INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.8' (ECDSA) to the list of known hosts. 2018/04/13 22:47:09 fuzzer started 2018/04/13 22:47:10 dialing manager at 10.128.0.26:36243 2018/04/13 22:47:16 kcov=true, comps=false 2018/04/13 22:47:19 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x1c, 0x3, 0x206, 0x1, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@generic="06"]}]}, 0x1c}, 0x1}, 0x0) 2018/04/13 22:47:19 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"6178367496faffffffffffffff000080", 0x1302}) close(r0) 2018/04/13 22:47:19 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000140)={0x0, 0x7, 0x0, 0x0, 0x0, 0x6}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x1) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000000040)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000000)="9b", 0x1) 2018/04/13 22:47:19 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000134000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 2018/04/13 22:47:19 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00005d6000)='/dev/sequencer\x00', 0x0, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f00000b5ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) dup3(r0, r1, 0x0) 2018/04/13 22:47:19 executing program 4: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x7003) read$eventfd(r0, &(0x7f0000000180), 0x8) 2018/04/13 22:47:19 executing program 6: setrlimit(0x7, &(0x7f0000000140)) timerfd_create(0x0, 0x0) 2018/04/13 22:47:19 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00000b5ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) syzkaller login: [ 44.455136] ip (3755) used greatest stack depth: 54688 bytes left [ 44.726845] ip (3778) used greatest stack depth: 54672 bytes left [ 45.762505] ip (3884) used greatest stack depth: 54560 bytes left [ 45.854488] ip (3894) used greatest stack depth: 54200 bytes left [ 46.269142] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.275636] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.309105] device bridge_slave_0 entered promiscuous mode [ 46.358006] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.364574] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.404900] device bridge_slave_0 entered promiscuous mode [ 46.439285] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.445779] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.481065] device bridge_slave_0 entered promiscuous mode [ 46.525485] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.531980] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.556997] device bridge_slave_1 entered promiscuous mode [ 46.568480] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.574939] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.590901] device bridge_slave_0 entered promiscuous mode [ 46.616920] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.623391] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.650138] device bridge_slave_1 entered promiscuous mode [ 46.657657] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.664106] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.685013] device bridge_slave_0 entered promiscuous mode [ 46.710909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.730296] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.736767] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.772266] device bridge_slave_1 entered promiscuous mode [ 46.785191] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.791685] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.810308] device bridge_slave_0 entered promiscuous mode [ 46.826075] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.832538] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.858190] device bridge_slave_1 entered promiscuous mode [ 46.874694] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.881132] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.902346] device bridge_slave_0 entered promiscuous mode [ 46.913749] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.923863] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.931261] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.937698] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.965882] device bridge_slave_0 entered promiscuous mode [ 46.987890] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.994370] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.013115] device bridge_slave_1 entered promiscuous mode [ 47.022053] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.029397] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.035854] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.059217] device bridge_slave_1 entered promiscuous mode [ 47.068913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.076290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.085259] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.091716] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.148469] device bridge_slave_1 entered promiscuous mode [ 47.182922] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.189402] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.204262] device bridge_slave_1 entered promiscuous mode [ 47.218851] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.228495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.301191] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.308787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.383538] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.407514] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.454735] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.523549] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.597515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.636595] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.767962] ip (4025) used greatest stack depth: 53960 bytes left [ 