INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.7' (ECDSA) to the list of known hosts. 2018/04/12 19:10:18 fuzzer started 2018/04/12 19:10:18 dialing manager at 10.128.0.26:44405 2018/04/12 19:10:24 kcov=true, comps=false 2018/04/12 19:10:27 executing program 0: clone(0x0, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f00000001c0), &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.current\x00', 0x0, 0x0) capset(&(0x7f0000000040), &(0x7f0000000080)={0x800000}) ioprio_set$pid(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 2018/04/12 19:10:27 executing program 2: mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000000040)='binfmt_misc\x00', 0x0, &(0x7f00000000c0)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000000c0)=""/250, 0x5f) 2018/04/12 19:10:27 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f61fe4)={0xa}, 0x1c) dup3(r0, r1, 0x0) 2018/04/12 19:10:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) 2018/04/12 19:10:27 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x6, 0x520, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000700], 0x0, &(0x7f0000000140), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'vcan0\x00', 'syzkaller1\x00', 'bpq0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x70, 0xa8, 0xe0}, [@common=@dnat={'dnat\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@random="d9022ccc9df3"}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0xf, 0x0, 0x0, 'teql0\x00', 'syz_tun\x00', 'ip6_vti0\x00', 'ip6_vti0\x00', @random="60e52256ff84", [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x70, 0x1a0, 0x1d0}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:systemd_logger_exec_t:s0\x00'}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffc, 0x2, [{{{0x3, 0x0, 0x0, 'bpq0\x00', 'syzkaller0\x00', 'tunl0\x00', 'ipddp0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xe8, 0xe8, 0x138, [@ip6={'ip6\x00', 0x50, {{@dev={0xfe, 0x80}, @loopback={0x0, 0x1}}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}, {{{0x13, 0x0, 0x0, 'bcsh0\x00', 'syz_tun\x00', 'eql\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @random="c70b90cc9a28", [], 0x70, 0x70, 0xa8}}, @common=@dnat={'dnat\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}}]}]}, 0x598) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6}, 0x10) 2018/04/12 19:10:27 executing program 4: perf_event_open(&(0x7f0000940000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a3c000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_robust_list(0x0, &(0x7f00000015c0)=&(0x7f0000000540)={&(0x7f0000000500)={&(0x7f00000004c0)}}, &(0x7f0000001600)=0x18) 2018/04/12 19:10:27 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xffffff8a, 0x0, 0x0, 0xffffffffffffff4e) shutdown(r0, 0x1) 2018/04/12 19:10:27 executing program 5: syz_emit_ethernet(0x79, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipx={0x8137, {0xffff, 0x6b, 0x0, 0x0, {@random, @random="41aeb1c0a7d1"}, {@current, @current}, "e82298a235ff078671fc80894baf8c1f757264b1717f4529596be8bc85de82daad0b43a7bd9c4114a394e8b09d59a90a799853350f9c0c4f15c4b959c27478837c987d712dcff5e59c9b4d98c3"}}}}, 0x0) syzkaller login: [ 40.558427] ip (3752) used greatest stack depth: 54656 bytes left [ 41.711299] ip (3866) used greatest stack depth: 54560 bytes left [ 41.989284] ip (3892) used greatest stack depth: 54200 bytes left [ 43.164659] ip (3996) used greatest stack depth: 53976 bytes left [ 43.877641] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.037967] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.106153] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.189562] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.215769] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.223932] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.332258] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 44.342155] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.702409] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 52.830144] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 