INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.44' (ECDSA) to the list of known hosts. 2018/05/06 10:14:23 fuzzer started 2018/05/06 10:14:24 dialing manager at 10.128.0.26:44449 syzkaller login: [ 44.602366] can: request_module (can-proto-0) failed. [ 44.614337] can: request_module (can-proto-0) failed. 2018/05/06 10:14:28 kcov=true, comps=false 2018/05/06 10:14:28 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x10f34e, 0x0) fallocate(r0, 0x1, 0x0, 0x40800008) write$tun(r0, &(0x7f0000000000)={@pi, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @empty, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x20) 2018/05/06 10:14:28 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f0000000000)=""/72, 0x48) 2018/05/06 10:14:28 executing program 7: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200101001, 0x0) fallocate(r0, 0x10, 0x4, 0x7ffc) 2018/05/06 10:14:28 executing program 1: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 2018/05/06 10:14:28 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs, 0x0) 2018/05/06 10:14:28 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:14:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000010aff6)='/dev/ptmx\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000000040)="0000000374302a3a65746830246d696d655f747970652700", 0x18, 0x0) 2018/05/06 10:14:28 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') sendfile(r1, r0, &(0x7f0000000140), 0x800400000ff) [ 45.974526] IPVS: ftp: loaded support on port[0] = 21 [ 46.119344] IPVS: ftp: loaded support on port[0] = 21 [ 46.174889] IPVS: ftp: loaded support on port[0] = 21 [ 46.251899] IPVS: ftp: loaded support on port[0] = 21 [ 46.351535] IPVS: ftp: loaded support on port[0] = 21 [ 46.468351] IPVS: ftp: loaded support on port[0] = 21 [ 46.626993] IPVS: ftp: loaded support on port[0] = 21 [ 46.756726] IPVS: ftp: loaded support on port[0] = 21 [ 47.551394] ip (4662) used greatest stack depth: 54312 bytes left [ 48.174473] ip (4708) used greatest stack depth: 53944 bytes left [ 48.510857] ip (4734) used greatest stack depth: 53928 bytes left [ 49.206494] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.212998] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.235641] device bridge_slave_0 entered promiscuous mode [ 49.259628] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.266130] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.290302] device bridge_slave_0 entered promiscuous mode [ 49.463479] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.470020] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.486197] device bridge_slave_1 entered promiscuous mode [ 49.515661] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.522198] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.549828] device bridge_slave_0 entered promiscuous mode [ 49.608100] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.614599] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.637054] device bridge_slave_1 entered promiscuous mode [ 49.712557] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 49.720526] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.726990] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.765478] device bridge_slave_0 entered promiscuous mode [ 49.807432] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.813967] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.836661] device bridge_slave_1 entered promiscuous mode [ 49.855384] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 49.867192] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 49.983372] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.989873] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.031675] device bridge_slave_1 entered promiscuous mode [ 50.046851] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.053374] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.068816] device bridge_slave_0 entered promiscuous mode [ 50.085228] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 50.140809] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 50.213803] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 50.282277] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.288778] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.320728] device bridge_slave_1 entered promiscuous mode [ 50.329422] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 50.364815] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.371334] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.380351] device bridge_slave_0 entered promiscuous mode [ 50.396509] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.402995] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.445636] device bridge_slave_0 entered promiscuous mode [ 50.482386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 50.574146] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.580663] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.601282] device bridge_slave_1 entered promiscuous mode [ 50.615875] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 50.647609] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.654144] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.677737] device bridge_slave_1 entered promiscuous mode [ 50.712278] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 50.727897] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 50.737825] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.744309] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.781805] device bridge_slave_0 entered promiscuous mode [ 50.817584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 50.833203] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 50.893286] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 50.962101] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 50.971499] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 51.019432] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 51.076100] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.082608] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.123850] device bridge_slave_1 entered promiscuous mode [ 51.149934] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 51.178938] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 51.185927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 51.206143] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 51.213265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 51.233235] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 51.241945] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 51.372134] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 51.392491] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 51.400364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 51.428872] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 51.447197] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 51.484241] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 51.493131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 51.536740] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 51.579997] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 51.587355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 51.630681] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 51.657911] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 51.702663] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 51.709784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 