x7f0000023000), {[{{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28}}, {{@ip={@loopback=0x7f000001, @rand_addr}, 0x0, 0x268, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@ip={@multicast2=0xe0000002, @multicast1=0xe0000001}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0x70}}}}, 0x2c0) 2018/04/20 20:34:50 executing program 3: r0 = timerfd_create(0x0, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000100)) timerfd_gettime(r0, &(0x7f00007f6fe0)) 2018/04/20 20:34:50 executing program 7: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000001300)="d8", 0x1) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) fallocate(r0, 0x0, 0x0, 0x8000) 2018/04/20 20:34:50 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000080)="0c1cf26673efd230f0396369fb031bd5bb5950e420af328d7b73fe7dcbdf454e"}) 2018/04/20 20:34:50 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='vcan0\x00', 0x10) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x800000020000000, &(0x7f0000303000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r0, &(0x7f0000818ff0)=[{&(0x7f0000000140)="0b9a95785f11e0e7b6f4de7afeabc7fc7700481d21aa090ef74dd23f6917aa54cc", 0x21}], 0x1) 2018/04/20 20:34:51 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000011000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) sendmsg(r0, &(0x7f00000011c0)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000001140), 0x0, &(0x7f0000001180)}, 0x0) 2018/04/20 20:34:51 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}) 2018/04/20 20:34:51 executing program 5: r0 = socket(0x1e, 0x2, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0800000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00006e9c68)}, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x663, 0x0, 0x400, 0x0, r1}, &(0x7f00000000c0)=0x10) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000b80)=@filter={'filter\x00', 0xe, 0x5, 0x370, [0x0, 0x20000140, 0x200005f0, 0x20000990], 0x0, &(0x7f0000000100), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x0, 0x1, 0x0, 'bridge0\x00', 'ip6gretap0\x00', 'lo\x00', 'bridge0\x00', @link_local={0x1, 0x80, 0xc2}, [0x0, 0xff], @random="9f15b4aecdab", [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x1a0, 0x1f0}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0xff, 'system_u:object_r:iptables_initrc_exec_t:s0\x00'}}}]}, @common=@log={'log\x00', 0x28, {{0x85, "62550f7e0195448c7b4429a446297b800f50260dd9e1d25592aef0c1c9ca", 0x9}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff}, {0x0, '\x00', 0x4, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x34, 0x0, 'ifb0\x00', 'ip_vti0\x00', 'dummy0\x00', 'vcan0\x00', @link_local={0x1, 0x80, 0xc2}, [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], @random="5b125d8529bd", [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0x70, 0xa0, 0xf0}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x4, 'syz1\x00', 0x1ff}}}}]}]}, 0x3e8) 2018/04/20 20:34:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) 2018/04/20 20:34:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000ac3000)=@raw, &(0x7f0000000080)="47505d04", 0x17, 0xffffffffffffffe4, &(0x7f0000004f99)=""/103}, 0xfffffffffffffd49) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x7}], {0x95}}, &(0x7f000000a000)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000011f3d)=""/195}, 0x48) [ 71.212528] ================================================================== [ 71.219946] BUG: KMSAN: uninit-value in tipc_node_get_mtu+0x200/0x7a0 [ 71.226525] CPU: 0 PID: 5920 Comm: syz-executor5 Not tainted 4.16.0+ #84 [ 71.233359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.242711] Call Trace: [ 71.245305] dump_stack+0x185/0x1d0 [ 71.248937] ? tipc_node_get_mtu+0x200/0x7a0 [ 71.253348] kmsan_report+0x142/0x240 [ 71.257154] __msan_warning_32+0x6c/0xb0 2018/04/20 20:34:51 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392d450ff1fb635a5849d20600000000000000e118a8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2bb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x35, &(0x7f00000000c0)}, 0x10) [ 71.261223] tipc_node_get_mtu+0x200/0x7a0 [ 71.265482] __tipc_sendmsg+0x1b32/0x41c0 [ 71.269649] ? kmsan_set_origin_inline+0x6b/0x120 [ 71.274493] ? __msan_poison_alloca+0x15c/0x1d0 [ 71.279165] ? local_bh_enable+0x36/0x40 [ 71.283249] tipc_sendmsg+0xeb/0x140 [ 71.286967] ? tipc_recvmsg+0x1c30/0x1c30 [ 71.291119] ___sys_sendmsg+0xec0/0x1310 [ 71.295199] ? __fdget+0x4e/0x60 [ 71.298578] SYSC_sendmsg+0x2a3/0x3d0 [ 71.302396] SyS_sendmsg+0x54/0x80 [ 71.305938] do_syscall_64+0x309/0x430 [ 71.309827] ? ___sys_sendmsg+0x1310/0x1310 [ 71.314156] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 71.319348] RIP: 0033:0x455379 [ 71.322530] RSP: 002b:00007fece0bb7c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 71.330236] RAX: ffffffffffffffda RBX: 00007fece0bb86d4 RCX: 0000000000455379 [ 71.337497] RDX: 0000000000000000 RSI: 0000000020030000 RDI: 0000000000000013 [ 71.344753] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 71.352014] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 71.359274] R13: 00000000000004d5 R14: 00000000006fa498 R15: 0000000000000000 [ 71.366529] [ 71.368142] Local variable description: ----dnode@__tipc_sendmsg [ 71.374259] Variable was created at: [ 71.377959] __tipc_sendmsg+0x20c/0x41c0 [ 71.382005] tipc_sendmsg+0xeb/0x140 [ 71.385700] ================================================================== [ 71.393040] Disabling lock debugging due to kernel taint [ 71.398469] Kernel panic - not syncing: panic_on_warn set ... [ 71.398469] [ 71.405816] CPU: 0 PID: 5920 Comm: syz-executor5 Tainted: G B 4.16.0+ #84 [ 71.413933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.423267] Call Trace: [ 71.425844] dump_stack+0x185/0x1d0 [ 71.429456] panic+0x39d/0x940 [ 71.432648] ? tipc_node_get_mtu+0x200/0x7a0 [ 71.437041] kmsan_report+0x238/0x240 [ 71.440825] __msan_warning_32+0x6c/0xb0 [ 71.444867] tipc_node_get_mtu+0x200/0x7a0 [ 71.449092] __tipc_sendmsg+0x1b32/0x41c0 [ 71.453232] ? kmsan_set_origin_inline+0x6b/0x120 [ 71.458059] ? __msan_poison_alloca+0x15c/0x1d0 [ 71.462710] ? local_bh_enable+0x36/0x40 [ 71.466763] tipc_sendmsg+0xeb/0x140 [ 71.470461] ? tipc_recvmsg+0x1c30/0x1c30 [ 71.474601] ___sys_sendmsg+0xec0/0x1310 [ 71.478652] ? __fdget+0x4e/0x60 [ 71.482014] SYSC_sendmsg+0x2a3/0x3d0 [ 71.485812] SyS_sendmsg+0x54/0x80 [ 71.489332] do_syscall_64+0x309/0x430 [ 71.493214] ? ___sys_sendmsg+0x1310/0x1310 [ 71.497520] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 71.502697] RIP: 0033:0x455379 [ 71.505866] RSP: 002b:00007fece0bb7c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 71.513554] RAX: ffffffffffffffda RBX: 00007fece0bb86d4 RCX: 0000000000455379 [ 71.520803] RDX: 0000000000000000 RSI: 0000000020030000 RDI: 0000000000000013 [ 71.528052] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 71.535303] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 71.542555] R13: 00000000000004d5 R14: 00000000006fa498 R15: 0000000000000000 [ 71.550252] Dumping ftrace buffer: [ 71.553772] (ftrace buffer empty) [ 71.557453] Kernel Offset: disabled [ 71.561058] Rebooting in 86400 seconds..