52.978425] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.036634] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.138911] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.162782] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.254919] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.281972] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 53.528912] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 53.535170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.546665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.680564] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 53.686805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.703885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.761426] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 53.767694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.780481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.808918] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 53.817238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.831784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.026261] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.032502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.040351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.058123] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.066122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.083377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.110894] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.124756] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 54.131810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.175734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.205083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.232720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/12 19:10:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)) 2018/04/12 19:10:44 executing program 4: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) [ 55.573638] device bridge0 entered promiscuous mode [ 55.741092] device bridge0 left promiscuous mode 2018/04/12 19:10:45 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='loginuid\x00') write$tun(r0, &(0x7f0000000200)=ANY=[], 0x0) 2018/04/12 19:10:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, @loopback}, &(0x7f0000000340)=0x10, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000100), 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value, &(0x7f0000000240)=0x8) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000280), 0x4) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000000)) 2018/04/12 19:10:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x6, 0x520, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000700], 0x0, &(0x7f0000000140), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'vcan0\x00', 'syzkaller1\x00', 'bpq0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x70, 0xa8, 0xe0}, [@common=@dnat={'dnat\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@random="d9022ccc9df3"}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0xf, 0x0, 0x0, 'teql0\x00', 'syz_tun\x00', 'ip6_vti0\x00', 'ip6_vti0\x00', @random="60e52256ff84", [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x70, 0x1a0, 0x1d0}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:systemd_logger_exec_t:s0\x00'}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffc, 0x2, [{{{0x3, 0x0, 0x0, 'bpq0\x00', 'syzkaller0\x00', 'tunl0\x00', 'ipddp0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xe8, 0xe8, 0x138, [@ip6={'ip6\x00', 0x50, {{@dev={0xfe, 0x80}, @loopback={0x0, 0x1}}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}, {{{0x13, 0x0, 0x0, 'bcsh0\x00', 'syz_tun\x00', 'eql\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @random="c70b90cc9a28", [], 0x70, 0x70, 0xa8}}, @common=@dnat={'dnat\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}}]}]}, 0x598) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6}, 0x10) 2018/04/12 19:10:45 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xffffff8a, 0x0, 0x0, 0xffffffffffffff4e) shutdown(r0, 0x1) 2018/04/12 19:10:45 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8943, &(0x7f0000000000)={'team_slave\x00', &(0x7f00000001c0)=@ethtool_regs={0xe}}) 