INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.28' (ECDSA) to the list of known hosts. 2018/04/11 20:58:04 fuzzer started 2018/04/11 20:58:05 dialing manager at 10.128.0.26:41677 2018/04/11 20:58:11 kcov=true, comps=false 2018/04/11 20:58:13 executing program 0: r0 = memfd_create(&(0x7f0000000480)='\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 2018/04/11 20:58:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x5, 0x6a, 0x1, 0xa}, 0x2c) 2018/04/11 20:58:13 executing program 7: r0 = socket$inet(0x2, 0x840000000003, 0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f00004fd000), 0x4) setsockopt$inet_int(r0, 0x0, 0x40000000000c9, &(0x7f0000000080), 0x4) 2018/04/11 20:58:13 executing program 3: r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0x8, &(0x7f0000001000), 0x0) 2018/04/11 20:58:13 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000080)=0x1, 0x4) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 2018/04/11 20:58:13 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000002580)=[{&(0x7f0000002400)="ec", 0x1, 0xfffffffffffffffa}], 0x0, &(0x7f0000002600)) 2018/04/11 20:58:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x1c}, 0xffffffffffffffef) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x401000, 0x2, 0xc, &(0x7f0000000000)) socketpair$inet_icmp(0x401000, 0x2, 0xd, &(0x7f0000000080)) 2018/04/11 20:58:13 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x0, 0x0, 0x400}, 0x10) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) syzkaller login: [ 41.073751] ip (3749) used greatest stack depth: 54688 bytes left [ 41.468097] ip (3784) used greatest stack depth: 54408 bytes left [ 43.100158] ip (3944) used greatest stack depth: 54160 bytes left [ 44.485644] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.506929] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.573142] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.671606] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.716948] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.736677] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.808084] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.877734] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.176178] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.359077] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.391158] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.510920] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.573080] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.613663] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.644259] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.774663] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.947021] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 53.954991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.966580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.115933] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.122226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.134654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.165147] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.178967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.188909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.248859] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.255222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.263671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.389719] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.395986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.408173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.444548] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.450877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.464656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.511895] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.518176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.531515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.618307] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.624703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.636773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/11 20:58:31 executing program 0: getpid() bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xdf}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x10, 0xffffffffffffffff, 0x2) socketpair$inet_icmp(0x7fffffffefff, 0x2, 0x730000, &(0x7f00000003c0)) 2018/04/11 20:58:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 2018/04/11 20:58:31 executing program 3: r0 = socket$kcm(0x2, 0x4000000005, 0x0) sendmsg$kcm(r0, &(0x7f0000001900)={&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback=0x7f000001}}}, 0x80, &(0x7f0000001680), 0x0, &(0x7f0000001980)=ANY=[@ANYBLOB="28000000000000000000000009b9ffff7edff615af8efadfbd453261376c97125564cb5e2c56213dd9d8e9236fb43b000000000000d80000"], 0x38}, 0x0) 2018/04/11 20:58:31 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/11 20:58:31 executing program 