[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 29.790654] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.419140] random: sshd: uninitialized urandom read (32 bytes read) [ 32.891178] random: sshd: uninitialized urandom read (32 bytes read) [ 34.398579] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.12' (ECDSA) to the list of known hosts. [ 39.899073] random: sshd: uninitialized urandom read (32 bytes read) 2018/05/15 19:46:13 fuzzer started 2018/05/15 19:46:13 dialing manager at 10.128.0.26:39577 [ 61.650356] can: request_module (can-proto-0) failed. [ 61.661438] can: request_module (can-proto-0) failed. 2018/05/15 19:46:36 kcov=true, comps=false 2018/05/15 19:46:39 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x800) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0], 0x1}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x3, 0x4000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) ioctl$void(r0, 0xc0045c79) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000180)) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20, 0x7ff, @local={0xfe, 0x80, [], 0xaa}, 0x8}, 0x1c) write$eventfd(r0, &(0x7f0000000200)=0x100, 0x8) connect$rds(r1, &(0x7f0000000240)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'veth0\x00', 0x21}) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000340)={{&(0x7f00000002c0)=""/36, 0x24}, &(0x7f0000000300), 0x2a}, 0x20) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000380)={0x3, 0x8}) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000004c0)=0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000500)={0x5, 0xf9, 0xcac}) ioctl(r1, 0xb78, &(0x7f0000000580)="4e53f8191a5dbebcc90983ce3269972626ffc9c8f11aa1b4192be28c74663d1336bf06b725cb3ea381f71b7a67c91ea2588f7b85f255") getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000005c0)={0x0, 0xfff, 0x5, [0x7fff, 0x9, 0xd3, 0x100000000, 0x800]}, &(0x7f0000000600)=0x12) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000640)={r2, 0x1}, 0x8) bind$pptp(r1, &(0x7f0000000680)={0x18, 0x2, {0x2, @multicast1=0xe0000001}}, 0x1e) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f00000006c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) socket$bt_cmtp(0x1f, 0x3, 0x5) fcntl$setsig(r1, 0xa, 0x2e) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000700)={{0x3, 0x7dd}, 0x1, 0xfff, 0x0, {0x9, 0x1}, 0x14, 0x4}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000780)={0x8, 0x0, 0x1, 0x80000001}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f00000007c0)={0x100000001, r3}) sendmsg$key(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000800)={0x2, 0x18, 0x712, 0x6, 0x30, 0x0, 0x70bd29, 0x25dfdbff, [@sadb_ident={0x2, 0xa, 0x0, 0x0, 0x1}, @sadb_sa={0x2, 0x1, 0x4d6, 0x1, 0x9, 0xc4, 0x4, 0x20000000}, @sadb_lifetime={0x4, 0x3, 0x100000001, 0x3f, 0x1, 0x4}, @sadb_x_sec_ctx={0x21, 0x18, 0x8, 0x0, 0xfe, "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"}, @sadb_address={0x3, 0x17, 0xff, 0x80, 0x0, @in={0x2, 0x4e23, @rand_addr=0x8}}, @sadb_spirange={0x2, 0x10, 0x4d6, 0x4d4}]}, 0x180}, 0x1}, 0x800) pwritev(r1, &(0x7f0000000c80)=[{&(0x7f0000000a00)='\\', 0x1}, {&(0x7f0000000a40)="d6a188107b293ae7657d739be2b50ee4d132563049ba0e155f100936d01a939f915aa55c976d790d23a5593fa73e4f6450b134677bf1638c0c6f4a910b61495c550874ea0a1394475708738fda42d6259f098f200035032879d2f1073cbe5e7223d01e08f6eff5fa02a0f44905fc31d2c3ff4bfd370cfb688cc38646252ceaac3a08f55bb0b6c314181670d098c3", 0x8e}, {&(0x7f0000000b00)="64dd4d36017c6b2265a0251ef3ce1927bda2faa5e2775af469d50836dc619cabf0e632701846a7495e11ca3304ab7010f7749c29418c85fec67fbccb160b085bce03bdabb0ed192d57a54779295a2b9cfa2f9962c1adc89098b44a7f2fe5021a3ccd994634a476319739e07be4bfb2d367a9ba26e1d40016ac93803ef679686e0abab2de94cd", 0x86}, {&(0x7f0000000bc0)="62a116dab1fd87d9612e3001ac7a96a894359bf7516251557a048c6bdfd558b67495b45019ed288a69016d5f28055f56dcbae49dc4e67bdbcbd1979618a4f31603fdf835f26d95531f8c7d341636894a11a8ce5d32f6a28e746ab8ac6fbf3b76b5c3d11df7ace73bd40fce201543197c64072e141c36969e38f4f8b9deca15c8c96478a73751b87ffd00b44084f03846c598b7bc781a0b2eff132b41d7bee64cede980e33d6ecb0f9bd8034db51647c25e23394f6ce4ba20d08fa5360c5e6e", 0xbf}], 0x4, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000cc0)={{0x0, 0x1}, {0x66c8, 0x1}, 0x237, 0x1, 0x5}) 2018/05/15 19:46:39 executing program 1: io_setup(0xf740, &(0x7f0000000000)=0x0) io_getevents(r0, 0x6, 0x6, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000100)={0x77359400}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='oom_score_adj\x00') r2 = accept4$ipx(r1, &(0x7f0000000180), &(0x7f00000001c0)=0x10, 0x80800) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'ip6tnl0\x00', 0x20}) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x5, 0x4, 0x10, "07b4e90423a5590a613d116ba13c1818e9f92b7015d059fcbd1510f1739919f45a0eb3309698b33dd853986cd0412ef094fb33a3a1bb6cf9ff009a00105d1c52", "d439208a3ffbeeda27c3dadfc4b89a344c19359aabe79df18c007856edcff55f", [0x1000, 0x3]}) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000300)='cubic\x00', 0x6) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000340)=""/83) bind$pptp(r1, &(0x7f00000003c0)={0x18, 0x2, {0x1, @loopback=0x7f000001}}, 0x1e) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000440)={0x9, &(0x7f0000000400)=[{0x7f, 0x401}, {0x34, 0x6}, {0x7, 0x7}, {0x401, 0x30b}, {0xaca3, 0x2}, {0x7, 0x80}, {0x74ef, 0x100000000}, {0x8001, 0x1f}, {0x1, 0xbe}]}) syz_open_dev$urandom(&(0x7f0000000480)='/dev/urandom\x00', 0x0, 0x400000) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000004c0)={0x61, {{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1, 0x2, [{{0x2, 0x4e23}}, {{0x2, 0x4e21, @loopback=0x7f000001}}]}, 0x190) prctl$setmm(0x23, 0x4, &(0x7f0000ffc000/0x4000)=nil) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x30, r3, 0x400, 0x70bd29, 0x25dfdbfc, {0x9}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3c}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40008c0}, 0x800) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x110, r2, 0x0) acct(&(0x7f00000007c0)='./file0\x00') r4 = syz_open_dev$amidi(&(0x7f0000000800)='/dev/amidi#\x00', 0x6, 0x4000) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ppp\x00', 0x80042, 0x0) ioctl$TIOCLINUX4(r4, 0x541c, &(0x7f0000000880)=0x4) accept4$bt_l2cap(r4, &(0x7f00000008c0), &(0x7f0000000900)=0xe, 0x0) clock_gettime(0x2, &(0x7f0000000940)) execveat(r1, &(0x7f0000000980)='.