2018/04/12 19:10:45 executing program 7: mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000000040)='binfmt_misc\x00', 0x0, &(0x7f00000000c0)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f00000000c0)=""/250, 0x5f) 2018/04/12 19:10:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000002600)="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", 0x2e9, 0x0, &(0x7f0000000200)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) recvmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f00000000c0)=@in={0x0, 0x0, @remote}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/232, 0xe8}], 0x1, &(0x7f0000000500)=""/131, 0x83}}, {{&(0x7f00000005c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000009c0)}}], 0x2, 0x0, &(0x7f0000000cc0)={0x0, 0x989680}) 2018/04/12 19:10:45 executing program 2: mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000000040)='binfmt_misc\x00', 0x0, &(0x7f00000000c0)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000000c0)=""/250, 0x5f) [ 56.785154] device bridge0 entered promiscuous mode 2018/04/12 19:10:45 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xffffff8a, 0x0, 0x0, 0xffffffffffffff4e) shutdown(r0, 0x1) 2018/04/12 19:10:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendto$unix(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) shutdown(r0, 0x1) 2018/04/12 19:10:45 executing program 5: getrandom(&(0x7f00000001c0)=""/30, 0x1e, 0x3) 2018/04/12 19:10:45 executing program 1: clock_nanosleep(0x2, 0x0, &(0x7f0000b85000)={0x0, 0x1c9c380}, &(0x7f0000443000)) r0 = gettid() timer_create(0x0, &(0x7f0000000200)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000100)}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x14) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000f, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/12 19:10:45 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000040)='\x00', 0x1, r0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) [ 56.979877] device bridge0 left promiscuous mode 2018/04/12 19:10:47 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/12 19:10:47 executing program 3: r0 = socket$packet(0x11, 0x20000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f00000003c0)=0x7fffffff, 0x4) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/12 19:10:47 executing program 5: getrandom(&(0x7f00000001c0)=""/30, 0x1e, 0x3) 2018/04/12 19:10:47 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030efee)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c81, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='net/sockstat6\x00') ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000340)={0x0, 0x0, 0x0, 0xd9b4}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x4, &(0x7f0000000500)=[{}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f0000000300)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f0000000240)=0x80) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000140), 0x8) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000440)=""/100, 0x64, 0x0, &(0x7f00000004c0)={0x3, {"6b66c1c95d3a78"}}, 0x10) 2018/04/12 19:10:47 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xffffff8a, 0x0, 0x0, 0xffffffffffffff4e) shutdown(r0, 0x1) 2018/04/12 19:10:47 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xffffff8a, 0x0, 0x0, 0xffffffffffffff4e) shutdown(r0, 0x1) 2018/04/12 19:10:47 executing program 1: clock_nanosleep(0x2, 0x0, &(0x7f0000b85000)={0x0, 0x1c9c380}, &(0x7f0000443000)) r0 = gettid() timer_create(0x0, &(0x7f0000000200)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000100)}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x14) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000f, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/12 19:10:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) sendto$unix(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) shutdown(r0, 0x1) 2018/04/12 19:10:47 executing program 5: getrandom(&(0x7f00000001c0)=""/30, 0x1e, 0x3) 2018/04/12 19:10:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) sendto$inet(r0, &(0x7f0000482000), 0x0, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x852b, 