INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.6' (ECDSA) to the list of known hosts. 2018/04/26 08:25:46 fuzzer started 2018/04/26 08:25:46 dialing manager at 10.128.0.26:38541 syzkaller login: [ 52.614626] can: request_module (can-proto-0) failed. [ 52.626367] can: request_module (can-proto-0) failed. 2018/04/26 08:25:55 kcov=true, comps=false 2018/04/26 08:25:59 executing program 0: r0 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000080)="4169e20403203bfbac752de639008ce57585f941c2fc92c8a1881ea99e2109b2ace5a71bed89f46519662dab8da6061a35ffc224c5ec1602a236aaa26b70cfc4505e1dc623b357b095a61418cd0e37d3184fcabcd409c913322c78d6ac7eb6d878af3f8b660e908f389618b8af97dcaf1a204f3696d5922ac1e565aee9bb27beac22e4ddbc1bb7b812491f1b586010f8bfba8e95ec90980f79b432868fdf6451471338500e67196507e9547e325c77", 0xaf, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x1, 0x40002) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000180)={{0x2393, 0x6}, {0x0, 0x2}, 0x4, 0x7, 0xe5}) r2 = getgid() getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r2, r3, r4) syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0x686, 0x2, &(0x7f0000001500)=[{&(0x7f0000000400)="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", 0x1000, 0x100000001}, {&(0x7f0000001400)="f970e15f0b38b01234c5452c098de2fb919d657a2032c70d6008bedbb0a5ea7fe29b17b3a0d2d77547d78ec2f87a3eecc471b3cdb54b454d1388a1c6485c8d62441244a1b8cfdca3096f989692891f7fc4ba3ae0afecb790cb4e0f8a94fbf28ff3f4d8f63955ab720e775435a5106ee69ea7108b3a017e84ac5cfbaf05d56af277b29a4f68b4f8e24fe4ee991bd557bd9fd41262483d145c61ee7344edc6e65b8547fb21c10cfcef6530e9809ff6197de2277e4144eeaf7b7e272a5429927b8fb7", 0xc1, 0x8}], 0x20000, &(0x7f0000001540)={[{@showexec='showexec', 0x2c}, {@discard='discard', 0x2c}]}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000015c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000001700)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x82}, 0xc, &(0x7f00000016c0)={&(0x7f0000001600)={0x98, r5, 0x4, 0x70bd2a, 0x25dfdbfe, {0x10}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local={0xfe, 0x80, [], 0xaa}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffffc00}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x40000}, 0x4000044) readlinkat(r1, &(0x7f0000001740)='./file0\x00', &(0x7f0000001780)=""/118, 0x76) r6 = semget$private(0x0, 0x4, 0x200) semctl$GETPID(r6, 0x0, 0xb, &(0x7f0000001800)=""/233) semctl$SETVAL(r6, 0x2, 0x10, &(0x7f0000001900)=0x10001) symlink(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)='./file0\x00') shmctl$SHM_INFO(r6, 0xe, &(0x7f00000019c0)=""/56) r7 = socket$inet(0x2, 0xa, 0x6) setsockopt$inet_MCAST_MSFILTER(r7, 0x0, 0x30, &(0x7f0000001a00)={0x4, {{0x2, 0x4e23, @loopback=0x7f000001}}, 0x0, 0x2, [{{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x11}}}, {{0x2, 0x4e21, @multicast1=0xe0000001}}]}, 0x190) modify_ldt$write2(0x11, &(0x7f0000001bc0)={0x4, 0x100000, 0x4000, 0xb371726, 0xbdb, 0x24e, 0x5, 0x6, 0x100}, 0x10) getsockopt$inet_dccp_buf(r7, 0x21, 0xf, &(0x7f0000001c00)=""/91, &(0x7f0000001c80)=0x5b) fcntl$getownex(r1, 0x10, &(0x7f0000001cc0)={0x0, 0x0}) sched_getattr(r8, &(0x7f0000001d00), 0x30, 0x0) accept4$alg(r1, 0x0, 0x0, 0x800) lremovexattr(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)=@known='system.posix_acl_access\x00') fsync(r1) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000001dc0)) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000001e00)={{0xa, 0x4e20, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0xffffffffffff3dfe}, {0xa, 0x4e22, 0x7ff, @loopback={0x0, 0x1}, 0x6}, 0xfffffffffffffffb, [0x1, 0x7a46, 0x80000001, 0x80000000, 0x6, 0x80000001, 0x1, 0x101]}, 0x5c) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000001e80)={0x0, {{0xa, 0x4e20, 0x0, @empty, 0x1}}, 0x1, 0x6, [{{0xa, 0x4e20, 0xfffffffffffffffb, @mcast2={0xff, 0x2, [], 0x1}, 0xe24b}}, {{0xa, 0x4e23, 0x19, @empty, 