INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.11' (ECDSA) to the list of known hosts. 2018/04/20 19:43:26 fuzzer started 2018/04/20 19:43:26 dialing manager at 10.128.0.26:40315 2018/04/20 19:43:33 kcov=true, comps=false 2018/04/20 19:43:37 executing program 0: r0 = socket$inet6(0x10, 0x2000000800000003, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000016000)=@nl=@kern={0x10}, 0x80, &(0x7f0000000040)=[{&(0x7f0000018000)="5500000018007fb1b72d1cb2a4a280a80a06390000a843020a052369250009001000001c02000000060005000200005a000000dc1338d544000a9b84226eb75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000006000)}, 0x0) 2018/04/20 19:43:37 executing program 3: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) dup2(r0, r1) readv(r1, &(0x7f0000459000)=[{&(0x7f0000fd5fc3)=""/61, 0x33c}], 0x2000000000000144) r2 = gettid() timer_create(0x0, &(0x7f0000c00000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x5031, 0xffffffffffffffff, 0x0) tkill(r2, 0x1020000000016) 2018/04/20 19:43:37 executing program 1: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x2691d0877f1cca9b}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) write$tun(r1, &(0x7f00000000c0)={@pi, @hdr={0x3, 0x0, 0x0, 0x46b9, 0x0, 0xffffffff}, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @multicast1=0xe0000001, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x2a) 2018/04/20 19:43:37 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x200000000000009}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)}, 0x20) 2018/04/20 19:43:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000)="827021baca", &(0x7f0000000080)=""/98}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000080)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000300)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) 2018/04/20 19:43:37 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001e80)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001e40)={&(0x7f0000001d80)=@mpls_delroute={0x1c, 0x19, 0x3, 0x0, 0x0, {0x1c}}, 0x1c}, 0x1}, 0x0) 2018/04/20 19:43:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x4, 0x8, 0x4004, 0x20, 0xffffffffffffffff, 0x0, [0x140]}, 0x2c) 2018/04/20 19:43:37 executing program 6: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000025c0)=[{&(0x7f00000012c0)="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", 0x7fa, 0x6}], 0x8400, &(0x7f0000002680)) syzkaller login: [ 43.932103] ip (3809) used greatest stack depth: 54408 bytes left [ 44.830440] ip (3898) used greatest stack depth: 54200 bytes left [ 44.929300] ip (3904) used greatest stack depth: 53960 bytes left [ 45.258143] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.264619] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.291766] device bridge_slave_0 entered promiscuous mode [ 45.362820] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.369322] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.399743] device bridge_slave_0 entered promiscuous mode [ 45.423762] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.430261] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.463014] device bridge_slave_0 entered promiscuous mode [ 45.484229] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.490703] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.520936] device bridge_slave_0 entered promiscuous mode [ 45.532993] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.539486] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.560927] device bridge_slave_0 entered promiscuous mode [ 45.568303] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.574776] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.591214] device bridge_slave_0 entered promiscuous mode [ 45.606473] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.612978] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.623622] device bridge_slave_0 entered promiscuous mode [ 45.634762] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.641266] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.650332] device bridge_slave_1 entered promiscuous mode [ 45.662581] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.669099] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.706192] device bridge_slave_1 entered promiscuous mode [ 45.714683] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.721172] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.744958] device bridge_slave_0 entered promiscuous mode [ 45.755573] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.762110] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.772638] device bridge_slave_1 entered promiscuous mode [ 45.779379] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.785855] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.805007] device bridge_slave_1 entered promiscuous mode [ 45.821191] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.827708] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.843773] device bridge_slave_1 entered promiscuous mode [ 45.853580] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.860115] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.876073] device bridge_slave_1 entered promiscuous mode [ 45.894848] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.904429] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.914337] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.923697] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.930894] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.937463] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.978172] device bridge_slave_1 entered promiscuous mode [ 45.984579] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.991116] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.040390] device bridge_slave_1 entered promiscuous mode [ 