0xffff}, 0x14) writev(r0, &(0x7f0000000200)=[{&(0x7f00000001c0)="0f", 0x1}], 0x1) sendmsg(r0, &(0x7f0000bd5000)={0x0, 0x0, &(0x7f000028c000)=[{&(0x7f00005e3000)='P', 0x1}], 0x1, &(0x7f00000003c0)}, 0x1) 2018/04/12 19:10:47 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/12 19:10:47 executing program 5: getrandom(&(0x7f00000001c0)=""/30, 0x1e, 0x3) 2018/04/12 19:10:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) pwrite64(r0, &(0x7f00000000c0)="0abb9011a43499674604b0fa2a74f96ab7cc2b1c175886a31f07ed232d65c71f476360dd4e609dbd800076eb24a246b46748", 0x32, 0x0) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) gettid() accept(r1, &(0x7f0000000040)=@alg, &(0x7f0000000440)=0x80) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x2) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) ioctl$KDMKTONE(r2, 0x4b30, 0x0) 2018/04/12 19:10:47 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00004fe000), 0x4) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 58.430624] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/12 19:10:48 executing program 3: 2018/04/12 19:10:48 executing program 5: 2018/04/12 19:10:48 executing program 7: 2018/04/12 19:10:48 executing program 2: 2018/04/12 19:10:48 executing program 0: 2018/04/12 19:10:48 executing program 1: 2018/04/12 19:10:48 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xffffff8a, 0x0, 0x0, 0xffffffffffffff4e) shutdown(r0, 0x1) 2018/04/12 19:10:48 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xffffff8a, 0x0, 0x0, 0xffffffffffffff4e) shutdown(r0, 0x1) 2018/04/12 19:10:48 executing program 3: 2018/04/12 19:10:48 executing program 7: 2018/04/12 19:10:48 executing program 0: 2018/04/12 19:10:48 executing program 1: 2018/04/12 19:10:48 executing program 5: 2018/04/12 19:10:48 executing program 2: 2018/04/12 19:10:49 executing program 1: 2018/04/12 19:10:49 executing program 7: 2018/04/12 19:10:49 executing program 3: 2018/04/12 19:10:49 executing program 0: 2018/04/12 19:10:49 executing program 5: 2018/04/12 19:10:49 executing program 2: 2018/04/12 19:10:49 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xffffff8a, 0x0, 0x0, 0xffffffffffffff4e) 2018/04/12 19:10:49 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) shutdown(r0, 0x1) 2018/04/12 19:10:49 executing program 1: 2018/04/12 19:10:49 executing program 2: 2018/04/12 19:10:49 executing program 0: 2018/04/12 19:10:49 executing program 3: 2018/04/12 19:10:49 executing program 7: 2018/04/12 19:10:49 executing program 5: 2018/04/12 19:10:49 executing program 2: 2018/04/12 19:10:49 executing program 1: 2018/04/12 19:10:49 executing program 0: 2018/04/12 19:10:49 executing program 3: 2018/04/12 19:10:49 executing program 5: 2018/04/12 19:10:49 executing program 7: 2018/04/12 19:10:49 executing program 2: 2018/04/12 19:10:49 executing program 1: 2018/04/12 19:10:49 executing program 0: 2018/04/12 19:10:49 executing program 3: 2018/04/12 19:10:49 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xffffff8a, 0x0, 0x0, 0xffffffffffffff4e) 2018/04/12 19:10:49 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) shutdown(r0, 0x1) 2018/04/12 19:10:50 executing program 0: 2018/04/12 19:10:50 executing program 3: 2018/04/12 19:10:50 executing program 7: 2018/04/12 19:10:50 executing program 2: 2018/04/12 19:10:50 executing program 1: 2018/04/12 19:10:50 executing program 5: 2018/04/12 19:10:50 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000852ff8)={0x77359400}, &(0x7f0000000040), 0x0) futex(&(0x7f000000cffc), 0x3, 0x2, &(0x7f0000000000), &(0x7f0000a2a000), 0x0) 2018/04/12 19:10:51 executing program 2: 2018/04/12 19:10:51 executing program 0: 2018/04/12 19:10:51 executing program 1: 2018/04/12 19:10:51 executing program 5: 2018/04/12 19:10:51 executing program 7: mkdir(&(0x7f0000eb6000)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f000002c000)='./file0\x00', &(0x7f000002cffa)='ramfs\x00', 0x0, &(0x7f000000a000)) creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000020000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 2018/04/12 19:10:51 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) shutdown(r0, 0x1) 2018/04/12 