\x00', &(0x7f0000000a00)=[&(0x7f00000009c0)='/dev/ppp\x00'], &(0x7f0000000c00)=[&(0x7f0000000a40)='/dev/ppp\x00', &(0x7f0000000a80)='oom_score_adj\x00', &(0x7f0000000ac0)='eth0/&\x00', &(0x7f0000000b00)="27766d6e6574305dde656d30776c616e312a6d643573756d656d317d7070703100", &(0x7f0000000b40)='ppp0$\x00', &(0x7f0000000b80)='ppp0\x00', &(0x7f0000000bc0)='eth0self/\x00'], 0x1100) sendmsg$nfc_llcp(r1, &(0x7f0000000e00)={&(0x7f0000000c40)={0x27, 0x1, 0x2, 0x4, 0xffffffffffff95dd, 0xc24e, "a1b57b01badf756406767ca0c928987ec467a9692ea58d08ad4df397430ae7eb2119c8cd335669d08af509d4e71fb54570366e58a7ac6e6dca33c222c742f7", 0x22}, 0x60, &(0x7f0000000d00)=[{&(0x7f0000000cc0)="21b78d1c0b69482c9126e9fec8e87152faa5cf0fd52f065b", 0x18}], 0x1, &(0x7f0000000d40)={0xa0, 0x13f, 0x7, "1a4d78a8337b631e6c682d15ee888a547c8ecc66eb4901636ca5f2801e9e6a77e734e15c33a49a7e661bab6ac51c7290014a53b8ac717a1f8109432813092a1b261fd30ffcd8326d431d6f1ffa598d00defe2610bbda9c25944fade67b231653713ffd3eeec122da8c105cbb9e2aad2376da82aefb4b785065a6ee21057adb196ca0c04be1e5ddfdd0fd51d7e93753"}, 0xa0, 0x5}, 0x0) clock_gettime(0x7, &(0x7f0000000e40)) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000e80)=0xffff, 0x8) mount(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)='qnx4\x00', 0x100084, &(0x7f0000000f80)="9b2f0b6f7ff0eed7a43d47a18810848dfc7ef5dcc09325ed06e94d93826f4f067540380834b26a516ce55a8d709bc409e2f572db3bb092615242428379cc8b03fb8acf5f3c3c0c71e9698df548d3722f27689f93a5a134b1ac8ed6d38b5b4b3e4cb9e420d009a1d155a053732aa895dc3f564f4587e315459598cdae") mount(&(0x7f0000001000)='./file1\x00', &(0x7f0000001040)='./file0\x00', &(0x7f0000001080)='nfs4\x00', 0x1000040, &(0x7f00000010c0)="b9117b410e509ee43a16583a5773b8e4730a7242fc62bf352501664c75cc9f34e9920d7cb4bce2e3c6003d53da38b91513ff8cc0952417da07146e3952b10f46d7ff76fa4fecaeb003f7093036ded8b8bbf16294c38544aa7cad7217e128898119eba0a6c957f7d8f4c6442b5feee311fc75472d053a1eca63ef89da1494dfdd68a59c28dfec553c165c40cf60f0faab7612363f10ad30c2dd6cc615fdb6d2692424cb082f20ae6d3b29e7f1350df20c34026e73109b00e4e8fe86f9954d2a6e9ae654d02ee039") getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000011c0)={0x0, @in={{0x2, 0x4e21, @rand_addr=0x6}}, [0x9, 0x2, 0x1, 0x39f3, 0x5, 0x3, 0xffffffffffffff7f, 0x0, 0x6, 0x80000000, 0x3f, 0x2cdc, 0x400, 0x8, 0xfe00000000000000]}, &(0x7f00000012c0)=0x100) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000001300)={r6, 0x401}, &(0x7f0000001340)=0x8) 2018/05/15 19:46:39 executing program 7: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000040)) getpeername$llc(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0xff80000000, 0x7, 0x40}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r2, 0x3f, 0xffffffffffffffff, 0x1}, 0x10) fcntl$setstatus(r0, 0x4, 0x2400) write$binfmt_aout(r1, &(0x7f00000001c0)={{0x108, 0xe78, 0x6, 0x113, 0xe4, 0x8, 0x2d5, 0x7}, "13b9a8046804b3805cf58d1ac64a2dd530348e253a29ca6516049e2072815feea2dc5c8fa6d69a7dc7ef19b83987121836ed6189716cb45d39fbd2b2c1ea1e1b0928f10296f82c9c7d7f", [[], [], [], [], [], []]}, 0x66a) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000840)={{0x2, 0x4e22, @multicast1=0xe0000001}, {0x6}, 0x42, {0x2, 0x4e22, @broadcast=0xffffffff}, 'veth1_to_bridge\x00'}) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000008c0)=r2, 0x4) r4 = socket$rds(0x15, 0x5, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000900)='/dev/zero\x00', 0x42000, 0x0) fallocate(r3, 0x1, 0x8, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000940)={@mcast1={0xff, 0x1, [], 0x1}, 0x5, 0x0, 0xff, 0x9, 0x3, 0x2, 0x40}, 0x20) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000980)=@assoc_value={r2, 0x3}, &(0x7f00000009c0)=0x8) r7 = socket$inet6_dccp(0xa, 0x6, 0x0) epoll_wait(r1, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x5ac27364) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x487, &(0x7f0000000a80), &(0x7f0000000ac0)=0x30) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000b00)={0x2, 0x2, 0x100000001, 0x238a, [], [], [], 0x0, 0x598ded52, 0x8, 0x7ff, "1820d05dc4788a78ddf440bcce9143ed"}) fcntl$setsig(r0, 0xa, 0x35) ioctl$BLKROGET(r5, 0x125e, &(0x7f0000000c40)) getsockopt$inet6_buf(r1, 0x29, 0x3d, &(0x7f0000000c80)=""/190, &(0x7f0000000d40)=0xbe) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000d80)={{0x3, 0x1, 0x10000, 0x3, 0x100}, 0x1ff, 0x6}) syz_genetlink_get_family_id$fou(&(0x7f0000000e00)='fou\x00') getsockname$llc(r7, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000e80)=0x10) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000ec0)={r6, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}, 0x4, 0x20}, &(0x7f0000000f80)=0x90) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000fc0)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000010c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000001100)={@mcast2={0xff, 0x2, [], 0x1}, r8}, 0x14) 2018/05/15 19:46:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) read(r0, &(0x7f0000000380)=""/206, 0xffffffffffffffe6) r1 = memfd_create(&(0x7f000088f000)='\x00\x00\x00', 0x4) ftruncate(r1, 0x1000000) read(r1, &(0x7f0000000100)=""/48, 0xfffffd9a) 2018/05/15 19:46:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r1, 0x0) 2018/05/15 19:46:39 executing program 3: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0x5b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001040], 0x0, &(0x7f0000000080), &(0x7f0000001040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'veth0_to_team\x00', 'ipddp0\x00', 'bridge_slave_0\x00', "7465616d5f73ff5e76655f30004000", @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0x70, 0x218}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:usb_device_t:s0\x00'}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bond_slave_0\x00', 