INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.23' (ECDSA) to the list of known hosts. 2018/04/16 23:02:27 fuzzer started 2018/04/16 23:02:28 dialing manager at 10.128.0.26:43021 2018/04/16 23:02:35 kcov=true, comps=false 2018/04/16 23:02:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') r1 = syz_open_procfs(0x0, &(0x7f0000c2d000)='oom_score\x00') sendfile(r0, r1, &(0x7f0000000440), 0x1000000000ff) 2018/04/16 23:02:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000e76000), 0x0, 0x0, &(0x7f0000a7dff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/16 23:02:39 executing program 7: syz_emit_ethernet(0x32, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2}, @random="1a5c995de302", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}}, @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}}}}}}, 0x0) 2018/04/16 23:02:39 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000002280)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=ANY=[], 0x0) 2018/04/16 23:02:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000500)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000040)=0x918, 0x4) sendto$inet(r0, &(0x7f0000000140)='"', 0x1, 0x0, &(0x7f0000000240)={0x2, 0x0, @rand_addr}, 0x10) 2018/04/16 23:02:39 executing program 3: unshare(0x60000000) r0 = gettid() ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000140)) r1 = syz_open_procfs(r0, &(0x7f0000000380)='net/if_inet6\x00') pread64(r1, &(0x7f0000000200)=""/202, 0xca, 0x0) 2018/04/16 23:02:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000818000)=[{0x1000000006, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x3c058533fd59b3f3, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) recvmmsg(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000800)=@can, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000940)=""/104, 0x68}, {&(0x7f00000009c0)=""/121, 0x79}], 0x2, &(0x7f0000000a40)=""/118, 0x76}}], 0x1, 0x0, &(0x7f0000000b40)={0x0, 0x1c9c380}) 2018/04/16 23:02:39 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') pread64(r0, &(0x7f00000000c0)=""/249, 0xf9, 0x0) syzkaller login: [ 44.883358] ip (3766) used greatest stack depth: 54888 bytes left [ 45.071371] ip (3781) used greatest stack depth: 54672 bytes left [ 45.329817] ip (3806) used greatest stack depth: 54408 bytes left [ 46.266108] ip (3892) used greatest stack depth: 54200 bytes left [ 46.616305] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.622862] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.652172] device bridge_slave_0 entered promiscuous mode [ 46.783457] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.790171] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.839370] device bridge_slave_0 entered promiscuous mode [ 46.890455] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.897154] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.911268] device bridge_slave_0 entered promiscuous mode [ 46.923827] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.930408] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.943276] device bridge_slave_1 entered promiscuous mode [ 46.977718] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.984252] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.018849] device bridge_slave_0 entered promiscuous mode [ 47.052754] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.059270] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.071605] device bridge_slave_0 entered promiscuous mode [ 47.085564] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.092170] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.123486] device bridge_slave_1 entered promiscuous mode [ 47.141712] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.148953] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.178317] device bridge_slave_1 entered promiscuous mode [ 47.186875] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.193366] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.210349] device bridge_slave_0 entered promiscuous mode [ 47.220145] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.231638] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.238164] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.271122] device bridge_slave_0 entered promiscuous mode [ 47.287526] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.294165] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.315086] device bridge_slave_1 entered promiscuous mode [ 47.332157] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.339736] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.346339] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.371100] device bridge_slave_0 entered promiscuous mode [ 47.382511] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.389003] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.406484] device bridge_slave_1 entered promiscuous mode [ 47.423786] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.432523] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.448115] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.454647] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.501354] device