19:10:51 executing program 3: 2018/04/12 19:10:51 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000017a000)=@abs, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xffffffcd) recvfrom$inet(r0, &(0x7f00009be000)=""/11, 0xffffff8a, 0x0, 0x0, 0xffffffffffffff4e) 2018/04/12 19:10:51 executing program 2: 2018/04/12 19:10:51 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000000)=""/36) 2018/04/12 19:10:51 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff}) vmsplice(r0, &(0x7f00000025c0), 0x169, 0x0) 2018/04/12 19:10:51 executing program 5: keyctl$describe(0x6, 0x0, &(0x7f0000000340)=""/93, 0x5d) 2018/04/12 19:10:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) sendmsg$nfc_llcp(r0, &(0x7f0000000800)={&(0x7f00000003c0)={0x27, 0x1, 0x0, 0x7, 0x10001, 0x0, "733df579d60c4381552e9ebe08266568bfbf49c84813c90ecf8294cf054c35c4aadb61c5f1aac8c416eb7a5cea5acd80bb40e77071fc524d82498cb3040fa6"}, 0x58, &(0x7f0000000680)=[{&(0x7f0000000a80)="290ad5412684c268785cb306d16d610a2a54a09f0926b041ef0d9b118b3b9fb96ecfa8f8507db4e0790e5302b8e55fc61849", 0x32}], 0x1}, 0x4044000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000980)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) r3 = socket$nl_crypto(0x10, 0x3, 0x15) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20000}) fcntl$setlease(r3, 0x400, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x4e23, 0xff, @empty, 0xffffffff}}, 0x6, 0xec, 0x56, "92a10be19c62b482c11c8a7702082ea8deda770e53db3b5d1512b820bf8baa2d7bc73e682de2ac10f78f1434f69ccd80715abf6827ffc86961780e391a7fe7dd5816fa4c2c416862b98949e8aa51bd5f"}, 0xd8) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r4, 0x4, 0x46000) preadv(r4, &(0x7f0000000040), 0x41, 0x0) sendfile(r1, r2, &(0x7f0000000080), 0x102000004) setns(0xffffffffffffffff, 0x4000000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000640), &(0x7f0000000600)=0x3c6) 2018/04/12 19:10:51 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) close(r0) 2018/04/12 19:10:51 executing program 2: socket$unix(0x1, 0x10000000000001, 0x0) 2018/04/12 19:10:51 executing program 1: r0 = socket(0x1e, 0x5, 0x0) sendmsg(r0, &(0x7f0000316000)={&(0x7f0000002680)=@generic={0x10000000001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af50d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, &(0x7f0000002600), 0x0, &(0x7f00002d4000)}, 0x0) 2018/04/12 19:10:51 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x1, 0x87, 0xff, 0xfffffffffffffffd}, 0xe) 2018/04/12 19:10:51 executing program 5: r0 = socket$unix(0x1, 0x10000000000001, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs, 0x6e) [ 62.663738] ================================================================== [ 62.671158] BUG: KMSAN: uninit-value in copy_page_to_iter+0x754/0x1b70 [ 62.677824] CPU: 0 PID: 5371 Comm: blkid Not tainted 4.16.0+ #83 [ 62.683968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 62.693318] Call Trace: [ 62.695902] dump_stack+0x185/0x1d0 [ 62.699528] ? kmsan_internal_check_memory+0x145/0x1d0 [ 62.704799] kmsan_report+0x142/0x240 [ 62.708600] kmsan_internal_check_memory+0x164/0x1d0 [ 62.713707] kmsan_copy_to_user+0x69/0x160 [ 62.717942] copy_page_to_iter+0x754/0x1b70 [ 62.722269] generic_file_read_iter+0x2ee8/0x43f0 [ 62.727134] blkdev_read_iter+0x20d/0x280 [ 62.731284] ? blkdev_write_iter+0x5f0/0x5f0 [ 62.735706] __vfs_read+0x6fb/0x8e0 [ 62.739336] vfs_read+0x36c/0x6c0 [ 62.742787] SYSC_read+0x172/0x360 [ 62.746322] SyS_read+0x55/0x80 [ 62.749594] do_syscall_64+0x309/0x430 [ 62.753477] ? vfs_write+0x8d0/0x8d0 [ 62.757197] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 62.762377] RIP: 0033:0x7f8d19034310 [ 62.766075] RSP: 002b:00007ffea8646a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 62.773777] RAX: ffffffffffffffda RBX: 0000000000001c00 RCX: 00007f8d19034310 [ 62.781042] RDX: 0000000000000400 RSI: 00000000018a96e8 RDI: 0000000000000003 [ 62.788308] RBP: 00000000018a96c0 R08: 0000000000000028 R09: 0000000001680000 [ 62.795574] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000018a8030 [ 62.802834] R13: 0000000000000400 R14: 00000000018a8080 R15: 00000000018a96d8 [ 62.810099] [ 62.811710] Uninit was