'veth1_to_bridge\x00', 'syz_tun\x00', 'eql\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xa8, 0x1d8, 0x308, [@mac={'mac\x00', 0x10}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:var_spool_t:s0\x00'}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:bsdpty_device_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x628) 2018/05/15 19:46:39 executing program 5: pipe2(&(0x7f0000001ff8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f00003ba000/0x3000)=nil, 0x20000002, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) vmsplice(r0, &(0x7f0000b1d000)=[{&(0x7f0000005fe3)}], 0x1, 0x0) 2018/05/15 19:46:39 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="350e9f45fa858e672f"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000000180)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x2, &(0x7f0000000080)="a82591bd5e5eeb7c3e6dbeed8dff", &(0x7f0000000100)=""/2}, 0x28) [ 67.279932] IPVS: ftp: loaded support on port[0] = 21 [ 67.418185] IPVS: ftp: loaded support on port[0] = 21 [ 67.445148] IPVS: ftp: loaded support on port[0] = 21 [ 67.507916] IPVS: ftp: loaded support on port[0] = 21 [ 67.515196] IPVS: ftp: loaded support on port[0] = 21 [ 67.524329] IPVS: ftp: loaded support on port[0] = 21 [ 67.566392] IPVS: ftp: loaded support on port[0] = 21 [ 67.585385] IPVS: ftp: loaded support on port[0] = 21 [ 68.817785] ip (4641) used greatest stack depth: 54552 bytes left [ 69.027969] ip (4658) used greatest stack depth: 54456 bytes left [ 69.963365] ip (4732) used greatest stack depth: 54408 bytes left [ 70.155282] ip (4755) used greatest stack depth: 54312 bytes left [ 70.406251] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.412749] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.438192] device bridge_slave_0 entered promiscuous mode [ 70.694709] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.701210] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.737928] device bridge_slave_1 entered promiscuous mode [ 70.807510] ip (4804) used greatest stack depth: 53800 bytes left [ 70.860984] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.867465] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.912193] device bridge_slave_0 entered promiscuous mode [ 70.935426] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.941891] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.955955] device bridge_slave_0 entered promiscuous mode [ 70.967746] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.979652] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.986135] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.023301] device bridge_slave_0 entered promiscuous mode [ 71.043937] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.050437] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.060137] device bridge_slave_0 entered promiscuous mode [ 71.067994] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.074472] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.089368] device bridge_slave_0 entered promiscuous mode [ 71.104077] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.110550] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.137580] device bridge_slave_1 entered promiscuous mode [ 71.144295] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.150713] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.171065] device bridge_slave_0 entered promiscuous mode [ 71.179293] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.185758] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.201697] device bridge_slave_0 entered promiscuous mode [ 71.210650] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.224861] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.231312] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.266451] device bridge_slave_1 entered promiscuous mode [ 71.285637] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.292115] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.309757] device bridge_slave_1 entered promiscuous mode [ 71.318011] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.324560] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.343072] device bridge_slave_1 entered promiscuous mode [ 71.352489] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.358952] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.369307] device bridge_slave_1 entered promiscuous mode [ 71.380582] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.394699] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.401172] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.438668] device bridge_slave_1 entered promiscuous mode [ 71.455793] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.463019] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.469511] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.485843] device bridge_slave_1 entered promiscuous mode [ 71.504074] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.511994] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.525211] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.544269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.622253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.703391] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.715517] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.731587] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.756225] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.764919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.809154] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.903522] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.943721] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.090940] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.154639] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.286546] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.361709] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.402927] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.422020] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.443915] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.478968] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.575074] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.587272] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.616564] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.631848] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 