51.763016] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 51.830012] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 51.838329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 51.877846] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 51.983942] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 52.004714] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 52.015395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.038259] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 52.045307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.161169] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 52.168257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.199638] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 52.222317] team0: Port device team_slave_0 added [ 52.241378] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 52.265489] team0: Port device team_slave_0 added [ 52.284686] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 52.293741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.325808] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 52.352419] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 52.362351] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 52.371968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.425896] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 52.437128] team0: Port device team_slave_1 added [ 52.463719] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 52.495850] team0: Port device team_slave_1 added [ 52.578581] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 52.585637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.612863] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 52.652143] team0: Port device team_slave_0 added [ 52.667803] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 52.686807] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 52.695421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.704660] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.737553] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 52.747181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.761156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.798282] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 52.805338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.834889] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 52.865392] team0: Port device team_slave_0 added [ 52.906320] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 52.913813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.931527] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 52.951131] team0: Port device team_slave_1 added [ 52.973725] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 52.981192] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 52.994781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.022549] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.048480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.069284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.114720] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 53.131397] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 53.143411] team0: Port device team_slave_0 added [ 53.166801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.186240] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 53.194073] team0: Port device team_slave_1 added [ 53.219513] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 53.230791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.244096] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.268748] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 53.276352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.298428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.330708] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 53.341282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.357404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.383557] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 53.393533] team0: Port device team_slave_0 added [ 53.417857] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 53.447345] team0: Port device team_slave_1 added [ 53.470337] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 53.479977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.502255] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.531395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 53.539262] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 53.550099] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 53.582369] team0: Port device team_slave_1 added [ 53.596593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.618081] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.644413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.661864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.689184] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 53.698447] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 53.706985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.718232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.742519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.760809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.774473] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 53.783297] team0: Port device team_slave_0 added [ 53.790772] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 53.802688] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 53.827606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.845868] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.873124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.897652] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.918293] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 53.926750] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 53.949961] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 53.984805] team0: Port device team_slave_1 added [ 54.008612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.020600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.042014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.058691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.074835] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 54.087874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.100174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.130093] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 54.145920] team0: Port device team_slave_0 added [ 54.163307] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 54.170936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.190215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.221302] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 54.230987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.254128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.284824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 54.299870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.336479] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.394620] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 54.402824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.426393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.457596] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 