bridge_slave_1 entered promiscuous mode [ 47.507800] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.514373] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.536512] device bridge_slave_1 entered promiscuous mode [ 47.547296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.556400] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.570868] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.614790] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.621392] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.673100] device bridge_slave_1 entered promiscuous mode [ 47.682218] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.730079] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.741715] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.752062] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.801288] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.885890] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.961328] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.998407] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.143592] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.400457] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.608549] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.622694] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.704322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.769319] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.777973] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.814214] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.936366] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.000165] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.009396] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.021721] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.052188] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.175386] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.221830] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.294883] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.417140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.668871] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.857234] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.865369] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.010839] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.078899] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.088134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.097987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.121244] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.129403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.140717] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.232818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.253700] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.260979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.279631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.336495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.353004] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.374868] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.385066] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.392316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.416308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.455542] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.502350] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.509970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.522407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.571751] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.579662] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.592569] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.599867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.610867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.640631] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.647951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.661837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.692958] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.705650] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.712833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.743913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.765874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.775590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.806368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.833727] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.842499] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.854975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.887140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.928836] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.936141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.952406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.989079] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.002105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.033321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.052124] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.059926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.082986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.105887] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.119118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.143107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.152533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.178634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.209657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.238270] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.266132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.283842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.327571] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.340245] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.355792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.842499] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.849132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.856177] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.862695] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.892429] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.904288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.212163] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.218721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.225731] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.232258] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.304961] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.506405] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.512959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.519853] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.526322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.534797] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.545947] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.552454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.561436] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.567930] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.576080] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.594117] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.600634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.607527] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.614085] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.649217] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.663394] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.669942] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.676852] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.683402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.749881] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.757621] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.764149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.771136] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.777676] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.818172] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.921121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.946203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.979797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.007851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.016797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.025211] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.062023] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.068647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.075655] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.082181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.167406] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.944228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.157872] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.368206] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.671435] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.694237] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.715182] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.811291] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.878656] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.963349] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.997712] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.004180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.019519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.233093] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.239575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.250868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.471224] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.478131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.487115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.515550] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.530197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.546205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.575923] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.584224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.600495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.666257] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.672995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.681860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.789434] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.803753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.814964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.937820] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.945011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.958191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/16 