72.645402] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.659519] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 72.666546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.685815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.710673] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.730178] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.818419] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 72.825431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.849430] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 72.856454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.896226] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.914206] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 72.925925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.940646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 72.965211] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 72.978576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.018370] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.060146] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.072190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.090100] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.100529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.136947] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 73.148648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.164643] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.175067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.187667] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.209716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.242178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.249682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.322955] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.348619] team0: Port device team_slave_0 added [ 73.393886] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.406566] team0: Port device team_slave_0 added [ 73.437230] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 73.445909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.589196] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.611552] team0: Port device team_slave_1 added [ 73.633900] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.645508] team0: Port device team_slave_1 added [ 73.725203] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.755571] team0: Port device team_slave_0 added [ 73.781547] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.806601] team0: Port device team_slave_0 added [ 73.836311] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.846883] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.868495] team0: Port device team_slave_0 added [ 73.881593] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.898708] team0: Port device team_slave_0 added [ 73.903975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.925761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.935476] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.942567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.963742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.995061] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.006243] team0: Port device team_slave_1 added [ 74.019013] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.027205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.035911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.044304] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.052151] team0: Port device team_slave_1 added [ 74.059740] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.068371] team0: Port device team_slave_0 added [ 74.082630] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.096859] team0: Port device team_slave_1 added [ 74.128830] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.137505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.161618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.186628] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.195092] team0: Port device team_slave_1 added [ 74.236970] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.258580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.269447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.291483] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.298510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.310697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.329744] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.340905] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.350144] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.358493] team0: Port device team_slave_1 added [ 74.386597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.399642] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.419199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.437171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.453349] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.466661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.479507] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.488346] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.495774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.508142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.523881] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 74.537836] team0: Port device team_slave_0 added [ 