46.069402] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.080010] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.096738] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.125844] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.139320] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.157539] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.166961] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.237306] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.282955] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.340454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.397672] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.470697] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.028170] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.110733] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.122638] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.182083] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.227110] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.330821] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.338235] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.359903] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.371800] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.382696] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.404142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.442326] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.566287] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.595125] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.608997] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.667787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.265595] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.283831] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.405378] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.473418] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.481577] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.499278] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.529824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.582265] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.614331] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.645563] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.678407] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.687886] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.696647] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.703858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.712786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.755523] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.762714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.773972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.805316] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.827515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.870399] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.878941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.895441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.926742] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.933970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.950765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.980529] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.991015] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.000748] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.014096] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.023091] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.030340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.046105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.077159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.106322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.137582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.161822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.171519] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.179237] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.190138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.209361] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.225181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.250842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.269324] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.276831] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.284649] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.292889] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.300331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.360755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.388854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.410391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.424134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.432940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.441176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.448945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.467162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.474408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.483961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.504699] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.512892] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.531346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.562700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.598687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.631759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.430296] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.436796] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.443641] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.450124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.469685] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.479572] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.504706] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.511703] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.518560] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.525066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.577270] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.667251] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.673734] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.680556] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.687010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.757138] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.769715] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.776173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.783057] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.789522] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.799502] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.806579] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.813101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.819959] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.826435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.850298] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.868023] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.874555] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.881410] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.887858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.897270] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.909632] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.916147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.923081] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.929540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.994716] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.071199] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.077684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.084560] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.091088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.125455] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.512149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.532277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.554316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.574950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.589611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.596795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.604600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.963748] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.027608] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.049561] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.186745] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.351379] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.394440] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.471292] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.561299] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.694293] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.700582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.711588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.849914] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.856204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.865928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.903775] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.913221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.952640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.988375] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.995456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.006985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.241623] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.247955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.262483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.288356] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.294847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.302196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.334958] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.345867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.372873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.410603] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.417622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.451495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.691759] skbuff: bad partial csum: csum=0/65535 len=28 2018/04/20 19:44:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setlink={0x28, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_MASTER={0x8, 0xa, 0xf}]}, 0xff70}, 0x1}, 0x0) 2018/04/20 19:44:03 executing program 1: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x2691d0877f1cca9b}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) write$tun(r1, &(0x7f00000000c0)={@pi, @hdr={0x3, 0x0, 0x0, 0x46b9, 0x0, 0xffffffff}, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @multicast1=0xe0000001, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x2a) 2018/04/20 19:44:03 executing program 6: setrlimit(0x2, &(0x7f0000000080)) mremap(&(0x7f000005d000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000b20000/0x4000)=nil) 2018/04/20 19:44:04 executing program 4: chroot(&(0x7f0000000040)='./file0\x00') chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') umount2(&(0x7f0000000000)='../file0\x00', 0x0) open$dir(&(0x7f00000003c0)='../file0\x00', 0x0, 0x0) [ 68.031132] skbuff: bad partial csum: csum=0/65535 len=28 [ 68.064138] mmap: syz-executor6 (5768): VmData 18452480 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. 