23:03:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000e76000), 0x0, 0x0, &(0x7f0000a7dff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/16 23:03:08 executing program 0: r0 = epoll_create1(0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x400000005) 2018/04/16 23:03:08 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000002280)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=ANY=[], 0x0) 2018/04/16 23:03:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="5800000014001f2340834b80040d8c560a067fffffff810000000000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c09002bff0000040e05a5", 0x58}], 0x1) 2018/04/16 23:03:08 executing program 7: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000067000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000d36000)='./file0\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffffd, 0x0) 2018/04/16 23:03:08 executing program 1: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) sendmsg(r0, &(0x7f0000001600)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x1, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x80, &(0x7f0000001440), 0x0, &(0x7f00000014c0)}, 0x0) 2018/04/16 23:03:08 executing program 5: unshare(0x60000000) r0 = gettid() ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000140)) r1 = syz_open_procfs(r0, &(0x7f0000000380)='net/if_inet6\x00') pread64(r1, &(0x7f0000000200)=""/202, 0xca, 0x0) 2018/04/16 23:03:08 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x8) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000000)=""/1, &(0x7f0000561ffc)) 2018/04/16 23:03:08 executing program 3: unshare(0x60000000) r0 = gettid() ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000140)) r1 = syz_open_procfs(r0, &(0x7f0000000380)='net/if_inet6\x00') pread64(r1, &(0x7f0000000200)=""/202, 0xca, 0x0) [ 71.929682] netlink: 64 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/16 23:03:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000dacff8), 0x4) 2018/04/16 23:03:09 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0xc0ffffff, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x800e}}, @icmp=@parameter_prob={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:03:09 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000011ff0)=[{&(0x7f0000000180)="39000000130009006900000000000000ab0080480300000046000107000000141900290000000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 2018/04/16 23:03:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x2) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) writev(r0, &(0x7f0000001040)=[{&(0x7f00000000c0)="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", 0x20d}], 0x1) 2018/04/16 23:03:09 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 2018/04/16 23:03:09 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) [ 72.139824] netlink: 'syz-executor6': attribute type 41 has an invalid length. [ 72.143013] sctp: [Deprecated]: syz-executor4 (pid 5803) Use of int in maxseg socket option. [ 72.143013] Use struct sctp_assoc_value instead 2018/04/16 23:03:09 executing program 3: unshare(0x60000000) r0 = gettid() ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000140)) r1 = syz_open_procfs(r0, &(0x7f0000000380)='net/if_inet6\x00') pread64(r1, &(0x7f0000000200)=""/202, 0xca, 0x0) 2018/04/16 23:03:09 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000f40)=@polexpire={0xcc, 0x1b, 0x831, 0x0, 0x0, {{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@local={0xfe, 0x80, [], 0xaa}}, {}, {}, 0x0, 0x6e6bb2, 0x2}}, [@policy_type={0xc, 0x10, {0x1}}]}, 0xcc}, 0x1}, 0x0) 2018/04/16 23:03:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f000093eee8)=[{&(0x7f00001f6000)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f0000000340)}, {&(0x7f0000957ff0)=@in={0x2, 0x0, @multicast2=0xe0000002}, 0x10, &(0x7f000093e000), 0x0, &(0x7f000093ef10)=[@sndinfo={0x20, 0x84, 0x2}], 0x30}], 0x2, 0x0) 2018/04/16 23:03:09 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8983, &(0x7f0000000040)={'bridge0\x00'}) 2018/04/16 23:03:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='highspeed\x00', 0xa) writev(r0, &(0x7f0000df9000)=[{&(0x7f0000354ff8)='\'', 0x1}], 0x1) 2018/04/16 23:03:09 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000011ff0)=[{&(0x7f0000000180)="39000000130009006900000000000000ab0080480300000046000107000000141900290000000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 2018/04/16 23:03:09 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) 2018/04/16 23:03:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x2) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) writev(r0, &(0x7f0000001040)=[{&(0x7f00000000c0)="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", 0x20d}], 0x1) [ 72.488563] netlink: 'syz-executor6': attribute type 41 has an invalid length. 