74.554132] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.571870] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.579596] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.587731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.603677] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.631080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.653820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.675134] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.682481] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.695686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.708812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.720414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.736711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.753406] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.760396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.771861] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.784766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.793685] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.817292] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.833909] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.841912] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 74.865343] team0: Port device team_slave_1 added [ 74.890582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.907262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.936731] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.965835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.984632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.993013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.000983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.009218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.017768] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.045908] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.055141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.075515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.099653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.113478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.129700] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.137627] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.145142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.153919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.161994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.170585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.180673] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.188883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.204718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.238281] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 75.247956] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.259463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.267683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.277802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.304508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.325106] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.338793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.361118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.395411] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.403977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.441227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.495437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 75.502436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 75.520922] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.744550] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 75.752734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.763522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.945137] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.952578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.962371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.157768] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.164252] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.171097] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.177532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.230367] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.236918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.429150] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.435629] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.442425] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.448867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.459135] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.465908] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.472351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.479146] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.485567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.515692] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.542668] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.549123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.555873] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.562296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.570718] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.590356] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.596821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.603588] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.610018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.682126] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.856545] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.863078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.869873] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.876313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.909304] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.991214] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.997674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.004504] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.010967] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.091000] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.239180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.249809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.280887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.294825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.306071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.314325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.349616] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.356104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.362924] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.369361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.381351] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 