2018/04/20 19:44:04 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @multicast1=0xe0000001}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'bond0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[]}, 0x1}, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000240)={0x5}) 2018/04/20 19:44:04 executing program 5: request_key(&(0x7f0000000340)='big_key\x00', &(0x7f0000000600)={0x73, 0x79, 0x7a}, &(0x7f0000000640)='blacklist\x00', 0x0) [ 68.149566] netlink: 17 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/20 19:44:04 executing program 1: setrlimit(0x2, &(0x7f0000000080)={0x0, 0xfffffffffffffffc}) mremap(&(0x7f000005d000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000b20000/0x4000)=nil) 2018/04/20 19:44:04 executing program 6: setrlimit(0x2, &(0x7f0000000080)) mremap(&(0x7f000005d000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000b20000/0x4000)=nil) 2018/04/20 19:44:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x20000000104, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x4, 0x7fffffff}], 0x1, &(0x7f0000000080)={0x77359400}) semop(r0, &(0x7f0000035000)=[{0x4, 0x81}], 0x1) 2018/04/20 19:44:04 executing program 3: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) dup2(r0, r1) readv(r1, &(0x7f0000459000)=[{&(0x7f0000fd5fc3)=""/61, 0x33c}], 0x2000000000000144) r2 = gettid() timer_create(0x0, &(0x7f0000c00000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x5031, 0xffffffffffffffff, 0x0) tkill(r2, 0x1020000000016) 2018/04/20 19:44:04 executing program 4: chroot(&(0x7f0000000040)='./file0\x00') chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') umount2(&(0x7f0000000000)='../file0\x00', 0x0) open$dir(&(0x7f00000003c0)='../file0\x00', 0x0, 0x0) 2018/04/20 19:44:04 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={"776c616e3000001d0684000021000899", &(0x7f0000000000)=@ethtool_sset_info={0x10}}) 2018/04/20 19:44:04 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={"776c616e3000001d0684000021000899", &(0x7f0000000000)=@ethtool_sset_info={0x37, 0x0, 0x942e}}) 2018/04/20 19:44:04 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 2018/04/20 19:44:04 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x200000000000009}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)}, 0x20) 2018/04/20 19:44:04 executing program 1: socketpair(0xfffffffffffffffd, 0x0, 0x0, &(0x7f00000001c0)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009f}, 0xfffffffffffffe3b) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x730000, 0x0, 0x0, &(0x7f0000000000)) 2018/04/20 19:44:05 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000516ff0)={0x2, 0x4e21, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f0000588fff), 0xfffffffffffffe98, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) r1 = socket(0x10, 0x3, 0x4) sendmsg$nl_xfrm(r1, &(0x7f00009d3000)={&(0x7f0000c15000)={0x10}, 0xc, &(0x7f00001e5ff0)={&(0x7f0000abdefc)=ANY=[@ANYBLOB="4c0000001200db4d0000000000000000000000000000f302a7f00000000000000000000000000000240008001d0008000000150069cc8910cf7a5164ef891111a0edabf37c1fd93a0d000000"], 0x1}, 0x1}, 0x0) 2018/04/20 19:44:05 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='\v'], 0x1) 2018/04/20 19:44:05 executing program 2: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f0000001480)={0x0, 0x11, &(0x7f0000000040)=[{&(0x7f0000000000), 0xffbf}], 0x1, &(0x7f0000000180)}, 0x0) 2018/04/20 19:44:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @multicast1=0xe0000001}, {0x0, @link_local={0x1, 0x80, 0xc2}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 2018/04/20 19:44:05 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x800, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) 2018/04/20 19:44:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYBLOB="ffff00000a00020000"], 0x2}, 0x1}, 0x0) 2018/04/20 19:44:05 executing program 5: 2018/04/20 19:44:05 executing program 2: 2018/04/20 19:44:05 executing program 0: 2018/04/20 19:44:05 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000516ff0)={0x2, 0x4e21, @rand_addr}, 0x10) sendto$inet(r0, &(0x7f0000588fff), 0xfffffffffffffe98, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) shutdown(r0, 0x1) r1 = socket(0x10, 0x3, 0x4) sendmsg$nl_xfrm(r1, &(0x7f00009d3000)={&(0x7f0000c15000)={0x10}, 0xc, &(0x7f00001e5ff0)={&(0x7f0000abdefc)=ANY=[@ANYBLOB="4c0000001200db4d0000000000000000000000000000f302a7f00000000000000000000000000000240008001d0008000000150069cc8910cf7a5164ef891111a0edabf37c1fd93a0d000000"], 0x1}, 0x1}, 0x0) 2018/04/20 19:44:05 executing program 3: r0 = epoll_create1(0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/04/20 19:44:05 executing program 7: 2018/04/20 19:44:05 executing program 4: 2018/04/20 19:44:05 executing program 1: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000775000)) seccomp(0x1, 0x1, &(0x7f0000028ff0)={0x1, &(0x7f00000b3000)=[{0x6}]}) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), &(0x7f0000000340), 0x0) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x27e, 0x0) 2018/04/20 19:44:05 executing program 5: r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000005c0)="19", 0x1, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r0, 0x0) 2018/04/20 19:44:05 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x3fd, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0xe5, &(0x7f0000000980), 0x1800, &(0x7f0000000a00)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000300)='./file1\x00', 0x2f37, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000640)) read(r0, &(0x7f0000000200)=""/81, 0x10000015b) 2018/04/20 19:44:06 executing program 0: 2018/04/20 19:44:06 executing program 4: 2018/04/20 19:44:06 executing program 7: 2018/04/20 19:44:06 executing program 5: 2018/04/20 19:44:06 executing program 3: 2018/04/20 19:44:06 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x3fd, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0xe5, &(0x7f0000000980), 0x1800, &(0x7f0000000a00)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000300)='./file1\x00', 