2018/04/16 23:03:09 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x2) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) writev(r0, &(0x7f0000001040)=[{&(0x7f00000000c0)="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", 0x20d}], 0x1) 2018/04/16 23:03:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="6970365f76746930000000000400", 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$nl_xfrm(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) sendmmsg(r3, &(0x7f000000e180)=[{{0x0, 0x0, &(0x7f000000c6c0)}}, {{&(0x7f000000c740)=@nfc={0x27}, 0x80, &(0x7f000000db00), 0x0, &(0x7f000000db80)}}], 0x2, 0x0) 2018/04/16 23:03:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="6970365f76746930000000000400", 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$nl_xfrm(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) sendmsg$netrom(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@full={{0x3, {"0a6275cb5791f8"}}, [{"b4454687ce9f38"}, {"80747748bc690f"}, {"1976a3af964003"}, {"a015474cc73d3e"}, {"36731c4b8b19ed"}, {"28a51dbd322d15"}, {"01f8cd7553c421"}, {"a0c59863b2e9e2"}]}, 0x48, &(0x7f00000000c0), 0x0, &(0x7f00000007c0)}, 0x40084) sendmmsg(r3, &(0x7f000000e180)=[{{0x0, 0x0, &(0x7f000000c6c0)}}, {{&(0x7f000000c740)=@nfc={0x27}, 0x80, &(0x7f000000db00), 0x0, &(0x7f000000db80)}}], 0x2, 0x0) 2018/04/16 23:03:09 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000003c0)=[{0xc0, 0x0, 0x0, "1749c38295c3612c1cc4ba0a627d77788f1c0d84204fed2405e7900ec07bb0245f508d4c452d084857738523539a62f6a9e8e4f2e343a499fbc63dc35a0ab7b7952507f07af0ed35056a95b8bb2c69d86d01e520784005c83b05d6a85f31b6495ef7f7bbb2ddc06231ee5259d4a126769acdb9aa4bb953252ffabc226a495d3944904cd8ff020b44e5278bf0afedca315cebce3703b142bce76303d646ed5a31e53fa279d500ab74d54e"}], 0xc0}, 0x0) 2018/04/16 23:03:09 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) 2018/04/16 23:03:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='map_files\x00') getdents(r0, &(0x7f0000000ea9)=""/407, 0x197) 2018/04/16 23:03:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x2) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) writev(r0, &(0x7f0000001040)=[{&(0x7f00000000c0)="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", 0x20d}], 0x1) 2018/04/16 23:03:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x0) 2018/04/16 23:03:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000240)=0x8, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)="6970365f76746930000000000400", 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$nl_xfrm(r3, &(0x7f0000000780)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000480)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, 0xffcb}, 0x1}, 0x0) sendmmsg(r3, &(0x7f000000e180)=[{{0x0, 0x0, &(0x7f000000c6c0)}}, {{&(0x7f000000c740)=@nfc={0x27}, 0x80, &(0x7f000000db00), 0x0, &(0x7f000000db80)}}], 0x2, 0x0) 2018/04/16 23:03:10 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x8) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000baf000)=""/1, &(0x7f0000561ffc)=0x1) 2018/04/16 23:03:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000d7efec)={0x14, 0x6, 0x1, 0xffffffffffffffff}, 0x14}, 0x1}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000001080)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000010c0)={'team0\x00', r1}) read(r0, &(0x7f0000000040)=""/4096, 0x1000) 2018/04/16 23:03:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x2) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) writev(r0, &(0x7f0000001040)=[{&(0x7f00000000c0)="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", 0x20d}], 0x1) 2018/04/16 23:03:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4, @loopback=0x7f000001}, 0xffffffffffffffc2) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)="27521620727c80caa3", 0x9}], 0x1, 0x81806) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r0, 0x4c01) 2018/04/16 23:03:10 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) perf_event_open(&(0x7f0000000040)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000d, "6df1733d7a8a242fd899e4633f58cea8fb5a550ed80ebba4d909c7a124d8ac39ad6942000000000000fd35a844f3e8b5ade4e5935137af6fe251190634435dca", "6aaba7a936009867bd21673a08478220febadc5ca0c0caf1f4833b9ff18a89a285f049691fdaee090426b5018b54096bdaacf1e7a2fb27febc2e8d7b46599493", "ecd2881042e088581e59599a5591e6c882e32ef777685d0ab79cd3b2bd83d72a"}) 2018/04/16 23:03:10 executing program 6: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) sendmsg(r0, &(0x7f0000001600)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x1, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x80, &(0x7f0000001440)=[{&(0x7f0000001340)="1833d59b6dee41218465cffa4d0a", 