79.263346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.818383] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.845235] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.899810] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.058743] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.082933] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.340993] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.601503] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 86.610979] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 86.653613] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 86.701914] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.733903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.816564] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 86.871285] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.183905] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.403118] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.409555] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.417858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.450966] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.467489] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.474061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.498820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.521690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.540249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.562540] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.589748] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.630660] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.637006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.645226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.775336] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.781658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.796746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.051801] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.058760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.067290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.230133] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.295698] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.320582] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.387534] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.460408] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.466985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.506951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.521799] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.551176] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.570522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.587391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.799155] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.215693] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.247377] 8021q: adding VLAN 0 to HW filter on device team0 2018/05/15 19:47:06 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xa, 0x14, 0x14}}, 0x10, &(0x7f00000005c0), 0x0, &(0x7f0000000280)=[@dstaddrv6={0x1c, 0x84, 0x2, @dev={0xfe, 0x80}}], 0x1c}, 0x0) [ 93.379671] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'broute' 2018/05/15 19:47:07 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000040)) 2018/05/15 19:47:07 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x43, &(0x7f0000000080), 0xb6e7d10d529ef8d7) 2018/05/15 19:47:07 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r1, 0x0) 2018/05/15 19:47:07 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$inet6_mtu(r0, 0x29, 0x49, &(0x7f0000000080), 0xb6e7d10d529ef8d7) 2018/05/15 19:47:07 executing program 3: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0x5b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001040], 0x0, &(0x7f0000000080), &(0x7f0000001040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'veth0_to_team\x00', 'ipddp0\x00', 'bridge_slave_0\x00', "7465616d5f73ff5e76655f30004000", @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0x70, 0x218}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:usb_device_t:s0\x00'}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bond_slave_0\x00', 'veth1_to_bridge\x00', 'syz_tun\x00', 'eql\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xa8, 0x1d8, 0x308, [@mac={'mac\x00', 0x10}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:var_spool_t:s0\x00'}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:bsdpty_device_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x628) 2018/05/15 19:47:07 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) read(r0, &(0x7f0000000380)=""/206, 0xffffffffffffffe6) r1 = memfd_create(&(0x7f000088f000)='\x00\x00\x00', 0x4) ftruncate(r1, 0x1000000) read(r1, &(0x7f0000000100)=""/48, 0xfffffd9a) 2018/05/15 19:47:07 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x6) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 2018/05/15 19:47:07 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="350e9f45fa858e672f"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000000180)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x2, &(0x7f0000000080)="a82591bd5e5eeb7c3e6dbeed8dff", &(0x7f0000000100)=""/2}, 0x28) [ 94.266498] netlink: 2 bytes leftover after parsing attributes in process `syz-executor5'. 