47.956471] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.063459] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.158423] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.185981] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.241645] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.290748] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.423942] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.431620] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.527451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.548647] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.583589] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.657990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.666077] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.785595] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.793940] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.884994] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.157017] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.208793] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.341003] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.396598] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.458364] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.521719] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.547767] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.595405] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.602641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.616417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.672994] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.680479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.695764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.740493] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.747856] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.755064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.768420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.810679] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.819290] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.828334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.853510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.890339] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.900777] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.918640] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.925739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.946401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.975622] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.983231] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.991122] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.998110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.006725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.047807] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.087316] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.094543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.107258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.157281] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.196176] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.205130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.222854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.244977] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.302601] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.309797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.323754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.367646] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.374816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.386757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.427186] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.441705] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.456474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.482317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.499229] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.523779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.542098] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.549224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.558174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.584443] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.597804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.612645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.635571] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.645605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.657516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.837378] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.844825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.857217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.299373] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.305872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.312744] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.319188] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.370898] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.377407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.399884] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.406331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.413172] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.419611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.464940] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.492069] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.498538] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.505366] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.511814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.574137] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.784758] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.791240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.798124] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.804566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.825228] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.838742] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.845201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.852077] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.858512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.895892] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.913961] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.920405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.927279] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.933718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.983733] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