54.465008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.478472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.520541] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 54.529602] team0: Port device team_slave_1 added [ 54.548855] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 54.556392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.573258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.598218] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 54.621760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.668600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.707976] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 54.716250] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 54.726546] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.740205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.788756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.819408] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.856736] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 54.864430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.878215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.906828] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 54.931905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.948248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.969132] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 54.991437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.001916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.080746] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 55.088889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.109370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.239635] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 55.247416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.263763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.505191] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 55.512707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.526241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.422535] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.429136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.436248] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.442844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.504412] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 56.513686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.546281] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.552789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.559699] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.566164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.578848] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 56.595585] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.602148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.608987] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.615456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.690376] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 57.005375] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.011871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.018958] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.025433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.093178] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 57.113258] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.119751] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.126632] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.133135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.198298] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 57.567197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.584891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.617902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.631656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.672769] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.679308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.686258] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.692764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.764717] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 57.841666] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.848201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.855163] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.861658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.904090] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 57.996493] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.002970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.009846] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.016324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.076266] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 58.591583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.603975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.643950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.406077] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.506363] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.838657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.088736] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.235610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.251218] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 66.342336] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 66.685750] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 66.870625] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.978012] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 67.099154] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 67.131531] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.154641] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 67.164976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.175901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.215125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.239638] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 67.246282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.257337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.529774] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 67.536157] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.550448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.677661] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 67.887965] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 67.894356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.905963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.974018] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.005276] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 68.011643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.023118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.065852] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.130580] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 68.203597] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.496712] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.630213] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 68.636586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.648181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.886915] 8021q: adding VLAN 0 to HW filter on device team0 [ 68.944748] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.037683] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 