2018/05/15 19:47:07 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x14, r1, 0x401, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 2018/05/15 19:47:07 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x10, &(0x7f0000000080), 0xb6e7d10d529ef8d7) [ 94.318881] netlink: 2 bytes leftover after parsing attributes in process `syz-executor5'. [ 94.331263] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'broute' 2018/05/15 19:47:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x13, &(0x7f0000000080), 0xb6e7d10d529ef8d7) 2018/05/15 19:47:07 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r1, 0x0) 2018/05/15 19:47:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) sendfile(r1, r2, &(0x7f00007ed000)=0x7, 0x7f) 2018/05/15 19:47:07 executing program 3: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0x5b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001040], 0x0, &(0x7f0000000080), &(0x7f0000001040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'veth0_to_team\x00', 'ipddp0\x00', 'bridge_slave_0\x00', "7465616d5f73ff5e76655f30004000", @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0x70, 0x218}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:usb_device_t:s0\x00'}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bond_slave_0\x00', 'veth1_to_bridge\x00', 'syz_tun\x00', 'eql\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xa8, 0x1d8, 0x308, [@mac={'mac\x00', 0x10}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:var_spool_t:s0\x00'}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:bsdpty_device_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x628) 2018/05/15 19:47:07 executing program 3: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0x5b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001040], 0x0, &(0x7f0000000080), &(0x7f0000001040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'veth0_to_team\x00', 'ipddp0\x00', 'bridge_slave_0\x00', "7465616d5f73ff5e76655f30004000", @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0x70, 0x218}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:usb_device_t:s0\x00'}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bond_slave_0\x00', 'veth1_to_bridge\x00', 'syz_tun\x00', 'eql\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xa8, 0x1d8, 0x308, [@mac={'mac\x00', 0x10}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:var_spool_t:s0\x00'}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:bsdpty_device_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x628) 2018/05/15 19:47:07 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) sendfile(r1, r2, &(0x7f00007ed000), 0x73e0) 2018/05/15 19:47:07 executing program 7: r0 = socket$netlink(0x10, 0x3, 0xa) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bb0000000000000000b8464e11373eead41c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000098426f099f9748006a814cb2b02142c44a4c3815"], 0x120) socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000140)=']\x00', 0x1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000180)={0x0, @tick=0x8, 0x6, {0x5, 0x2a}, 0x8000, 0x2, 0x4}) 2018/05/15 19:47:07 executing program 4: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") recvmsg(r0, &(0x7f0000000380)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)=""/99, 0x63}], 0x1, &(0x7f0000000300)=""/77, 0x4d}, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3, 0x73d}, 0xe1) sendto$inet6(r0, &(0x7f0000000000)="84", 0x1, 0x0, 0x0, 0x0) 2018/05/15 19:47:07 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r1, 0x0) 2018/05/15 19:47:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) sendfile(r1, r2, &(0x7f00007ed000)=0x7, 0x7f) 2018/05/15 19:47:07 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r1 = socket(0x2001d, 0x7, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$int_out(r0, 0xc0984124, &(0x7f0000000040)) 2018/05/15 19:47:07 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = accept$inet(r0, &(0x7f0000000000)={0x0, 0x0, @multicast2}, &(0x7f0000000040)=0x10) getsockname$llc(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000140)=0x10) accept$inet(r1, &(0x7f0000000180)={0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000080)={{0x0, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e22, 0x200000000000000, 'none\x00', 0x3}, {@loopback=0x7f000001}}, 0x1) [ 94.679110] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'broute' 2018/05/15 19:47:07 executing program 5: r0 = socket$inet(0x2, 0x840000000003, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f00000000c0)=0x10407ff, 0x2) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) 2018/05/15 19:47:07 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) iopl(0x1) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x28) socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f00000001c0)={0x34, 0x4, r2, 0x3, r3, 0x0, 0x9, 0xfd9}) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa009078000000000100000100024e2100089078000012e3c0160800088a724688ed3c1f6dbcbea4a3e270e4789cd7a01b0dc5aff2160b4564a609b16082be261b65aaeb018a9d0cd71a08b6ea8cc39d190f8ee07e07273542d632659a5fc167cc7f7aba3dc6570abfc9c416b34c56d0e662cc1f3a38d1ca69dc5cd3860866e1ddeb1d1ef58fc56eecea064b0a979d5c456c210d8c94f30c99a09e32de41c8f956597591b4fc5f22e9c7d7e5bd049a0afe836fa8fd2e0e62f811d33880954a29cbe905c70ea7cf4b4c996015243f9f59b671d888524c098ea935da4765ad289b45c6c213dce6597bc616338c372d9a5d505955e00d02986acafbcba2418257a17e41f634ae80bcd18c7c617d0b2758568b26f204f13a4fa3867a8ad5fd758dd30414cda97ccef22de6ac83eb7c8a684932"], 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000340), &(0x7f0000000380)=0x4) 2018/05/15 19:47:07 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 2018/05/15 19:47:07 executing program 0: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000600)=0xfffffffffffffff9, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x7}, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x100, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x30) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000040)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0x10) [ 94.861633] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'broute' 