.178096] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.184584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.191441] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.197892] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.205995] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.340318] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.346807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.353625] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.360096] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.405869] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.412629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.420885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.429166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.437938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.446116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.455095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.462912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.545015] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.952946] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.018398] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.039108] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.275754] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.281988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.292593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.346680] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.353963] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.554234] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.583167] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.751102] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.757430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.765930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.820963] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.827204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.836936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.865122] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.874570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.903428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.125922] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.133254] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.139566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.152707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.184184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.206505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.440942] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.447263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.457518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.485478] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.506345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.532410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/13 22:47:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00', 0x103}) 2018/04/13 22:47:46 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0x2, 0x1}, 0x20) 2018/04/13 22:47:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000807fe4)={0xa}, 0x1c) connect$inet6(r0, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x100000001}, 0x1c) sendto$inet6(r0, &(0x7f0000000200), 0x46, 0x200408d4, &(0x7f000072e000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 22:47:46 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001080)=@broute={'broute\x00', 0x20, 0x2, 0x150, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, &(0x7f0000000bc0), &(0x7f0000000c00)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bcsh0\x00', 'syz_tun\x00', 'rose0\x00', 'ip6tnl0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="de501b28aebc", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x401, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1c8) 2018/04/13 22:47:46 executing program 7: r0 = socket$inet6(0xa, 0x80803, 0x87) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev={0xac, 0x14, 0x14}, 0x2, 0x2b}, 0x0, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/13 22:47:46 executing program 4: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x7003) read$eventfd(r0, &(0x7f0000000180), 0x8) 2018/04/13 22:47:46 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000316000)={&(0x7f00004aeb5c)=@generic={0x10000000001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af50d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000000)}, 0x0) 2018/04/13 22:47:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) [ 69.068833] device lo entered promiscuous mode [ 69.105969] device lo left promiscuous mode 2018/04/13 22:47:46 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000134000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) [ 69.128113] device lo entered promiscuous mode 2018/04/13 22:47:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000807fe4)={0xa}, 0x1c) connect$inet6(r0, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x100000001}, 0x1c) sendto$inet6(r0, &(0x7f0000000200), 0x46, 0x200408d4, &(0x7f000072e000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 22:47:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) readv(r0, &(0x7f0000000980)=[{&(0x7f00000008c0)=""/147, 0x93}], 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040), 0x4) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000280)) dup(0xffffffffffffffff) 2018/04/13 22:47:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20101, 0x12) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000200)={0x0, 0xfffffffffffffc01}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={r1, 0x8876}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6(0xa, 0x3, 0x4000000000001) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0xdcd, @remote={0xfe, 0x80, [], 0xbb}, 0x200000007}, 0x1c) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='htcp\x00', 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x4}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x7, 0x2}, 0x10}, 0x1}, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000300)=0x880, 0x4) sendmsg(r4, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0x4, &(0x7f0000000040), 