0x2f37, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000640)) read(r0, &(0x7f0000000200)=""/81, 0x10000015b) 2018/04/20 19:44:06 executing program 1: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000775000)) seccomp(0x1, 0x1, &(0x7f0000028ff0)={0x1, &(0x7f00000b3000)=[{0x6}]}) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), &(0x7f0000000340), 0x0) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x27e, 0x0) 2018/04/20 19:44:06 executing program 6: 2018/04/20 19:44:06 executing program 5: 2018/04/20 19:44:07 executing program 6: 2018/04/20 19:44:07 executing program 4: 2018/04/20 19:44:07 executing program 0: 2018/04/20 19:44:07 executing program 7: 2018/04/20 19:44:07 executing program 3: 2018/04/20 19:44:07 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x3fd, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0xe5, &(0x7f0000000980), 0x1800, &(0x7f0000000a00)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000300)='./file1\x00', 0x2f37, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000640)) read(r0, &(0x7f0000000200)=""/81, 0x10000015b) 2018/04/20 19:44:07 executing program 5: r0 = perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(r0, &(0x7f0000000080), 0x0) 2018/04/20 19:44:07 executing program 6: r0 = perf_event_open(&(0x7f00006d1000)={0x2, 0x70, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="63707520000000000000000000009ada95e89520d67e9020db5177064251ba50dc97433e03acf574a1b2352b655951909e9063624cf282ee29c7c27f") 2018/04/20 19:44:07 executing program 4: 2018/04/20 19:44:07 executing program 3: capset(&(0x7f00002d0ff8)={0x20071026}, &(0x7f0000cc0000)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$void(r0, 0xc0045878) 2018/04/20 19:44:07 executing program 7: 2018/04/20 19:44:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x0, 0x22, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/20 19:44:07 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x3fd, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0xe5, &(0x7f0000000980), 0x1800, &(0x7f0000000a00)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000300)='./file1\x00', 0x2f37, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000640)) read(r0, &(0x7f0000000200)=""/81, 0x10000015b) 2018/04/20 19:44:07 executing program 0: 2018/04/20 19:44:07 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000440)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000000040)="eb52904e54465320202020000208", 0xe}], 0x0, &(0x7f00000000c0)) 2018/04/20 19:44:07 executing program 7: r0 = socket$netlink(0x2, 0x5, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x84, 0x7, &(0x7f0000001000), 0x20001004) [ 71.864722] capability: warning: `syz-executor3' uses deprecated v2 capabilities in a way that may be insecure 2018/04/20 19:44:07 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0xc00, &(0x7f0000ffa000/0x3000)=nil) 2018/04/20 19:44:08 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x84, 0x20, &(0x7f0000000000)={@mcast2={0xff, 0x2, [], 0x1}}, 0x20) 2018/04/20 19:44:08 executing program 5: r0 = timerfd_create(0x9, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000016fe0)={{0x5}, {0x0, 0x5f6c}}, &(0x7f000000ffe0)) timerfd_gettime(r0, &(0x7f00000000c0)) 2018/04/20 19:44:08 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x3fd, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0xe5, &(0x7f0000000980), 0x1800, &(0x7f0000000a00)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) read(r0, &(0x7f0000000200)=""/81, 0x10000015b) 2018/04/20 19:44:08 executing program 7: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffc, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab4240200040000040000000000000000000000000c090a020c", 0x7d}], 0x0, &(0x7f0000000140)=ANY=[]) 2018/04/20 19:44:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x23d) 2018/04/20 19:44:08 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) recvfrom(r0, &(0x7f0000000080)=""/165, 0xa5, 0x2, &(0x7f0000000000)=@ax25={0x3, {"216862ad070b30"}}, 0x20000000) 2018/04/20 19:44:08 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000640)=0x200000000) write$vnet(r0, &(0x7f0000000580)={0x1, {&(0x7f00000002c0)=""/219, 0xdb, &(0x7f00000000c0)=""/98, 0x0, 0x3}}, 0x68) 2018/04/20 19:44:08 executing program 1: r0 = socket(0x11, 0x4000000000080003, 0x0) sendmmsg(r0, &(0x7f0000003e80)=[{{&(0x7f0000000040)=@in6={0xa, 0x8864, 0x3, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) 2018/04/20 19:44:08 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000040)=0xc) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a63fff), 0x0, 0x20020004, &(0x7f0000385ff0)={0x2, 0x1, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x15) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f000074847c)=[{0x8}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000f8e000)={0x0, 0x20000000012c6, 0x1000010004}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f00007b1ffc), 0x4) sendto$inet(r0, &(0x7f0000000100)='.', 0x1, 0x0, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000100fa4)="80", 0x1, 0x0, &(0x7f00001acff0)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/20 19:44:08 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00003a6ff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000c0bffc)=0x2000000000007, 0x4) writev(r1, &(0x7f0000217fe0)=[{&(0x7f000032affd)="aa", 0x1}], 0x1) write(r1, &(0x7f0000bd4000)='$', 0x1) read(r0, &(0x7f0000587000)=""/114, 0x72) 2018/04/20 19:44:08 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x3fd, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0xe5, &(0x7f0000000980), 0x1800, &(0x7f0000000a00)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) read(r0, &(0x7f0000000200)=""/81, 0x10000015b) 2018/04/20 19:44:08 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x3fd, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0xe5, &(0x7f0000000980), 