2018/05/15 19:47:07 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer\x00', 0x80200, 0x0) bind$alg(r0, &(0x7f0000000700)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x3, 0x0) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000000)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x501800, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f00000000c0)=0x5, 0x4) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x810, r1, 0x0) 2018/05/15 19:47:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x73e0) sendfile(r1, r2, &(0x7f00007ed000)=0x7, 0x7f) 2018/05/15 19:47:08 executing program 3: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0x5b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001040], 0x0, &(0x7f0000000080), &(0x7f0000001040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'veth0_to_team\x00', 'ipddp0\x00', 'bridge_slave_0\x00', "7465616d5f73ff5e76655f30004000", @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x70, 0x70, 0x218}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:usb_device_t:s0\x00'}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bond_slave_0\x00', 'veth1_to_bridge\x00', 'syz_tun\x00', 'eql\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xa8, 0x1d8, 0x308, [@mac={'mac\x00', 0x10}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:var_spool_t:s0\x00'}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:bsdpty_device_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x628) [ 95.008450] Unknown ioctl 19278 [ 95.040865] Unknown ioctl -2147191725 [ 95.067680] Unknown ioctl 19278 2018/05/15 19:47:08 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='#'], 0x1) getsockname$inet6(r0, &(0x7f0000000080), &(0x7f0000000100)=0x1c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40c341}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xd8, r1, 0x8, 0x70bd29, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x10}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7f}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7c0000000000000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8b5b}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4}, 0x24008015) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000040), 0x1000) [ 95.090707] Unknown ioctl -2147191725 2018/05/15 19:47:08 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) 2018/05/15 19:47:08 executing program 6: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @loopback=0x7f000001}}, 0x401, 0x4, 0x6, 0x3, 0x528}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0x2, 0x20}, 0xc) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f000018effc)=0x1c, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) sendto$unix(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@abs={0x1}, 0x6e) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x36) [ 95.537109] ================================================================== [ 95.544523] BUG: KMSAN: uninit-value in move_addr_to_user+0x32e/0x530 [ 95.551095] CPU: 0 PID: 6663 Comm: syz-executor4 Not tainted 4.17.0-rc3+ #93 [ 95.558275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.567605] Call Trace: [ 95.570177] dump_stack+0x185/0x1d0 [ 95.573787] ? kmsan_internal_check_memory+0x116/0x1e0 [ 95.579050] kmsan_report+0x142/0x240 [ 95.582832] kmsan_internal_check_memory+0x135/0x1e0 [ 95.587925] kmsan_copy_to_user+0x75/0x160 [ 95.592162] move_addr_to_user+0x32e/0x530 [ 95.596377] ___sys_recvmsg+0x4e2/0x810 [ 95.600345] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 95.605686] ? __fget_light+0x6b9/0x710 [ 95.609657] __x64_sys_recvmsg+0x325/0x460 [ 95.613882] do_syscall_64+0x154/0x220 [ 95.617766] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 95.622951] RIP: 0033:0x455a09 [ 95.626118] RSP: 002b:00007f341fcc7c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 95.633813] RAX: ffffffffffffffda RBX: 00007f341fcc86d4 RCX: 0000000000455a09 [ 95.641074] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000013 [ 95.648334] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 95.655586] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 95.662837] R13: 0000000000000549 R14: 00000000006fbf78 R15: 0000000000000000 [ 95.670089] [ 95.671695] Local variable description: ----addr@___sys_recvmsg [ 95.677726] Variable was created at: [ 95.681431] ___sys_recvmsg+0xd5/0x810 [ 95.685298] __x64_sys_recvmsg+0x325/0x460 [ 95.689506] [ 95.691111] Byte 19 of 32 is uninitialized [ 95.695320] ================================================================== [ 95.702655] Disabling lock debugging due to kernel taint [ 95.708084] Kernel panic - not syncing: panic_on_warn set ... [ 95.708084] [ 95.715452] CPU: 0 PID: 6663 Comm: syz-executor4 Tainted: G B 4.17.0-rc3+ #93 [ 95.724019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.733361] Call Trace: [ 95.735932] dump_stack+0x185/0x1d0 [ 95.739543] panic+0x39d/0x940 [ 95.742733] ? kmsan_internal_check_memory+0x116/0x1e0 [ 95.747992] kmsan_report+0x238/0x240 [ 95.751779] kmsan_internal_check_memory+0x135/0x1e0 [ 95.756870] kmsan_copy_to_user+0x75/0x160 [ 95.761093] move_addr_to_user+0x32e/0x530 [ 95.765324] ___sys_recvmsg+0x4e2/0x810 [ 95.769285] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 95.774643] ? __fget_light+0x6b9/0x710 [ 95.778603] __x64_sys_recvmsg+0x325/0x460 [ 95.782821] do_syscall_64+0x154/0x220 [ 95.786696] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 95.791865] RIP: 0033:0x455a09 [ 95.795040] RSP: 002b:00007f341fcc7c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 95.802732] RAX: ffffffffffffffda RBX: 00007f341fcc86d4 RCX: 0000000000455a09 [ 95.809982] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000013 [ 95.817232] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 95.824485] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 95.831738] R13: 0000000000000549 R14: 00000000006fbf78 R15: 0000000000000000 [ 95.839506] Dumping ftrace buffer: [ 95.843030] (ftrace buffer empty) [ 95.846712] Kernel Offset: disabled [ 95.850314] Rebooting in 86400 seconds..