4: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x10000000005}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/11 20:58:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) recvmsg(r1, &(0x7f0000001280)={&(0x7f0000001080)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000001140), 0x0, &(0x7f0000001180)=""/214, 0xd6}, 0x0) close(r0) close(0xffffffffffffffff) 2018/04/11 20:58:31 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000000)) 2018/04/11 20:58:31 executing program 6: mkdir(&(0x7f0000001a00)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xeef, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) 2018/04/11 20:58:31 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x38}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x23e1000, 0x20000002, 0x1, &(0x7f0000000000)) 2018/04/11 20:58:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r1, 0x705, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 2018/04/11 20:58:31 executing program 6: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@un=@abs={0x1}, 0x49, &(0x7f0000000040), 0x3d}, 0x0) 2018/04/11 20:58:31 executing program 7: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/11 20:58:31 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x100000000000063}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x6f2000, 0x2, 0x1, &(0x7f0000000240)) 2018/04/11 20:58:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 2018/04/11 20:58:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xf, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x380) 2018/04/11 20:58:31 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xe4}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x7fff00000006, 0x6f2000, 0x1, &(0x7f0000000480)) 2018/04/11 20:58:32 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000100)="e9", 0x1}], 0x1, &(0x7f0000000400)}, 0x0) 2018/04/11 20:58:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) recvmsg(r1, &(0x7f0000001280)={&(0x7f0000001080)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000001140), 0x0, &(0x7f0000001180)=""/214, 0xd6}, 0x0) close(r0) close(0xffffffffffffffff) 2018/04/11 20:58:32 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x1000000000040}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000001c0)) 2018/04/11 20:58:32 executing program 6: r0 = socket$kcm(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8981, &(0x7f0000000040)) 2018/04/11 20:58:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x18}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000480)) 2018/04/11 20:58:32 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) syz_emit_ethernet(0x988e518002d8b65, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x2d8b2f, 0x821, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/04/11 20:58:32 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x38}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x23e1000, 0x20000002, 0x1, &(0x7f0000000000)) 2018/04/11 20:58:32 executing program 5: r0 = syz_open_dev$tun(&(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000000)) 2018/04/11 20:58:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f29000)={0x400000000000000, 0x0, &(0x7f00005c1ff0)={&(0x7f000034f000)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in, @in6=@dev={0xfe, 0x80}, 0x0, 0xffffff7f}]}, 0x38}, 0x1}, 0x0) 2018/04/11 20:58:32 executing program 6: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f000000b000)=[{&(0x7f0000010000)="5500000021007fafb72d00b2a4a2809302000000030343ee6b26236925000c000a000a00130000008848a3c728f1c46b7b31afdc1338d5440000000000000000000000088daa7227c43ab8220000bf0c00000000d4", 0x55}], 0x1, &(0x7f0000016000)}, 0x0) 2018/04/11 20:58:32 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000007000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000012000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/11 20:58:32 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000700)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) [ 57.374741] dccp_v6_rcv: dropped packet with invalid checksum 2018/04/11 20:58:32 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000015e15)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={0xac, 0x14, 0x14, 0xbb}, @random="5ac26b48f8f2", @broadcast=0xffffffff}}}}, 0x0) 2018/04/11 20:58:32 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[], 0x0, &(0x7f0000000400)=[{&(0x7f0000002940)='u', 0x1}], 0x1, &(0x7f0000000500)}, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'bpq0\x00'}}, 0x80, &(0x7f0000001480)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendmsg(r0, &(0x7f0000002900)={&(0x7f0000000080)=@in={0x2, 0x0, @broadcast=0xffffffff}, 0x80, &(0x7f0000000180)=[{&(0x7f0000001740)="8c74c16b436602cfad06275e7bd6539acd46a97728be21dbcd7728665def150310709970", 0x24}], 0x1}, 0x0) [ 57.506632] netlink: 17 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/11 20:58:32 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) syz_emit_ethernet(0x988e518002d8b65, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x2d8b2f, 