0x1800, &(0x7f0000000a00)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) read(r0, &(0x7f0000000200)=""/81, 0x10000015b) 2018/04/20 19:44:08 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000100)=[{}, {}, {}, {r0}], 0x317, 0x0) 2018/04/20 19:44:08 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000000) semget(0xffffffffffffffff, 0x800000000000000a, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x3, 0x1000}], 0x1) 2018/04/20 19:44:08 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) recvfrom(r0, &(0x7f0000000080)=""/165, 0xa5, 0x2, &(0x7f0000000000)=@ax25={0x3, {"216862ad070b30"}}, 0x20000000) 2018/04/20 19:44:09 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) recvfrom(r0, &(0x7f0000000080)=""/165, 0xa5, 0x2, &(0x7f0000000000)=@ax25={0x3, {"216862ad070b30"}}, 0x20000000) 2018/04/20 19:44:09 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000040)=0xc) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a63fff), 0x0, 0x20020004, &(0x7f0000385ff0)={0x2, 0x1, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x15) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f000074847c)=[{0x8}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000f8e000)={0x0, 0x20000000012c6, 0x1000010004}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f00007b1ffc), 0x4) sendto$inet(r0, &(0x7f0000000100)='.', 0x1, 0x0, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000100fa4)="80", 0x1, 0x0, &(0x7f00001acff0)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/20 19:44:09 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000001f8d)="390000001300090468fe0000810000f90600004003000000450001070000001419002100e3ff010007000012020000080000e10c00f41ee400", 0x39}], 0x1) 2018/04/20 19:44:09 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) 2018/04/20 19:44:09 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x3fd, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0xe5, &(0x7f0000000980), 0x1800, &(0x7f0000000a00)=ANY=[]) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000300)='./file1\x00', 0x2f37, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000640)) read(0xffffffffffffffff, &(0x7f0000000200)=""/81, 0x10000015b) [ 73.196486] netlink: 'syz-executor5': attribute type 33 has an invalid length. 2018/04/20 19:44:09 executing program 0: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) epoll_create1(0x0) socket$unix(0x1, 0x1, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000000040), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) [ 73.252901] netlink: 'syz-executor5': attribute type 33 has an invalid length. 2018/04/20 19:44:09 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) recvfrom(r0, &(0x7f0000000080)=""/165, 0xa5, 0x2, &(0x7f0000000000)=@ax25={0x3, {"216862ad070b30"}}, 0x20000000) 2018/04/20 19:44:09 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) read(r1, &(0x7f00000001c0)=""/35, 0x23) 2018/04/20 19:44:09 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f00005a6ff0)={&(0x7f0000451ccc)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in6}, {@in=@loopback=0x7f000001, 0x0, 0x6c}, @in6=@loopback={0x0, 0x1}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/04/20 19:44:09 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1) 2018/04/20 19:44:09 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000014000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001300ff10fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 2018/04/20 19:44:09 executing program 7: r0 = syz_open_dev$random(&(0x7f00000017c0)='/dev/random\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80, 0x0) 2018/04/20 19:44:09 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x3fd, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000300)='./file1\x00', 0x2f37, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000640)) read(r0, &(0x7f0000000200)=""/81, 0x10000015b) 2018/04/20 19:44:09 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f0000000b80)='./file0\x00', 0x2, 0x0) write(r1, &(0x7f0000000000), 0xfffffddd) read(r0, &(0x7f0000000c00)=""/194, 0xffffff58) 2018/04/20 19:44:09 executing program 6: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) 2018/04/20 19:44:09 executing program 4: socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000001ff8)={0x0}) getsockopt$inet_mreqsrc(r0, 0x10f, 0x87, &(0x7f0000000580)={@empty, @multicast1, @broadcast}, &(0x7f00000005c0)=0xc) 2018/04/20 19:44:09 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) recvfrom(r0, &(0x7f0000000080)=""/165, 0xa5, 0x2, &(0x7f0000000000)=@ax25={0x3, {"216862ad070b30"}}, 0x20000000) 2018/04/20 19:44:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0xe5, &(0x7f0000000980), 0x1800, &(0x7f0000000a00)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000300)='./file1\x00', 0x2f37, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000640)) read(r0, &(0x7f0000000200)=""/81, 0x10000015b) 2018/04/20 19:44:09 executing program 7: r0 = syz_open_dev$random(&(0x7f00000017c0)='/dev/random\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80, 0x0) 2018/04/20 19:44:09 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)) 2018/04/20 19:44:09 executing program 5: perf_event_open(&(0x7f000002ef88)={0x1, 0x78, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$minix(&(0x7f00000001c0)='minix\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0) 2018/04/20 19:44:09 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvfrom(r0, &(0x7f0000000080)=""/165, 0xa5, 0x2, &(0x7f0000000000)=@ax25={0x3, {"216862ad070b30"}}, 0x20000000) 2018/04/20 19:44:09 executing program 7: r0 = syz_open_dev$random(&(0x7f00000017c0)='/dev/random\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80, 0x0) [ 73.884975] 9pnet_virtio: no channels available for device ./file0 2018/04/20 