69.044078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.061951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.225903] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 69.232301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.241725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.583984] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.935466] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.077945] 8021q: adding VLAN 0 to HW filter on device team0 2018/05/06 10:14:56 executing program 7: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200101001, 0x0) fallocate(r0, 0x10, 0x4, 0x7ffc) 2018/05/06 10:14:56 executing program 7: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200101001, 0x0) fallocate(r0, 0x10, 0x4, 0x7ffc) 2018/05/06 10:14:56 executing program 7: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200101001, 0x0) fallocate(r0, 0x10, 0x4, 0x7ffc) 2018/05/06 10:14:57 executing program 7: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200101001, 0x0) fallocate(r0, 0x10, 0x4, 0x7ffc) 2018/05/06 10:14:57 executing program 7: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200101001, 0x0) fallocate(r0, 0x10, 0x4, 0x7ffc) 2018/05/06 10:14:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000010aff6)='/dev/ptmx\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000000040)="0000000374302a3a65746830246d696d655f747970652700", 0x18, 0x0) 2018/05/06 10:14:57 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs, 0x0) 2018/05/06 10:14:57 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:14:57 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f0000000000)=""/72, 0x48) 2018/05/06 10:14:57 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') sendfile(r1, r0, &(0x7f0000000140), 0x800400000ff) 2018/05/06 10:14:57 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x10f34e, 0x0) fallocate(r0, 0x1, 0x0, 0x40800008) write$tun(r0, &(0x7f0000000000)={@pi, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @empty, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x20) 2018/05/06 10:14:57 executing program 1: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 2018/05/06 10:14:57 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs, 0x0) 2018/05/06 10:14:58 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') sendfile(r1, r0, &(0x7f0000000140), 0x800400000ff) 2018/05/06 10:14:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000010aff6)='/dev/ptmx\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000000040)="0000000374302a3a65746830246d696d655f747970652700", 0x18, 0x0) 2018/05/06 10:14:58 executing program 1: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 2018/05/06 10:14:58 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:14:58 executing program 7: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200101001, 0x0) fallocate(r0, 0x10, 0x4, 0x7ffc) 2018/05/06 10:14:58 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs, 0x0) 2018/05/06 10:14:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000010aff6)='/dev/ptmx\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000000040)="0000000374302a3a65746830246d696d655f747970652700", 0x18, 0x0) 2018/05/06 10:14:58 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') sendfile(r1, r0, &(0x7f0000000140), 0x800400000ff) 2018/05/06 10:14:58 executing program 1: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 2018/05/06 10:14:58 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x10f34e, 0x0) fallocate(r0, 0x1, 0x0, 0x40800008) write$tun(r0, &(0x7f0000000000)={@pi, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @empty, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x20) 2018/05/06 10:14:58 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:14:58 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f0000000000)=""/72, 0x48) 2018/05/06 10:14:58 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 2018/05/06 10:14:58 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 2018/05/06 10:14:58 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x10f34e, 0x0) fallocate(r0, 0x1, 0x0, 0x40800008) write$tun(r0, &(0x7f0000000000)={@pi, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @empty, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x20) 2018/05/06 10:14:58 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x10f34e, 0x0) fallocate(r0, 0x1, 0x0, 0x40800008) write$tun(r0, &(0x7f0000000000)={@pi, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @empty, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x20) 2018/05/06 10:14:58 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') sendfile(r1, r0, &(0x7f0000000140), 0x800400000ff) 2018/05/06 10:14:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') sendfile(r1, r0, &(0x7f0000000140), 0x800400000ff) 2018/05/06 10:14:58 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x10f34e, 0x0) fallocate(r0, 0x1, 0x0, 0x40800008) write$tun(r0, &(0x7f0000000000)={@pi, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @empty, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x20) 2018/05/06 10:14:58 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') sendfile(r1, r0, &(0x7f0000000140), 0x800400000ff) 2018/05/06 10:14:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') sendfile(r1, r0, &(0x7f0000000140), 0x800400000ff) 2018/05/06 10:14:58 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 2018/05/06 10:14:58 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 2018/05/06 10:14:59 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f0000000000)=""/72, 0x48) 2018/05/06 10:14:59 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') sendfile(r1, r0, &(0x7f0000000140), 0x800400000ff) 2018/05/06 10:14:59 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 2018/05/06 10:14:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') sendfile(r1, r0, &(0x7f0000000140), 0x800400000ff) 2018/05/06 10:15:00 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f0000000000)=""/72, 0x48) 2018/05/06 10:15:00 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 2018/05/06 10:15:00 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x10f34e, 0x0) fallocate(r0, 0x1, 0x0, 0x40800008) write$tun(r0, &(0x7f0000000000)={@pi, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @empty, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x20) 2018/05/06 10:15:00 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f0000000000)=""/72, 0x48) 2018/05/06 10:15:00 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x10f34e, 0x0) fallocate(r0, 0x1, 0x0, 0x40800008) write$tun(r0, &(0x7f0000000000)={@pi, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @empty, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x20) 2018/05/06 10:15:00 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f0000000000)=""/72, 0x48) 2018/05/06 10:15:00 executing program 6: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f0000000000)=""/72, 0x48) 2018/05/06 10:15:00 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f0000000000)=""/72, 0x48) 2018/05/06 10:15:00 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs, 0x0) 2018/05/06 10:15:00 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs, 0x0) 2018/05/06 10:15:00 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs, 0x0) 2018/05/06 10:15:00 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:15:00 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x10f34e, 