0x821, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/04/11 20:58:32 executing program 3: r0 = socket$inet(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) sendmsg(r0, &(0x7f0000001540)={&(0x7f0000000400)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14, &(0x7f00000004c0)}, 0x0) 2018/04/11 20:58:32 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000012000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000012000503000000000000000007000000", @ANYBLOB="00000000c997e04c9510e72dc91642d068af55906c06a5320673b056750d7074975501716a3ff50245f231524c72f94df9449a8cbab897c60b3d85a070d9b8a721"], 0x2}, 0x1}, 0x0) [ 57.795564] dccp_v6_rcv: dropped packet with invalid checksum 2018/04/11 20:58:33 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) pwritev(r1, &(0x7f0000000100)=[{&(0x7f0000000200)="10", 0x1}], 0x1, 0x0) r2 = dup3(r1, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x34123610) 2018/04/11 20:58:33 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000007000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000012000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/11 20:58:33 executing program 7: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="2b3e038a21ed", [], {@ipv4={0x800, {{0x5, 0x4, 0x4305, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d709de", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349b"}}}}}, 0x0) 2018/04/11 20:58:33 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f0000002380)={0x0, 0x0, &(0x7f0000002300)=[{&(0x7f0000000c80)="33ad974fe2e5bfd38992e82d718713e191ae2121f253a49abfd1b652a86b33c99f9f0a3ce81bcb7229b6ccf43ceed6b467bf4c588bb6e1ee66e8e6917b7bb723f53907b857fa0d5f01922569ecfa7b226f48989885efe31eed8f2d", 0x5b}, {&(0x7f0000002180)="40ebdcdb286ee9e2256abc889172e9945207ad0b1ae1a20f96469084bbcb851be360512caefd6e2822ef3db6734890bf4f376a95a205144248173faae7e34681762c4b8fa816c3c4d90d4dfdd04354b489933a4935b9ef320537a888fb6478544cb7e735278e6cabb63a5ced065b866d7775fbe2d25a05279941e6ee9d7557564851002a2cd55c30cafb069b5056a7fef5660987732df0cc74f5b4b97877a1b2404cc489d46087f757da421e96315312e402a57d42751e11224a0c73254b919abed17bb81f59e9b3d162a4e1ba542ae70155d99bdeb2a0fad7c10d6cd8e9fb706c", 0xe1}, {&(0x7f0000000fc0)="30222fb3f270ba2df6344646ab0fe9519e98c16970c16916bd159e513941bf53bd4e76d19b6ad66215d6836dd06880f8158add525c5c325f5c95be0b07af11400630bd31d74a4c26502636349bbcd96ab99a9829e160142e482100acf4d8bf26861049f07769eeb0f50647bebc1996eee44b0acfc76f0b2b60952403", 0x7c}], 0x3, 0x0, 0x0, 0x840}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x82}]}, 0x10) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000001040)="5ddea4fac1387bb94db84bf57d1429e54ca3f72e74fb6a971ff7ae015c6667abaeea4357fe017c1700c6c49739e0f357f15f4e9636006bd9777c2691c40930f52733d140e9d050e03f6f80f668054968532d945150ca6ba1f149757475d30fdc4df712485eff9bd62b41099d60d2e15bad8e8f6cc355948ca0bd04c478910130a80184d73c2122ab85ce5028094f9a9a268b8e82308d7071a5470e", 0x9b}], 0x1, &(0x7f0000000c00), 0x0, 0x1000000000000}, 0x8094) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000280)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x80, &(0x7f0000000300)=[{&(0x7f00000003c0)="968e0f072b2348d2453d769e4d5ac6b8bcc8ef680fe5379a0b8003e934274dd5a1145a2f82a908a26c47f3b07ad85693d8bc0e4151f1b248c572ec1f14965cca6453e13c8f261665b651ceede98ba7f7f7796bdb75c94ea87008181f0e74ea8342b5d1bd34904f5c4221975eab2ae0e1217410c23a36934f9dc761e4acc4615fcc74f7a05ab32aa771b704bb62fdbe53895a6747f3646e5a949acd3e7467870cc014a8057e", 0xa5}], 0x1, &(0x7f0000000c00)=ANY=[], 0x0, 0x4000050}, 0x408d1) sendmsg(r0, &(0x7f0000000f40)={&(0x7f0000000800)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x1}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000e00)="bb5fa469970dbb62cddb0ca0fe5e8b48ceacdbe461481b198b0f4a457244d6d9eda7493969d3f8c8bb19269786aa3677207516ded3191b680488d85f4b866db719b0dbed8c804c45038e422e05637b626e713097fbb31ccec3908995110f96d4fa95887723adf5da1fd30ec78b2a472887ca3a798410273ad93d3315aa674c3d490b390fe492af2e452c245a918127a764c43a93873ef40f729c1de2068f03be2187c176eeefd4efa9fac211470ff508602a557b4505b8d937cc25815b6736e1c4ab451df3d9be2e62b08e5d91", 0xcd}], 0x1}, 0x80) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000180)=@nl=@unspec, 0x80, &(0x7f0000000340)=[{&(0x7f0000000200)="4d6f231789d9eb6a7e6578eb7e6bd2fa019a61fb3d3308c6b0a7c9f4a84035fcf3729506ad88371808cb375bad3bf21942e95630f9e630a7c63561c6d2a304624bceec2489a27068a6754c25368ff6c2b1bee6a6c7c1c3b7875f4411ed313807", 0x60}], 0x1, &(0x7f0000001500)=ANY=[], 0x0, 0x4000}, 0x80) 2018/04/11 20:58:33 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001500)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000014c0)={&(0x7f0000000080)={0x14, 0x6, 0x1, 0x101, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x840}, 0x0) 2018/04/11 20:58:33 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="240000005e00030207fffd946fa283bc0ae6e60000000070320c5a00000003a2d189737e", 0x24}], 0x1}, 0x0) 2018/04/11 20:58:33 