0xe}], 0x1, &(0x7f00000014c0), 0x0, 0x4000}, 0x4000) 2018/04/16 23:03:10 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = memfd_create(&(0x7f0000000300)="64657620496448322cf0696da23751b69c1781498b0f37d3f17c7292eceaed34c98fbacc4ff06c4a6e99ed74bcecd4a459544d39dbbb8c79fe760687ed7a62e1953d9c3e2c017cb6cd72ed5020ab375e671a21", 0x0) write(r1, &(0x7f0000000440)="fb", 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000480)={'filter\x00', 0x7, 0x4, 0x478, 0x0, 0x140, 0x254, 0x394, 0x394, 0x394, 0x4, &(0x7f0000000000), {[{{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr, 0x0, 0x0, @mac, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1\x00', 'bond_slave_1\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}, @multicast2=0xe0000002}}}, {{@uncond, 0xf0, 0x114}, @unspec=@NFQUEUE1={0x24, 'NFQUEUE\x00', 0x1}}, {{@arp={@dev={0xac, 0x14, 0x14}, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, @empty, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_to_bridge\x00', 'teql0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, @empty, @broadcast=0xffffffff}}}], {{[], 0xc0, 0xe4}, {0x24, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c4) [ 73.505930] loop_reread_partitions: partition scan of loop0 (mñs=zŠ$/Ø™äc?XΨûZUØ»¤Ù Ç¡$ج9­iB) failed (rc=-13) 2018/04/16 23:03:10 executing program 7: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4, @loopback=0x7f000001}, 0xffffffffffffffc2) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 2018/04/16 23:03:10 executing program 6: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4, @loopback=0x7f000001}, 0xffffffffffffffc2) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)="27521620727c80", 0x7}], 0x1, 0x81806) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) 2018/04/16 23:03:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4, @loopback=0x7f000001}, 0xffffffffffffffc2) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)="27521620727c80caa3", 0x9}], 0x1, 0x81806) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r0, 0x4c01) 2018/04/16 23:03:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000d7efec)={0x14, 0x6, 0x1, 0xffffffffffffffff}, 0x14}, 0x1}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000001080)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000010c0)={'team0\x00', r1}) read(r0, &(0x7f0000000040)=""/4096, 0x1000) 2018/04/16 23:03:10 executing program 5: r0 = mq_open(&(0x7f0000000000)="ba6c6f2300", 0x0, 0x0, &(0x7f0000a27fc0)) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000004ff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f67ff4)={0x4}) ppoll(&(0x7f0000ce0000)=[{r1}], 0x1, &(0x7f0000497000)={0x0, 0x1c9c380}, &(0x7f0000307ff8), 0x8) 2018/04/16 23:03:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x2) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000001040)=[{&(0x7f00000000c0)="32f68ac69c5c54f92cbbde469fe82457e84580c5762d4c6e7fd8c4393d2461a3f5553caac8a29d0b2b1d084017f56ce9fd370c8879961e4f23953c3b9262430be9b7ba0f44a22d3d04518ce33801f81d9e3c12c7db39122b92caa35c5b13d5ed2b0c380d8397b1dc7dd0eae9b798bb1c1145041c09f142336a87079e2e93c268a1d5ae7656d6f70ecfd79af30b47a31d4f61988052825e992fee6a2b6a322ef2cceae8c673f3967f4864f95740013d4f7700a9832d778ac9a06f019f64db9b5e401af5f4e534cffb21b8fbdb9095748c8bffbb525b232532d628c6810bf889a856d55f2428cdfc1c983fbe7b65c0c5c597a1524c033ff591b08eaa2c9296e393db7a71f4584b2c279bee27eb9432b287965021a2091143fb010dddb4286775a9c8f2ab9739168ca9c6928a6553a9e49a8f5554213d83e67ac008b4571e21149fd4938e39ffd2b683b9b42b6e2cf3acc189a9f84ab06c02a2e5078ed8835f788f31438b98bca659b56ae858a46d3e106324d665d6171b8b2de9a21d2b7730a337dc35ce2c4dcb647300ea34dec0b086c5e149cfe8b8310a1cc8bf131430a1c042ddc9658cecf94e19808f8ef0be7789e72e3c37bb57caefc8b842f48c0c0da9f62e911e6e790bfac55ecc3ee96d0a7f42bfd70f5491c7980e5fd52fbaa41ed52af70da561bcbcddb53a243d459dc479e7545a260592f32e1ee6d2915a52c42b4fc07a25befcc867501c41105a15", 0x20d}], 0x1) 2018/04/16 23:03:10 executing program 2: mount(&(0x7f0000a38ff8)='./file0\x00', &(0x7f0000852000)='.', &(0x7f0000000040)='tmpfs\x00', 0x0, &(0x7f00008a7000)) umount2(&(0x7f000049c000)='.', 0x0) 2018/04/16 23:03:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4, @loopback=0x7f000001}, 0xffffffffffffffc2) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)="27521620727c80caa3", 0x9}], 0x1, 0x81806) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 73.980736] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2018/04/16 23:03:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}, 0x0, 0x5, 0x0, "d898760a608655cdd122b7aae6777de2b6d61f3426116a044800a28586f0363b30b2e13b4dde1df995d151c2a717f5d0469e5fd4d3cae6eb6715077452ed8575a6d8b6805619337678a5377f2cc5e781"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}, 0x0, 0x0, 0x0, "d352b4d9cc03f9f8403258a432b135175450d3afb7f5696bd65674ce2e5ebf691563cc0f27ccf799aaa609152bb58903abf50bfbc20cb05519ab8e059e15f3f754813cd073c7bf449316f1a85917f2cd"}, 0x152) 