19:44:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000002c0)={0x20, 0x27, 0x1ff307543bf68163, 0x0, 0x0, {0x14, 0x100000000000900}, [@nested={0xc, 0x7, [@typed={0x8, 0x2, @ipv4=@multicast2=0xe0000002}]}]}, 0x20}, 0x1}, 0x0) 2018/04/20 19:44:10 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@local={0xfe, 0x80, [], 0xaa}, @in=@loopback=0x7f000001, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x0, 0x2b}, 0x0, @in=@dev={0xac, 0x14, 0x14}}}, 0xe8) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x230, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x222, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/20 19:44:10 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x3, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 2018/04/20 19:44:10 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000140)) 2018/04/20 19:44:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000248ff6)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x40045431, &(0x7f0000000000)) 2018/04/20 19:44:10 executing program 7: r0 = syz_open_dev$random(&(0x7f00000017c0)='/dev/random\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000180)) accept4(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80, 0x0) 2018/04/20 19:44:10 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0xe5, &(0x7f0000000980), 0x1800, &(0x7f0000000a00)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000300)='./file1\x00', 0x2f37, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000640)) read(r0, &(0x7f0000000200)=""/81, 0x10000015b) 2018/04/20 19:44:10 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvfrom(r0, &(0x7f0000000080)=""/165, 0xa5, 0x2, &(0x7f0000000000)=@ax25={0x3, {"216862ad070b30"}}, 0x20000000) [ 74.809848] 9pnet_virtio: no channels available for device ./file0 2018/04/20 19:44:10 executing program 6: fchmodat(0xffffffffffffffff, &(0x7f0000001880)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400100401000200027400f8", 0x16}], 0x0, &(0x7f0000000280)=ANY=[]) 2018/04/20 19:44:10 executing program 4: r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write$evdev(r0, &(0x7f0000037fe8)=[{}], 0xfffffe01) sendfile(r0, r0, &(0x7f0000000200), 0x80003ffd) sendfile(r0, r0, 0x0, 0x10000001) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x4a4) creat(&(0x7f0000000100)='./file0\x00', 0x0) 2018/04/20 19:44:10 executing program 7: r0 = syz_open_dev$random(&(0x7f00000017c0)='/dev/random\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000180)) 2018/04/20 19:44:10 executing program 0: r0 = add_key(&(0x7f0000002000)='big_key\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, &(0x7f0000003000)="c4", 0x1, 0xfffffffffffffffc) keyctl$setperm(0x5, r0, 0x22002) keyctl$read(0xb, r0, &(0x7f00000046a9)=""/4096, 0x1000) 2018/04/20 19:44:10 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x3fd, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0xe5, &(0x7f0000000980), 0x0, &(0x7f0000000a00)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000300)='./file1\x00', 0x2f37, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000640)) read(r0, &(0x7f0000000200)=""/81, 0x10000015b) 2018/04/20 19:44:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') pread64(r0, &(0x7f0000000100)=""/8, 0x24, 0x40000001) 2018/04/20 19:44:11 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000013fe4)=@in6={0x2, 0x0, 0xfea9, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)="ba", 0x1}], 0x1, &(0x7f0000000040)}, 0x40) 2018/04/20 19:44:11 executing program 7: ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000180)) 2018/04/20 19:44:12 executing program 6: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000040)) 2018/04/20 19:44:12 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000180)='mime_typ\t\x00PL}+fm0', 0x8c4, 0x0, &(0x7f0000000240)) 2018/04/20 19:44:12 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x3fd, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0xe5, &(0x7f0000000980), 0x1800, &(0x7f0000000a00)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000300)='./file1\x00', 0x2f37, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000640)) read(r0, &(0x7f0000000200)=""/81, 0x10000015b) 2018/04/20 19:44:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000072cff8)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00', @ifru_names='ip6gre0\x00'}) 2018/04/20 19:44:12 executing program 7: r0 = syz_open_dev$random(&(0x7f00000017c0)='/dev/random\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000180)) 2018/04/20 19:44:12 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400100401000200027400f8", 0x16}], 0x0, &(0x7f0000000040)={[{@codepage={'codepage', 0x3d, '1251'}, 0x2c}, {@umask={'umask', 0x3d, [0x37]}, 0x2c}]}) 2018/04/20 19:44:12 executing program 4: r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write$evdev(r0, &(0x7f0000037fe8)=[{}], 0xfffffe01) sendfile(r0, r0, &(0x7f0000000200), 0x80003ffd) sendfile(r0, r0, 0x0, 0x10000001) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x4a4) creat(&(0x7f0000000100)='./file0\x00', 0x0) 2018/04/20 19:44:12 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvfrom(r0, &(0x7f0000000080)=""/165, 0xa5, 0x2, &(0x7f0000000000)=@ax25={0x3, {"216862ad070b30"}}, 0x20000000) 2018/04/20 19:44:12 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000004c0)=[{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="105799a9da337029ae89174ece019cce62c8b9228e9f01f395dc4bca95aed06299", 0x21}], 0x1}], 0x1, 0x0) 2018/04/20 19:44:12 executing program 1: r0 = add_key(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x213, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) 2018/04/20 19:44:12 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000248ff6)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5405, &(0x7f0000000000)) 2018/04/20 19:44:12 