stored to memory at: [ 62.816029] kmsan_internal_chain_origin+0x12b/0x210 [ 62.821127] kmsan_memcpy_origins+0x11d/0x170 [ 62.825617] __msan_memcpy+0x19f/0x1f0 [ 62.829501] iov_iter_copy_from_user_atomic+0xb04/0x17d0 [ 62.835367] generic_perform_write+0x4c6/0x990 [ 62.839944] __generic_file_write_iter+0x5f5/0x990 [ 62.844957] blkdev_write_iter+0x3a8/0x5f0 [ 62.849179] do_iter_readv_writev+0x7bb/0x970 [ 62.853661] do_iter_write+0x30d/0xd40 [ 62.857542] vfs_iter_write+0x118/0x180 [ 62.861510] iter_file_splice_write+0xbc3/0x1710 [ 62.866263] direct_splice_actor+0x19b/0x200 [ 62.870671] splice_direct_to_actor+0x764/0x1040 [ 62.875422] do_splice_direct+0x335/0x540 [ 62.879561] do_sendfile+0x1067/0x1e40 [ 62.883444] SYSC_sendfile64+0x1b3/0x300 [ 62.887503] SyS_sendfile64+0x64/0x90 [ 62.891293] do_syscall_64+0x309/0x430 [ 62.895191] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 62.900362] Uninit was created at: [ 62.903895] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 62.908902] kmsan_alloc_page+0x82/0xe0 [ 62.912871] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 62.917620] alloc_pages_vma+0xcc8/0x1800 [ 62.921769] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 62.926777] shmem_getpage_gfp+0x35db/0x5770 [ 62.931172] shmem_file_read_iter+0x508/0x1180 [ 62.935751] generic_file_splice_read+0x4e8/0x830 [ 62.940591] splice_direct_to_actor+0x4c6/0x1040 [ 62.945341] do_splice_direct+0x335/0x540 [ 62.949481] do_sendfile+0x1067/0x1e40 [ 62.953360] SYSC_sendfile64+0x1b3/0x300 [ 62.957412] SyS_sendfile64+0x64/0x90 [ 62.961199] do_syscall_64+0x309/0x430 [ 62.965080] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 62.970248] [ 62.971864] Bytes 0-1023 of 1024 are uninitialized [ 62.976778] ================================================================== [ 62.984123] Disabling lock debugging due to kernel taint [ 62.989559] Kernel panic - not syncing: panic_on_warn set ... [ 62.989559] [ 62.996916] CPU: 0 PID: 5371 Comm: blkid Tainted: G B 4.16.0+ #83 [ 63.004350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.013693] Call Trace: [ 63.016277] dump_stack+0x185/0x1d0 [ 63.019906] panic+0x39d/0x940 [ 63.023114] ? kmsan_internal_check_memory+0x145/0x1d0 [ 63.028377] kmsan_report+0x238/0x240 [ 63.032179] kmsan_internal_check_memory+0x164/0x1d0 [ 63.037280] kmsan_copy_to_user+0x69/0x160 [ 63.041516] copy_page_to_iter+0x754/0x1b70 [ 63.045840] generic_file_read_iter+0x2ee8/0x43f0 [ 63.050696] blkdev_read_iter+0x20d/0x280 [ 63.054851] ? blkdev_write_iter+0x5f0/0x5f0 [ 63.059253] __vfs_read+0x6fb/0x8e0 2018/04/12 19:10:51 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x7) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000680)={"6c6f000004000000704e16e845500800"}) fstat(0xffffffffffffffff, &(0x7f00000001c0)) 2018/04/12 19:10:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d05000000000000000010400000000000", 0x58, 0x10000}], 0x0, &(0x7f0000014300)) 2018/04/12 19:10:51 executing program 1: unshare(0x40000000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00\x00p\x00'}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000001900)) socket$unix(0x1, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@remote, @multicast2, @multicast2}, &(0x7f0000000300)=0xc) [ 63.062885] vfs_read+0x36c/0x6c0 [ 63.066336] SYSC_read+0x172/0x360 [ 63.069868] SyS_read+0x55/0x80 [ 63.073144] do_syscall_64+0x309/0x430 [ 63.077030] ? vfs_write+0x8d0/0x8d0 [ 63.080746] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 63.085929] RIP: 0033:0x7f8d19034310 [ 63.089626] RSP: 002b:00007ffea8646a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 63.097322] RAX: ffffffffffffffda RBX: 0000000000001c00 RCX: 00007f8d19034310 [ 63.104579] RDX: 0000000000000400 RSI: 00000000018a96e8 RDI: 0000000000000003 [ 63.111841] RBP: 00000000018a96c0 R08: 0000000000000028 R09: 0000000001680000 [ 63.119101] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000018a8030 [ 63.126362] R13: 0000000000000400 R14: 00000000018a8080 R15: 00000000018a96d8 [ 63.134088] Dumping ftrace buffer: [ 63.137610] (ftrace buffer empty) [ 63.141291] Kernel Offset: disabled [ 63.144902] Rebooting in 86400 seconds..