2018/04/16 23:03:11 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_int(r0, 0x0, 0x15, &(0x7f00000001c0), &(0x7f0000000100)=0x9c) 2018/04/16 23:03:11 executing program 2: clock_getres(0x64e0b78f93af1f53, &(0x7f0000000100)) 2018/04/16 23:03:11 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x80000000007) 2018/04/16 23:03:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000280)=""/186, 0xba) 2018/04/16 23:03:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4, @loopback=0x7f000001}, 0xffffffffffffffc2) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)="27521620727c80caa3", 0x9}], 0x1, 0x81806) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r0, 0x4c01) 2018/04/16 23:03:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x2) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000001040)=[{&(0x7f00000000c0)="32f68ac69c5c54f92cbbde469fe82457e84580c5762d4c6e7fd8c4393d2461a3f5553caac8a29d0b2b1d084017f56ce9fd370c8879961e4f23953c3b9262430be9b7ba0f44a22d3d04518ce33801f81d9e3c12c7db39122b92caa35c5b13d5ed2b0c380d8397b1dc7dd0eae9b798bb1c1145041c09f142336a87079e2e93c268a1d5ae7656d6f70ecfd79af30b47a31d4f61988052825e992fee6a2b6a322ef2cceae8c673f3967f4864f95740013d4f7700a9832d778ac9a06f019f64db9b5e401af5f4e534cffb21b8fbdb9095748c8bffbb525b232532d628c6810bf889a856d55f2428cdfc1c983fbe7b65c0c5c597a1524c033ff591b08eaa2c9296e393db7a71f4584b2c279bee27eb9432b287965021a2091143fb010dddb4286775a9c8f2ab9739168ca9c6928a6553a9e49a8f5554213d83e67ac008b4571e21149fd4938e39ffd2b683b9b42b6e2cf3acc189a9f84ab06c02a2e5078ed8835f788f31438b98bca659b56ae858a46d3e106324d665d6171b8b2de9a21d2b7730a337dc35ce2c4dcb647300ea34dec0b086c5e149cfe8b8310a1cc8bf131430a1c042ddc9658cecf94e19808f8ef0be7789e72e3c37bb57caefc8b842f48c0c0da9f62e911e6e790bfac55ecc3ee96d0a7f42bfd70f5491c7980e5fd52fbaa41ed52af70da561bcbcddb53a243d459dc479e7545a260592f32e1ee6d2915a52c42b4fc07a25befcc867501c41105a15", 0x20d}], 0x1) 2018/04/16 23:03:11 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f00000015c0)={&(0x7f0000000040)=@can, 0x80, &(0x7f0000001500)}, 0x0) close(r0) 2018/04/16 23:03:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000001e001505000000000000000007000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00\x00\x00\x00\x00'], 0x2}, 0x1}, 0x0) 2018/04/16 23:03:11 executing program 6: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x1c, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f00000002c0)) 2018/04/16 23:03:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}, 0x0, 0x5, 0x0, "d898760a608655cdd122b7aae6777de2b6d61f3426116a044800a28586f0363b30b2e13b4dde1df995d151c2a717f5d0469e5fd4d3cae6eb6715077452ed8575a6d8b6805619337678a5377f2cc5e781"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}, 0x0, 0x0, 0x0, "d352b4d9cc03f9f8403258a432b135175450d3afb7f5696bd65674ce2e5ebf691563cc0f27ccf799aaa609152bb58903abf50bfbc20cb05519ab8e059e15f3f754813cd073c7bf449316f1a85917f2cd"}, 0x152) 2018/04/16 23:03:11 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00', 0x22001}) 2018/04/16 23:03:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000ff0), 0x0, &(0x7f0000000000)}, 0xc100) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f0000000480)=""/143, 0x8f}], 0x1, &(0x7f0000000100)=""/128, 0x80}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001000)="8e86a4b9500a1139a0d93a78de7ed00ae239537b41a4eacfcfd438dfbe84ef20bd7e66cfb9bde86f5b1d1bae840e6c373fd2d58909d8ac8f1aca1b6e95b92948d4525d", 0x43}], 0x1, &(0x7f0000002000)}, 0x8000) syz_emit_ethernet(0x56, &(0x7f00000001c0)={@random="13b9d84bb6c7", @empty, [], {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "e36099aa1e3ad15fe68608a81adc85573dcdffd0e138f12cd25d0f32f694b4eb5fa7093865fcbfb5583306dfd58e88d1c96456702d23024b8ad5b31e364f6259"}}}}, &(0x7f0000000240)) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="bce5", 0x2}], 0x1, &(0x7f000000ae80)}, 0x0) 2018/04/16 23:03:11 executing program 1: request_key(&(0x7f0000000480)='dns_resolver\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='\x00', 0x0) 2018/04/16 23:03:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) ioctl$int_in(r0, 0x5452, &(0x7f00000003c0)=0x2) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000001040)=[{&(0x7f00000000c0)="32f68ac69c5c54f92cbbde469fe82457e84580c5762d4c6e7fd8c4393d2461a3f5553caac8a29d0b2b1d084017f56ce9fd370c8879961e4f23953c3b9262430be9b7ba0f44a22d3d04518ce33801f81d9e3c12c7db39122b92caa35c5b13d5ed2b0c380d8397b1dc7dd0eae9b798bb1c1145041c09f142336a87079e2e93c268a1d5ae7656d6f70ecfd79af30b47a31d4f61988052825e992fee6a2b6a322ef2cceae8c673f3967f4864f95740013d4f7700a9832d778ac9a06f019f64db9b5e401af5f4e534cffb21b8fbdb9095748c8bffbb525b232532d628c6810bf889a856d55f2428cdfc1c983fbe7b65c0c5c597a1524c033ff591b08eaa2c9296e393db7a71f4584b2c279bee27eb9432b287965021a2091143fb010dddb4286775a9c8f2ab9739168ca9c6928a6553a9e49a8f5554213d83e67ac008b4571e21149fd4938e39ffd2b683b9b42b6e2cf3acc189a9f84ab06c02a2e5078ed8835f788f31438b98bca659b56ae858a46d3e106324d665d6171b8b2de9a21d2b7730a337dc35ce2c4dcb647300ea34dec0b086c5e149cfe8b8310a1cc8bf131430a1c042ddc9658cecf94e19808f8ef0be7789e72e3c37bb57caefc8b842f48c0c0da9f62e911e6e790bfac55ecc3ee96d0a7f42bfd70f5491c7980e5fd52fbaa41ed52af70da561bcbcddb53a243d459dc479e7545a260592f32e1ee6d2915a52c42b4fc07a25befcc867501c41105a15", 