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='task\x00') getdents64(r0, &(0x7f00008e6fe0)=""/32, 0x25a) 2018/04/20 19:44:12 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/20 19:44:12 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x3fd, 0x0) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0xe5, &(0x7f0000000980), 0x1800, &(0x7f0000000a00)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000300)='./file1\x00', 0x2f37, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000640)) read(r0, &(0x7f0000000200)=""/81, 0x10000015b) 2018/04/20 19:44:12 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) fremovexattr(r0, &(0x7f0000012000)=@known='com.apple.FinderInfo\x00') [ 76.516988] ================================================================== [ 76.524419] BUG: KMSAN: uninit-value in __camellia_setkey+0x150b/0x1880 [ 76.531185] CPU: 0 PID: 6235 Comm: syz-executor7 Not tainted 4.16.0+ #84 [ 76.538027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.547394] Call Trace: [ 76.549993] dump_stack+0x185/0x1d0 [ 76.553628] ? __camellia_setkey+0x150b/0x1880 [ 76.558217] kmsan_report+0x142/0x240 [ 76.562030] __msan_warning_32+0x6c/0xb0 2018/04/20 19:44:12 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xb}, 0x7a) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) [ 76.566098] __camellia_setkey+0x150b/0x1880 [ 76.570516] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 76.575976] ? __save_stack_trace+0x893/0xa80 [ 76.580488] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 76.585946] camellia_setkey+0x9a/0xb0 [ 76.589840] ? camellia_setup_tail+0x3640/0x3640 [ 76.594599] setkey+0x50f/0x5a0 [ 76.597893] crypto_xcbc_digest_setkey+0x4b7/0x570 [ 76.602829] ? crypto_init_cipher_ops+0x2c0/0x2c0 [ 76.607676] ? camellia_setkey+0xb0/0xb0 [ 76.611739] ? camellia_setkey+0xb0/0xb0 [ 76.615803] ? camellia_setkey+0xb0/0xb0 [ 76.619870] ? crypto_init_cipher_ops+0x2c0/0x2c0 [ 76.624719] ? shash_async_setkey+0x2c8/0x4c0 [ 76.629309] ? crypto_xcbc_digest_final+0x530/0x530 [ 76.634329] shash_async_setkey+0x337/0x4c0 [ 76.638747] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 76.644124] ? trace_kmalloc+0xb6/0x2b0 [ 76.648130] ? shash_async_digest+0x1b0/0x1b0 [ 76.652634] crypto_ahash_setkey+0x31a/0x470 [ 76.657054] hash_setkey+0x8b/0xa0 [ 76.660601] alg_setsockopt+0x6c5/0x740 [ 76.664587] ? hash_release+0x50/0x50 [ 76.668409] ? alg_accept+0xd0/0xd0 [ 76.672044] SYSC_setsockopt+0x4b8/0x570 [ 76.676117] SyS_setsockopt+0x76/0xa0 [ 76.679919] do_syscall_64+0x309/0x430 [ 76.683816] ? SYSC_recv+0xe0/0xe0 [ 76.687365] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 76.692559] RIP: 0033:0x455379 [ 76.695747] RSP: 002b:00007f4287269c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 76.703456] RAX: ffffffffffffffda RBX: 00007f428726a6d4 RCX: 0000000000455379 [ 76.710725] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 76.717990] RBP: 000000000072bea0 R08: 0000000000000018 R09: 0000000000000000 [ 76.725247] R10: 0000000020001f3a R11: 0000000000000246 R12: 00000000ffffffff [ 76.732503] R13: 0000000000000519 R14: 00000000006faaf8 R15: 0000000000000000 [ 76.739848] [ 76.741476] Local variable description: ----vla@crypto_xcbc_digest_setkey [ 76.748391] Variable was created at: [ 76.752095] crypto_xcbc_digest_setkey+0x12e/0x570 [ 76.757012] shash_async_setkey+0x337/0x4c0 [ 76.761317] ================================================================== [ 76.768656] Disabling lock debugging due to kernel taint [ 76.774097] Kernel panic - not syncing: panic_on_warn set ... [ 76.774097] [ 76.781445] CPU: 0 PID: 6235 Comm: syz-executor7 Tainted: G B 4.16.0+ #84 [ 76.789565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.798984] Call Trace: [ 76.801573] dump_stack+0x185/0x1d0 [ 76.805360] panic+0x39d/0x940 [ 76.808571] ? __camellia_setkey+0x150b/0x1880 [ 76.813137] kmsan_report+0x238/0x240 [ 76.816926] __msan_warning_32+0x6c/0xb0 [ 76.820975] __camellia_setkey+0x150b/0x1880 [ 76.825373] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 76.830820] ? __save_stack_trace+0x893/0xa80 [ 76.835309] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 76.840744] camellia_setkey+0x9a/0xb0 [ 76.844617] ? camellia_setup_tail+0x3640/0x3640 [ 76.849365] setkey+0x50f/0x5a0 [ 76.852645] crypto_xcbc_digest_setkey+0x4b7/0x570 [ 76.857560] ? crypto_init_cipher_ops+0x2c0/0x2c0 [ 76.862394] ? camellia_setkey+0xb0/0xb0 [ 76.866442] ? camellia_setkey+0xb0/0xb0 [ 76.870487] ? camellia_setkey+0xb0/0xb0 [ 76.874542] ? crypto_init_cipher_ops+0x2c0/0x2c0 [ 76.879369] ? shash_async_setkey+0x2c8/0x4c0 [ 76.883856] ? crypto_xcbc_digest_final+0x530/0x530 [ 76.888869] shash_async_setkey+0x337/0x4c0 [ 76.893176] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 76.898527] ? trace_kmalloc+0xb6/0x2b0 [ 76.902494] ? shash_async_digest+0x1b0/0x1b0 [ 76.906977] crypto_ahash_setkey+0x31a/0x470 [ 76.911384] hash_setkey+0x8b/0xa0 [ 76.914910] alg_setsockopt+0x6c5/0x740 [ 76.918870] ? hash_release+0x50/0x50 [ 76.922655] ? alg_accept+0xd0/0xd0 [ 76.926265] SYSC_setsockopt+0x4b8/0x570 [ 76.930314] SyS_setsockopt+0x76/0xa0 [ 76.934105] do_syscall_64+0x309/0x430 [ 76.937977] ? SYSC_recv+0xe0/0xe0 [ 76.941509] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 76.946683] RIP: 0033:0x455379 [ 76.949859] RSP: 002b:00007f4287269c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 76.957561] RAX: ffffffffffffffda RBX: 00007f428726a6d4 RCX: 0000000000455379 [ 76.964816] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 76.972073] RBP: 000000000072bea0 R08: 0000000000000018 R09: 0000000000000000 [ 76.979327] R10: 0000000020001f3a R11: 0000000000000246 R12: 00000000ffffffff [ 76.986580] R13: 0000000000000519 R14: 00000000006faaf8 R15: 0000000000000000 [ 76.994308] Dumping ftrace buffer: [ 76.997827] (ftrace buffer empty) [ 77.001522] Kernel Offset: disabled [ 77.005128] Rebooting in 86400 seconds..