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) syz_emit_ethernet(0x988e518002d8b65, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x2d8b2f, 0x821, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/04/11 20:58:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80006, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000440)=@broute={'broute\x00', 0x20, 0x2, 0x228, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000880], 0x0, &(0x7f0000000340), &(0x7f0000000880)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0xb, 0x0, 0x0, 'bcsh0\x00', 'bcsf0\x00', 'erspan0\x00', 'eql\x00', @link_local={0x1, 0x80, 0xc2}, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0xf8, 0x148, 0x198, [@limit={'limit\x00', 0x20, {{0x0, 0x30}}}, @statistic={'statistic\x00', 0x18}]}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00'}}}]}, @common=@log={'log\x00', 0x28, {{0x0, "4ee0160200e00df3b12d605204883cdf87561568edc3d0247e3d8f68f8b1"}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x2a0) [ 58.159574] sit: non-ECT from 172.20.255.187 with TOS=0x1 [ 58.188500] sit: non-ECT from 172.20.255.187 with TOS=0x1 2018/04/11 20:58:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x1c, r1, 0x1, 0x0, 0x0, {0x1}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}]}, 0x1c}, 0x1}, 0x0) 2018/04/11 20:58:33 executing program 7: syz_emit_ethernet(0x6e, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, '\t\x00', 0x38, 0x40000000003a, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@time_exceed={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, "a97188", 0x0, 0x32, 0x0, @loopback={0x0, 0x1}, @loopback={0x0, 0x1}, [], "aabf21a21c6734cc"}}}}}}}, 0x0) 2018/04/11 20:58:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x50, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000300)=0x1b) [ 58.293349] dccp_v6_rcv: dropped packet with invalid checksum 2018/04/11 20:58:33 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$netlink(r0, &(0x7f0000a0cff4)={0x4400000010, 0x0, 0xffffffffffffffff, 0x70a0}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f00007e0000)=""/4, &(0x7f0000369000)=0x4) 2018/04/11 20:58:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x114, 0x200002711, &(0x7f0000000000)={@remote, @remote}, &(0x7f0000000040)=0xc) 2018/04/11 20:58:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={&(0x7f0000000ff4)={0x10}, 0xc, &(0x7f0000001ff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="50010000100001030000000000000000e00000020000000000000000000000000000000000000000000000000000000100000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x3}, 0x1}, 0x0) 2018/04/11 20:58:33 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={&(0x7f0000000ff4)={0x10}, 0xc, &(0x7f0000001ff0)={&(0x7f0000002000)=ANY=[@ANYBLOB="38010000100001030000000000000000e00000020000000000000000000000000000000000000000000000000000000100000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000010000000032000000ac14ffaa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cdedabcd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000048000200656362286369706865725f6e756c6c2900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3}, 0x1}, 0x0) 2018/04/11 20:58:33 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x490080, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) setpriority(0x3, 0x0, 0x0) ptrace(0x4207, r1) ptrace$poke(0x5, r1, &(0x7f0000000040), 0x0) 2018/04/11 20:58:33 executing program 1: r0 = socket$inet(0x2, 0x3, 0x8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in=@rand_addr}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x1, [@empty]}, 0x14) setsockopt$inet_mreqn(r0, 0x0, 0x25, &(0x7f0000000200)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 2018/04/11 20:58:33 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2f) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/11 20:58:33 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) pwritev(r1, &(0x7f0000000100)=[{&(0x7f0000000200)="10", 0x1}], 0x1, 0x0) r2 = dup3(r1, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x34123610) 2018/04/11 20:58:33 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) syz_emit_ethernet(0x988e518002d8b65, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x2d8b2f, 0x821, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/04/11 20:58:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x0, 0x800000003, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={"6c6f0000000000009613abb24c3d4407"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) [ 58.743981] device lo entered promiscuous mode 2018/04/11 20:58:33 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x0) 2018/04/11 20:58:33 executing program 6: perf_event_open(&(0x7f00000017c0)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'broute\x00', 0x20, 0x4, 0x610, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000cc0], 0x0, &(0x7f0000000240), &(0x7f0000000cc0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x5, 0x0, 0x0, 'lo\x00', 'bcsf0\x00', 'irlan0\x00', 