0x0) fallocate(r0, 0x1, 0x0, 0x40800008) write$tun(r0, &(0x7f0000000000)={@pi, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @empty, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x20) 2018/05/06 10:15:00 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x10f34e, 0x0) fallocate(r0, 0x1, 0x0, 0x40800008) write$tun(r0, &(0x7f0000000000)={@pi, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @empty, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x20) 2018/05/06 10:15:00 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:15:00 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:15:01 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f0000000000)=""/72, 0x48) 2018/05/06 10:15:01 executing program 7: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f0000000000)=""/72, 0x48) 2018/05/06 10:15:01 executing program 6: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f0000000000)=""/72, 0x48) 2018/05/06 10:15:01 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f000000affc)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f0000346fd0)=[{r1}], 0x1, &(0x7f000097d000)={0x77359400}, &(0x7f00001b1000), 0x8) read(r2, &(0x7f0000000000)=""/72, 0x48) 2018/05/06 10:15:01 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:15:01 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:15:01 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:15:01 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:15:01 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:15:01 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:15:01 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:15:01 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) 2018/05/06 10:15:01 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) [ 78.476193] ================================================================== [ 78.483687] BUG: KMSAN: uninit-value in __call_rcu+0x4b8/0xef0 [ 78.489664] CPU: 0 PID: 7 Comm: ksoftirqd/0 Not tainted 4.16.0+ #87 [ 78.496067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.505428] Call Trace: [ 78.508034] dump_stack+0x185/0x1d0 [ 78.511677] ? __call_rcu+0x4b8/0xef0 [ 78.515484] kmsan_report+0x142/0x240 [ 78.519568] __msan_warning_32+0x6c/0xb0 [ 78.523646] __call_rcu+0x4b8/0xef0 [ 78.527281] ? __msan_poison_alloca+0x15c/0x1d0 [ 78.531963] ? kmsan_set_origin_inline+0x6b/0x120 [ 78.536816] ? dst_release+0x1d0/0x1d0 [ 78.540709] call_rcu_sched+0x32/0x40 [ 78.544512] dst_release+0x8f/0x1d0 [ 78.548162] skb_release_head_state+0xf0/0x520 [ 78.552749] kfree_skb+0x372/0x5f0 [ 78.556289] ? dst_discard+0x37/0x60 [ 78.560006] dst_discard+0x37/0x60 [ 78.563557] ? dst_init+0x590/0x590 [ 78.567192] ip_rcv_finish+0xa36/0x1d00 [ 78.571176] ? __msan_metadata_ptr_for_load_2+0x10/0x20 2018/05/06 10:15:01 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) [ 78.576550] ip_rcv+0x118f/0x16d0 [ 78.580018] ? ip_rcv+0x16d0/0x16d0 [ 78.583659] __netif_receive_skb_core+0x47df/0x4a90 [ 78.588686] ? kmsan_write_aligned_origin_inline+0x10/0x60 [ 78.594327] ? ip_local_deliver_finish+0xec0/0xec0 [ 78.599267] process_backlog+0x62d/0xe20 [ 78.603347] ? rps_trigger_softirq+0x2f0/0x2f0 [ 78.607929] net_rx_action+0x7c1/0x1a70 [ 78.611912] ? net_tx_action+0xab0/0xab0 [ 78.615979] __do_softirq+0x56d/0x93d [ 78.619788] ? ksoftirqd_should_run+0x30/0x30 [ 78.624288] run_ksoftirqd+0x1f/0x40 [ 78.628010] smpboot_thread_fn+0x488/0x970 [ 78.632261] ? cpu_report_death+0x1e0/0x1e0 [ 78.636585] kthread+0x539/0x720 [ 78.639958] ? cpu_report_death+0x1e0/0x1e0 [ 78.644282] ? kthread_blkcg+0xf0/0xf0 [ 78.648175] ret_from_fork+0x35/0x40 [ 78.651883] [ 78.653501] Uninit was stored to memory at: [ 78.657832] kmsan_internal_chain_origin+0x12b/0x210 [ 78.662942] __msan_chain_origin+0x69/0xc0 [ 78.667182] rcu_segcblist_enqueue+0x275/0x2d0 [ 78.671765] __call_rcu+0x227/0xef0 [ 78.675395] call_rcu_sched+0x32/0x40 [ 78.679200] release_task+0x24b9/0x2530 [ 78.683177] do_exit+0x2d91/0x38d0 [ 78.686720] do_group_exit+0x1a0/0x360 [ 78.690617] get_signal+0x1320/0x1f20 [ 78.694424] do_signal+0xb8/0x1c80 [ 78.697974] prepare_exit_to_usermode+0x271/0x3a0 [ 78.702823] syscall_return_slowpath+0xe9/0x700 [ 78.707499] do_syscall_64+0x36d/0x430 [ 78.711411] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 78.716600] Uninit was created at: [ 78.720149] kmsan_internal_poison_shadow+0xb8/0x1b0 2018/05/06 10:15:01 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) [ 78.725249] kmsan_kmalloc+0x94/0x100 [ 78.729054] kmem_cache_alloc+0xaab/0xb90 [ 78.733201] alloc_pid+0x7f/0xce0 [ 78.736656] copy_process+0x3fb7/0x9bb0 [ 78.740631] _do_fork+0x311/0xf00 [ 78.744083] SYSC_clone+0xf6/0x110 [ 78.747621] SyS_clone+0x77/0xa0 [ 78.750988] do_syscall_64+0x309/0x430 [ 78.754880] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 78.760064] ================================================================== [ 78.767419] Disabling lock debugging due to kernel taint 2018/05/06 10:15:01 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xcb, "79b3ba83309dc7efd460c3b646c5d73019acb4cd226a3bdca82db48cf4f1f92d2f4be6472191f0271b6314f9c77f178d98b496e9f0af88caa0241d99b8772787855b01040564a6575f3712df107763c43778b70aa62d55e09a00cca1b9e28da5938dbb50db781ced8eb7508977d570d8f7cb78667bb1e85c12cbf301bb2b13a8cc6ee6e8b565bae000b6f448db428a620b6312a2677850e436a31397d1d1ae67ee05c0fa160ee79d927546f782f636ca012e0a46db50adc6654254295e5072fb00b106ad5b93289c85a763"}, &(0x7f0000000140)=0xd3) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000180)={r1}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) close(r0) [ 78.772864] Kernel panic - not syncing: panic_on_warn set ... [ 78.772864] [ 78.780236] CPU: 0 PID: 7 Comm: ksoftirqd/0 Tainted: G B 4.16.0+ #87 [ 78.787943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.797298] Call Trace: [ 78.799901] dump_stack+0x185/0x1d0 [ 78.803548] panic+0x39d/0x940 [ 78.806768] ? __call_rcu+0x4b8/0xef0 [ 78.810575] kmsan_report+0x238/0x240 [ 78.814382] __msan_warning_32+0x6c/0xb0 [ 78.818452] __call_rcu+0x4b8/0xef0 [ 78.822084] ? __msan_poison_alloca+0x15c/0x1d0 [ 78.826760] ? kmsan_set_origin_inline+0x6b/0x120 [ 78.831607] ? dst_release+0x1d0/0x1d0 [ 78.835497] call_rcu_sched+0x32/0x40 [ 78.839320] dst_release+0x8f/0x1d0 [ 78.842955] skb_release_head_state+0xf0/0x520 [ 78.847552] kfree_skb+0x372/0x5f0 [ 78.851094] ? dst_discard+0x37/0x60 [ 78.854813] dst_discard+0x37/0x60 [ 78.858354] ? dst_init+0x590/0x590 [ 78.861986] ip_rcv_finish+0xa36/0x1d00 [ 78.865967] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 78.871341] ip_rcv+0x118f/0x16d0 [ 78.874800] ? ip_rcv+0x16d0/0x16d0 [ 78.878441] __netif_receive_skb_core+0x47df/0x4a90 [ 78.883473] ? kmsan_write_aligned_origin_inline+0x10/0x60 [ 78.889108] ? ip_local_deliver_finish+0xec0/0xec0 [ 78.894053] process_backlog+0x62d/0xe20 [ 78.898148] ? rps_trigger_softirq+0x2f0/0x2f0 [ 78.903000] net_rx_action+0x7c1/0x1a70 [ 78.906983] ? net_tx_action+0xab0/0xab0 [ 78.911401] __do_softirq+0x56d/0x93d [ 78.915210] ? ksoftirqd_should_run+0x30/0x30 [ 78.919705] run_ksoftirqd+0x1f/0x40 [ 78.923423] smpboot_thread_fn+0x488/0x970 [ 78.927670] ? cpu_report_death+0x1e0/0x1e0 [ 78.931994] kthread+0x539/0x720 [ 78.935362] ? cpu_report_death+0x1e0/0x1e0 [ 78.939688] ? kthread_blkcg+0xf0/0xf0 [ 78.943584] ret_from_fork+0x35/0x40 [ 78.947742] Dumping ftrace buffer: [ 78.951265] (ftrace buffer empty) [ 78.954952] Kernel Offset: disabled [ 78.958564] Rebooting in 86400 seconds..