0x4) close(r2) 2018/04/13 22:47:46 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) connect$inet6(r0, &(0x7f00001cd000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/04/13 22:47:46 executing program 1: r0 = gettid() r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f0000000300)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000e60000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x15) 2018/04/13 22:47:46 executing program 0: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x1100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001740)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab4240200040000040000000000000000000000000c090a020c", 0x7d}], 0x0, &(0x7f0000001700)={'nouuid,'}) [ 69.314672] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 22:47:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000c3000)="6d6f756e74696e666f00a4") sendfile(r0, r0, &(0x7f0000000000)=0x800000, 0x408) 2018/04/13 22:47:47 executing program 2: syz_emit_ethernet(0xa6, &(0x7f00000000c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "0d009e", 0x70, 0x2f, 0x0, @dev={0xfe, 0x80}, @ipv4={[], [0xff, 0xff]}, {[@srh={0x0, 0xa, 0x4, 0x5, 0x0, 0x0, 0x0, [@remote={0xfe, 0x80, [], 0xbb}, @mcast1={0xff, 0x1, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}]}], @icmpv6=@mld}}}}}, &(0x7f0000000000)) 2018/04/13 22:47:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000400000100000012c229cbebff5db75ecd1f139d6e2fa010000000000000"], &(0x7f0000000080)=0x1) 2018/04/13 22:47:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000c3000)="6d6f756e74696e666f00a4") sendfile(r0, r0, &(0x7f0000000000)=0x800000, 0x408) 2018/04/13 22:47:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) connect$inet6(r0, &(0x7f00001cd000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/04/13 22:47:47 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000134000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f00009322c4)={0x2, 0x0, @broadcast=0xffffffff}, 0x6) 2018/04/13 22:47:47 executing program 4: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x7003) read$eventfd(r0, &(0x7f0000000180), 0x8) 2018/04/13 22:47:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20101, 0x12) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000200)={0x0, 0xfffffffffffffc01}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={r1, 0x8876}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6(0xa, 0x3, 0x4000000000001) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0xdcd, @remote={0xfe, 0x80, [], 0xbb}, 0x200000007}, 0x1c) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='htcp\x00', 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x4}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x7, 0x2}, 0x10}, 0x1}, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000300)=0x880, 0x4) sendmsg(r4, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0x4, &(0x7f0000000040), 0x4) close(r2) 2018/04/13 22:47:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20101, 0x12) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000200)={0x0, 0xfffffffffffffc01}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={r1, 0x8876}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6(0xa, 0x3, 0x4000000000001) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0xdcd, @remote={0xfe, 0x80, [], 0xbb}, 0x200000007}, 0x1c) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='htcp\x00', 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x4}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x7, 0x2}, 0x10}, 0x1}, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000300)=0x880, 0x4) sendmsg(r4, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0x4, &(0x7f0000000040), 0x4) close(r2) [ 70.206816] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 22:47:47 executing program 3: 2018/04/13 22:47:47 executing program 5: 2018/04/13 22:47:47 executing program 2: 2018/04/13 22:47:47 executing program 6: 2018/04/13 22:47:47 executing program 0: 2018/04/13 22:47:47 executing program 3: 2018/04/13 22:47:47 executing program 0: 2018/04/13 22:47:47 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20101, 0x12) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000200)={0x0, 0xfffffffffffffc01}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={r1, 0x8876}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6(0xa, 0x3, 0x4000000000001) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0xdcd, @remote={0xfe, 0x80, [], 0xbb}, 0x200000007}, 0x1c) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='htcp\x00', 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x4}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x7, 0x2}, 0x10}, 0x1}, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000300)=0x880, 0x4) sendmsg(r4, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0x4, &(0x7f0000000040), 0x4) close(r2) 2018/04/13 22:47:47 executing program 1: 2018/04/13 22:47:47 executing program 6: 2018/04/13 22:47:47 executing program 4: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x7003) read$eventfd(r0, &(0x7f0000000180), 0x8) 2018/04/13 22:47:47 executing program 5: 2018/04/13 22:47:47 executing program 2: 2018/04/13 22:47:47 executing program 5: 2018/04/13 22:47:47 executing program 6: 2018/04/13 22:47:47 executing program 3: 2018/04/13 22:47:47 executing program 0: 2018/04/13 22:47:47 executing program 1: 2018/04/13 22:47:47 executing program 2: 2018/04/13 22:47:48 executing program 1: 2018/04/13 22:47:48 executing program 2: 2018/04/13 22:47:48 executing program 3: 2018/04/13 22:47:48 executing program 0: 2018/04/13 22:47:48 executing program 4: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) 2018/04/13 22:47:48 executing program 6: 2018/04/13 22:47:48 executing program 5: 2018/04/13 22:47:48 executing program 1: 2018/04/13 22:47:48 executing program 2: 2018/04/13 22:47:48 executing program 3: 2018/04/13 22:47:48 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20101, 0x12) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000200)={0x0, 0xfffffffffffffc01}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={r1, 0x8876}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6(0xa, 0x3, 0x4000000000001) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0xdcd, @remote={0xfe, 