'ip_vti0\x00', @empty, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x120, 0x120, 0x158, [@statistic={'statistic\x00', 0x18}, @stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2}, [], 0x0, 0x0, 0x0, 0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x680}}}]}}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xffffffffffffffff}}}}, {{{0x5, 0x0, 0x0, 'ifb0\x00', 'erspan0\x00', 'ifb0\x00', 'rose0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x70, 0xd0, 0x120}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x38}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', 'bond0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xa0, 0x138, 0x188, [@pkttype={'pkttype\x00', 0x8}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x130, 0x130, 0x180, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @limit={'limit\x00', 0x20}]}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x688) 2018/04/11 20:58:33 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x806, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/11 20:58:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x3, 0x1000, 0x1, 0x2}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000000, 0x0}, 0x2b4) 2018/04/11 20:58:33 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet(0x1e, 0x802, 0x0, &(0x7f0000f23ff8)={0x0}) sendmsg$key(r0, &(0x7f0000f22000)={0x0, 0x0, &(0x7f0000f22000)={&(0x7f0000000000)=ANY=[@ANYBLOB="1e000200010000000100000000000000"], 0x10}, 0x1}, 0x0) 2018/04/11 20:58:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001b40)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000001b00)={&(0x7f00000019c0)=@polexpire={0xc0, 0x1b, 0x301, 0x0, 0x0, {{{@in=@loopback=0x7f000001, @in=@multicast1=0xe0000001}}}}, 0xc0}, 0x1}, 0x0) [ 58.874389] dccp_v6_rcv: dropped packet with invalid checksum [ 59.017696] ================================================================== [ 59.025100] BUG: KMSAN: uninit-value in tipc_subscrb_rcv_cb+0x418/0xe80 [ 59.031854] CPU: 1 PID: 5 Comm: kworker/u4:0 Not tainted 4.16.0+ #83 [ 59.038341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.047702] Workqueue: tipc_rcv tipc_recv_work [ 59.052278] Call Trace: [ 59.054866] dump_stack+0x185/0x1d0 [ 59.058495] ? tipc_subscrb_rcv_cb+0x418/0xe80 [ 59.063076] kmsan_report+0x142/0x240 [ 59.066878] __msan_warning_32+0x6c/0xb0 [ 59.070935] tipc_subscrb_rcv_cb+0x418/0xe80 [ 59.075348] tipc_receive_from_sock+0x64c/0x800 [ 59.080018] ? tipc_topsrv_start+0x650/0x650 [ 59.084430] ? tipc_accept_from_sock+0x610/0x610 [ 59.089183] tipc_recv_work+0xd8/0x1f0 [ 59.093066] ? tipc_send_work+0xe20/0xe20 [ 59.097222] process_one_work+0x12c6/0x1f60 [ 59.101551] worker_thread+0x113c/0x24f0 [ 59.105625] ? process_one_work+0x1f60/0x1f60 [ 59.110123] kthread+0x539/0x720 [ 59.113487] ? process_one_work+0x1f60/0x1f60 [ 59.117983] ? kthread_blkcg+0xf0/0xf0 [ 59.121871] ret_from_fork+0x35/0x40 [ 59.125580] [ 59.127195] Uninit was created at: [ 59.130735] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 59.135834] kmsan_kmalloc+0x94/0x100 [ 59.139629] kmem_cache_alloc+0xaab/0xb90 [ 59.143776] tipc_receive_from_sock+0x15c/0x800 [ 59.148443] tipc_recv_work+0xd8/0x1f0 [ 59.152327] process_one_work+0x12c6/0x1f60 [ 59.156641] worker_thread+0x113c/0x24f0 [ 59.160699] kthread+0x539/0x720 [ 59.164061] ret_from_fork+0x35/0x40 2018/04/11 20:58:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x1c, 0x5, 0x100000000000006, 0x1, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@generic="06"]}]}, 0x1c}, 0x1}, 0x0) 2018/04/11 20:58:34 executing program 0: syz_emit_ethernet(0x988e518002d8b65, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x2d8b2f, 0x821, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 59.167760] ================================================================== [ 59.175109] Disabling lock debugging due to kernel taint [ 59.180550] Kernel panic - not syncing: panic_on_warn set ... [ 59.180550] [ 59.187913] CPU: 1 PID: 5 Comm: kworker/u4:0 Tainted: G B 4.16.0+ #83 [ 59.195696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.205057] Workqueue: tipc_rcv tipc_recv_work [ 59.209629] Call Trace: [ 59.212214] dump_stack+0x185/0x1d0 [ 59.215844] panic+0x39d/0x940 [ 59.219055] ? tipc_subscrb_rcv_cb+0x418/0xe80 [ 59.223633] kmsan_report+0x238/0x240 [ 59.227436] __msan_warning_32+0x6c/0xb0 [ 59.231495] tipc_subscrb_rcv_cb+0x418/0xe80 [ 59.235910] tipc_receive_from_sock+0x64c/0x800 [ 59.240578] ? tipc_topsrv_start+0x650/0x650 [ 59.244996] ? tipc_accept_from_sock+0x610/0x610 [ 59.249752] tipc_recv_work+0xd8/0x1f0 [ 59.253636] ? tipc_send_work+0xe20/0xe20 [ 59.257790] process_one_work+0x12c6/0x1f60 [ 59.262123] worker_thread+0x113c/0x24f0 [ 59.266193] ? process_one_work+0x1f60/0x1f60 [ 59.270691] kthread+0x539/0x720 [ 59.274057] ? process_one_work+0x1f60/0x1f60 [ 59.278544] ? kthread_blkcg+0xf0/0xf0 [ 59.282415] ret_from_fork+0x35/0x40 [ 59.286583] Dumping ftrace buffer: [ 59.290100] (ftrace buffer empty) [ 59.293783] Kernel Offset: disabled [ 59.297384] Rebooting in 86400 seconds..