0x20d}], 0x1) 2018/04/16 23:03:11 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) [ 75.337384] ================================================================== [ 75.344854] BUG: KMSAN: uninit-value in csum_partial_copy_to_user+0x450/0x500 [ 75.352142] CPU: 1 PID: 5966 Comm: syz-executor3 Not tainted 4.16.0+ #84 [ 75.358974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.368341] Call Trace: [ 75.370939] dump_stack+0x185/0x1d0 [ 75.374581] ? csum_partial_copy_to_user+0x450/0x500 [ 75.379684] kmsan_report+0x142/0x240 [ 75.383491] __msan_warning_32+0x6c/0xb0 [ 75.387569] csum_partial_copy_to_user+0x450/0x500 [ 75.392515] csum_and_copy_to_iter+0x3dc/0x2140 [ 75.397203] ? kmsan_set_origin_inline+0x6b/0x120 [ 75.402061] ? __msan_poison_alloca+0x15c/0x1d0 [ 75.406768] skb_copy_and_csum_datagram+0x6d2/0x1080 [ 75.411893] skb_copy_and_csum_datagram_msg+0x557/0x960 [ 75.417288] udpv6_recvmsg+0xc65/0x29e0 [ 75.421285] ? udp6_lib_lookup_skb+0x240/0x240 [ 75.425875] inet_recvmsg+0x4c2/0x5f0 [ 75.429678] sock_recvmsg+0x1d0/0x230 [ 75.433486] ? inet_sendpage+0x8c0/0x8c0 [ 75.437564] ___sys_recvmsg+0x3fb/0x810 [ 75.441570] ? __fget_light+0x56/0x710 [ 75.445514] ? __fdget+0x4e/0x60 [ 75.448906] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 75.454290] ? __fget_light+0x6b9/0x710 [ 75.458264] SYSC_recvmsg+0x298/0x3c0 [ 75.462063] SyS_recvmsg+0x54/0x80 [ 75.465594] do_syscall_64+0x309/0x430 [ 75.469500] ? ___sys_recvmsg+0x810/0x810 [ 75.473663] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 75.478869] RIP: 0033:0x455329 [ 75.482174] RSP: 002b:00007f0beba8ec68 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 75.489983] RAX: ffffffffffffffda RBX: 00007f0beba8f6d4 RCX: 0000000000455329 [ 75.497253] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000013 [ 75.504527] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 75.511791] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 75.519068] R13: 0000000000000496 R14: 00000000006f9eb0 R15: 0000000000000000 [ 75.526345] [ 75.528055] Uninit was created at: [ 75.531610] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 75.536634] kmsan_alloc_page+0x82/0xe0 [ 75.540608] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 75.545365] alloc_pages_current+0x6b5/0x970 [ 75.549765] skb_page_frag_refill+0x3ba/0x5e0 [ 75.554251] sk_page_frag_refill+0xa4/0x340 [ 75.558567] __ip6_append_data+0x1a20/0x4bb0 [ 75.562981] ip6_append_data+0x40e/0x6b0 [ 75.567055] udpv6_sendmsg+0xfd5/0x45b0 [ 75.571039] inet_sendmsg+0x48d/0x740 [ 75.574843] ___sys_sendmsg+0xec0/0x1310 [ 75.578912] SYSC_sendmsg+0x2a3/0x3d0 [ 75.582720] SyS_sendmsg+0x54/0x80 [ 75.586251] do_syscall_64+0x309/0x430 [ 75.590136] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 75.595324] ================================================================== [ 75.602693] Disabling lock debugging due to kernel taint [ 75.608143] Kernel panic - not syncing: panic_on_warn set ... [ 75.608143] [ 75.615523] CPU: 1 PID: 5966 Comm: syz-executor3 Tainted: G B 4.16.0+ #84 [ 75.623663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.633017] Call Trace: [ 75.635629] dump_stack+0x185/0x1d0 [ 75.639261] panic+0x39d/0x940 [ 75.642468] ? csum_partial_copy_to_user+0x450/0x500 [ 75.647578] kmsan_report+0x238/0x240 [ 75.651382] __msan_warning_32+0x6c/0xb0 [ 75.655459] csum_partial_copy_to_user+0x450/0x500 [ 75.660407] csum_and_copy_to_iter+0x3dc/0x2140 [ 75.665097] ? kmsan_set_origin_inline+0x6b/0x120 [ 75.669944] ? __msan_poison_alloca+0x15c/0x1d0 [ 75.674624] skb_copy_and_csum_datagram+0x6d2/0x1080 [ 75.679826] skb_copy_and_csum_datagram_msg+0x557/0x960 [ 75.685196] udpv6_recvmsg+0xc65/0x29e0 [ 75.689179] ? udp6_lib_lookup_skb+0x240/0x240 [ 75.693791] inet_recvmsg+0x4c2/0x5f0 [ 75.697602] sock_recvmsg+0x1d0/0x230 [ 75.701410] ? inet_sendpage+0x8c0/0x8c0 [ 75.705495] ___sys_recvmsg+0x3fb/0x810 [ 75.709475] ? __fget_light+0x56/0x710 [ 75.713367] ? __fdget+0x4e/0x60 [ 75.716754] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 75.722129] ? __fget_light+0x6b9/0x710 [ 75.726134] SYSC_recvmsg+0x298/0x3c0 [ 75.729953] SyS_recvmsg+0x54/0x80 [ 75.733499] do_syscall_64+0x309/0x430 [ 75.737399] ? ___sys_recvmsg+0x810/0x810 [ 75.741555] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 75.746761] RIP: 0033:0x455329 [ 75.749952] RSP: 002b:00007f0beba8ec68 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 75.757660] RAX: ffffffffffffffda RBX: 00007f0beba8f6d4 RCX: 0000000000455329 [ 75.764953] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000013 [ 75.772227] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 75.780219] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 75.787499] R13: 0000000000000496 R14: 00000000006f9eb0 R15: 0000000000000000 [ 75.795388] Dumping ftrace buffer: [ 75.798937] (ftrace buffer empty) [ 75.802633] Kernel Offset: disabled [ 75.806267] Rebooting in 86400 seconds..