0x80, [], 0xbb}, 0x200000007}, 0x1c) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='htcp\x00', 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x4}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x7, 0x2}, 0x10}, 0x1}, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000300)=0x880, 0x4) sendmsg(r4, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0x4, &(0x7f0000000040), 0x4) close(r2) 2018/04/13 22:47:48 executing program 3: 2018/04/13 22:47:48 executing program 5: 2018/04/13 22:47:48 executing program 1: 2018/04/13 22:47:48 executing program 0: 2018/04/13 22:47:48 executing program 6: 2018/04/13 22:47:48 executing program 2: 2018/04/13 22:47:49 executing program 3: 2018/04/13 22:47:49 executing program 1: 2018/04/13 22:47:49 executing program 5: 2018/04/13 22:47:49 executing program 6: 2018/04/13 22:47:49 executing program 0: 2018/04/13 22:47:49 executing program 2: 2018/04/13 22:47:49 executing program 3: 2018/04/13 22:47:49 executing program 4: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) 2018/04/13 22:47:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20101, 0x12) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000200)={0x0, 0xfffffffffffffc01}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={r1, 0x8876}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6(0xa, 0x3, 0x4000000000001) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0xdcd, @remote={0xfe, 0x80, [], 0xbb}, 0x200000007}, 0x1c) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='htcp\x00', 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x4}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x7, 0x2}, 0x10}, 0x1}, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000300)=0x880, 0x4) sendmsg(r4, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0x4, &(0x7f0000000040), 0x4) 2018/04/13 22:47:49 executing program 6: 2018/04/13 22:47:49 executing program 2: r0 = socket$inet(0x2b, 0x400000000000001, 0x0) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, &(0x7f0000000340), &(0x7f0000000380), 0x8) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8912, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2=0xe0000002}}) 2018/04/13 22:47:49 executing program 1: syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@link_local={0x1, 0x80, 0xc2}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "895663", 0x14, 0x62, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x13}}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000300)) 2018/04/13 22:47:49 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000140)) epoll_create1(0x0) 2018/04/13 22:47:49 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) accept4$unix(0xffffffffffffff9c, &(0x7f0000000100), &(0x7f0000000180)=0x6e, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000000)='syzkaller1\x00'}) getpid() fcntl$setstatus(r0, 0x4, 0x0) pread64(0xffffffffffffffff, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000500)) syncfs(r0) 2018/04/13 22:47:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000013c0)) 2018/04/13 22:47:49 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) io_setup(0x7f, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000640)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000100)="06", 0x1}]) 2018/04/13 22:47:49 executing program 0: 2018/04/13 22:47:50 executing program 1: 2018/04/13 22:47:50 executing program 4: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000000180), 0x8) 2018/04/13 22:47:50 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) accept4$unix(0xffffffffffffff9c, &(0x7f0000000100), &(0x7f0000000180)=0x6e, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000000)='syzkaller1\x00'}) getpid() fcntl$setstatus(r0, 0x4, 0x0) pread64(0xffffffffffffffff, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000500)) syncfs(r0) 2018/04/13 22:47:50 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) poll(&(0x7f0000000240)=[{r0}, {r1}], 0x2, 0x0) 2018/04/13 22:47:50 executing program 2: syz_emit_ethernet(0xff40, &(0x7f00000000c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "0d009e", 0x0, 0x2f, 0x0, @dev={0xfe, 0x80}, @ipv4={[], [0xff, 0xff]}, {[@hopopts={0x0, 0x0, [], [@hao={0xc9, 0x0, @mcast2={0xff, 0x2, [], 0x1}}]}, @srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, [@remote={0xfe, 0x80, [], 0xbb}, @mcast1={0xff, 0x1, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}]}], @icmpv6=@mld}}}}}, &(0x7f0000000000)) 2018/04/13 22:47:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20101, 0x12) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000200)={0x0, 0xfffffffffffffc01}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={r1, 0x8876}, 0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000180)="d61a072afa6a2e6e9105a65cf0b08be4d57565e1a85eff283ee23d954743a2e3"}) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$inet6(0xa, 0x3, 0x4000000000001) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0xdcd, @remote={0xfe, 0x80, [], 0xbb}, 0x200000007}, 0x1c) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='htcp\x00', 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000c9af18)={{{@in=@rand_addr, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x4}, 0x0, 0x0, 0x1}, {{@in=@multicast2=0xe0000002, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x7, 0x2}, 0x10}, 0x1}, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000300)=0x880, 0x4) sendmsg(r4, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002400)}, 0x0) 2018/04/13 22:47:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000003000ff0a00000200e0ff0000030000000c0000090800010008db26195614f47fb6ec59620740f986b3d70e0fe7a265bac4076fd87b546578570fea6b605215089d728acc2308aff66cd55a4847517f5f1b6791f79d7045105906cae07f30ee259d59e1a93b3e78dd462942f2399b8a3ca255b56cf24be10a668b03025834cdf1f2bb6847f3485b6cacf8d1853f05bfaf061a0c71f550c47e135c3652ff039b050079d96a1c"], 0x1}, 0x1}, 0x0) 2018/04/13 22:47:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x4}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000400)={r1, 0x6}, 0x8) r2 = getpgrp(0x0) r3 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r2, r3, 0x7, &(0x7f000058a000)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x8, &(0x7f0000000080)={0x7}) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={0x7fffffff}, 0x8, 0x0) readv(r4, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/133, 0x85}], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x1ff) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000040)) 2018/04/13 22:47:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) readv(r0, &(0x7f00000003c0), 0x2000000000000098) 2018/04/13 22:47:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) unlink(&(0x7f0000000180)='./file0\x00') sysfs$1(0x1, &(0x7f0000000080)='-.ppp1[lowlan1\x00') 2018/04/13 22:47:50 executing program 2: syz_emit_ethernet(0xff40, &(0x7f00000000c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "0d009e", 0x0, 0x2f, 0x0, @dev={0xfe, 0x80}, @ipv4={[], [0xff, 0xff]}, {[@hopopts={0x0, 0x0, [], [@hao={0xc9, 0x0, @mcast2={0xff, 0x2, [], 0x1}}]}, @srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, [@remote={0xfe, 0x80, [], 0xbb}, @mcast1={0xff, 0x1, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}]}], @icmpv6=@mld}}}}}, &(0x7f0000000000)) 2018/04/13 22:47:50 executing program 6: r0 = syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0x0, 0x0) ioctl(r0, 0x4400000000001274, &(0x7f0000000040)) 2018/04/13 22:47:50 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) accept4$unix(0xffffffffffffff9c, &(0x7f0000000100), &(0x7f0000000180)=0x6e, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000000)='syzkaller1\x00'}) getpid() fcntl$setstatus(r0, 0x4, 0x0) pread64(0xffffffffffffffff, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000500)) syncfs(r0) 2018/04/13 22:47:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) readv(r0, &(0x7f00000003c0), 0x2000000000000098) 2018/04/13 22:47:50 executing program 2: syz_emit_ethernet(0xff40, &(0x7f00000000c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "0d009e", 0x0, 0x2f, 0x0, @dev={0xfe, 0x80}, @ipv4={[], [0xff, 0xff]}, {[@hopopts={0x0, 0x0, [], [@hao={0xc9, 0x0, @mcast2={0xff, 0x2, [], 0x1}}]}, @srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, [@remote={0xfe, 0x80, [], 0xbb}, @mcast1={0xff, 0x1, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}]}], @icmpv6=@mld}}}}}, &(0x7f0000000000)) 2018/04/13 22:47:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000f3eff0)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 2018/04/13 22:47:50 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040005}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000440), 0x4) [ 73.994743] ================================================================== [ 74.002163] BUG: KMSAN: uninit-value in vmac_setkey+0x337/0x940 [ 74.008220] CPU: 0 PID: 6112 Comm: syz-executor1 Not tainted 4.16.0+ #83 [ 74.015052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.024398] Call Trace: [ 74.026990] dump_stack+0x185/0x1d0 [ 74.030623] ? vmac_setkey+0x337/0x940 [ 74.034511] kmsan_report+0x142/0x240 [ 74.038315] ? aes_set_key+0x260/0x260 [ 74.042206] __msan_warning_32+0x6c/0xb0 [ 74.046268] ? aes_set_key+0x260/0x260 [ 74.050147] vmac_setkey+0x337/0x940 [ 74.053842] ? vmac_final+0x3f80/0x3f80 [ 74.057793] shash_async_setkey+0x337/0x4c0 [ 74.062102] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 74.067453] ? trace_kmalloc+0xb6/0x2b0 [ 74.071406] ? shash_async_digest+0x1b0/0x1b0 [ 74.075878] crypto_ahash_setkey+0x31a/0x470 [ 74.080269] hash_setkey+0x8b/0xa0 [ 74.083786] alg_setsockopt+0x6c5/0x740 [ 74.087738] ? hash_release+0x50/0x50 [ 74.091525] ? alg_accept+0xd0/0xd0 [ 74.095137] SYSC_setsockopt+0x4b8/0x570 [ 74.099184] SyS_setsockopt+0x76/0xa0 [ 74.102964] do_syscall_64+0x309/0x430 [ 74.106830] ? SYSC_recv+0xe0/0xe0 [ 74.110356] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 74.115523] RIP: 0033:0x455319 [ 74.118689] RSP: 002b:00007f70084a2c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 74.126373] RAX: ffffffffffffffda RBX: 00007f70084a36d4 RCX: 0000000000455319 [ 74.133627] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 74.140885] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 74.148134] R10: 0000000020f3eff0 R11: 0000000000000246 R12: 00000000ffffffff [ 74.155386] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 74.162643] [ 74.164253] Local variable description: ----out.i@vmac_setkey [ 74.170110] Variable was created at: [ 74.173811] vmac_setkey+0x93/0x940 [ 74.177414] shash_async_setkey+0x337/0x4c0 [ 74.181711] ================================================================== [ 74.189050] Disabling lock debugging due to kernel taint [ 74.194483] Kernel panic - not syncing: panic_on_warn set ... [ 74.194483] [ 74.201828] CPU: 0 PID: 6112 Comm: syz-executor1 Tainted: G B 4.16.0+ #83 [ 74.209940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.219272] Call Trace: [ 74.221853] dump_stack+0x185/0x1d0 [ 74.225460] panic+0x39d/0x940 [ 74.228644] ? vmac_setkey+0x337/0x940 [ 74.232511] kmsan_report+0x238/0x240 [ 74.236310] ? aes_set_key+0x260/0x260 [ 74.240184] __msan_warning_32+0x6c/0xb0 [ 74.244234] ? aes_set_key+0x260/0x260 [ 74.248108] vmac_setkey+0x337/0x940 [ 74.251802] ? vmac_final+0x3f80/0x3f80 [ 74.255753] shash_async_setkey+0x337/0x4c0 [ 74.260066] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 74.265420] ? trace_kmalloc+0xb6/0x2b0 [ 74.269374] ? shash_async_digest+0x1b0/0x1b0 [ 74.273850] crypto_ahash_setkey+0x31a/0x470 [ 74.278262] hash_setkey+0x8b/0xa0 [ 74.281789] alg_setsockopt+0x6c5/0x740 [ 74.285751] ? hash_release+0x50/0x50 [ 74.289548] ? alg_accept+0xd0/0xd0 [ 74.293166] SYSC_setsockopt+0x4b8/0x570 [ 74.297218] SyS_setsockopt+0x76/0xa0 [ 74.301012] do_syscall_64+0x309/0x430 [ 74.304903] ? SYSC_recv+0xe0/0xe0 [ 74.308446] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 74.313624] RIP: 0033:0x455319 [ 74.316801] RSP: 002b:00007f70084a2c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 74.324503] RAX: ffffffffffffffda RBX: 00007f70084a36d4 RCX: 0000000000455319 [ 74.331764] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 74.339028] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 74.346299] R10: 0000000020f3eff0 R11: 0000000000000246 R12: 00000000ffffffff [ 74.353563] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 74.361314] Dumping ftrace buffer: [ 74.364829] (ftrace buffer empty) [ 74.368513] Kernel Offset: disabled [ 74.372115] Rebooting in 86400 seconds..