0x4}}, {{0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0xc7}}, {{0xa, 0x4e23, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x63}}, {{0xa, 0x4e21, 0x100000001, @dev={0xfe, 0x80, [], 0x1e}, 0x1}}, {{0xa, 0x4e20, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0x7}}]}, 0x390) 2018/04/26 08:25:59 executing program 7: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'bcsf0\x00', {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'tunl0\x00', {0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20400, 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f00000000c0)={0x9, 0x7, 0x5, 0xff, "bbe046c7eadbc7959cc45ee6251ad69f885fda948ae6226212365c0db61c12ff7c2586780f5cac9f5e001dcd", 0x4394}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x1, 0x2, 0x80d, 0x8, 0x40}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={r2, 0x3c, &(0x7f0000000180)=[@in={0x2, 0x4e24, @rand_addr}, @in={0x2, 0x4e21, @broadcast=0xffffffff}, @in6={0xa, 0x4e21, 0x10001, @dev={0xfe, 0x80, [], 0x11}, 0x8138}]}, &(0x7f0000000200)=0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000240)={'icmp6\x00'}, &(0x7f0000000280)=0x1e) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f00000002c0)=0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300), 0x10) fcntl$setlease(r0, 0x400, 0x3) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000340)=0x7, 0x4) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000380)={'broute\x00'}, &(0x7f0000000400)=0x78) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000440)={r2, 0x10001}, &(0x7f0000000480)=0x8) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f00000004c0)=0xffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0)=r5, 0x4) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000600)={r3, 0x8001, 0x6d, "4677683550673af8bfbfd29a29551c4c4736f7f04c5217e2a56d0d88c920902a4603b070df1a70862e7e168767c331912b232704601568f00dfceae4159062a87b35f2379d76f134cf02f2cffa3daba32d2ef58c61b48f60787c12ac9d0592757cdc11a568284e23bbfcf0bebd"}, 0x75) lgetxattr(&(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)=@known='security.evm\x00', &(0x7f0000000700)=""/206, 0xce) getsockname$packet(r1, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000840)=0x14) getgroups(0x2, &(0x7f0000000880)=[0xffffffffffffffff, 0x0]) ioctl$TUNSETGROUP(r1, 0x400454ce, r6) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000008c0)={{0xa, 0x4e23, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x800}, {0xa, 0x4e24, 0xfc25, @remote={0xfe, 0x80, [], 0xbb}, 0x8}, 0xffff, [0x7ff, 0x8, 0x2, 0x2f18, 0x80000000, 0xffffffff, 0x8, 0x7]}, 0x5c) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000940)=0x2) r7 = openat(r1, &(0x7f0000000980)='./file0\x00', 0x100, 0x40) set_robust_list(&(0x7f0000000a80)={&(0x7f0000000a00)={&(0x7f00000009c0)}, 0x0, &(0x7f0000000a40)}, 0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000ac0)={r3, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x2e, 0x200, 0xcbf9, 0x7, 0x1}, &(0x7f0000000b80)=0x98) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000bc0)={r4, 0x80000000}, &(0x7f0000000c00)=0x8) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000c40)=0x0) ptrace$getregset(0x4204, r8, 0x203, &(0x7f0000001c80)={&(0x7f0000000c80)=""/4096, 0x1000}) 2018/04/26 08:25:59 executing program 3: 2018/04/26 08:25:59 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x88) sendmsg$inet_sctp(r0, &(0x7f0000000000)={&(0x7f0000ed5fe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000001580)=[{&(0x7f0000000340)="1608864b74f88907bd493bb6529934693aef7ad51dac56c09d118cdc078cdb7ae91c2194d6e5f4f58a02daef35b127b2e636d6001f282408d88569bf3476fcfbe04ae68cb9e7f4d650def27103fc889b013732f0800792e0df1af4714b7bb8fa4b58856e1cde2310fa1fa9d7ba9f4e162efb40266a1ae4b1eca92b03d23299c4a39cdfd6a9f5e344e30583c0a426bd9702fc88d9458b7cfe3ec76335c8d79c9b52803d5904155dc797faf1d488547e86d0bc0699e1ed96f393f7f4f8cdbeda3b50eecdaf5a3284c82872c5f8c1a2c50fdc357cfcaad33cdbf17944de0bd9aa4cdea5928f4d3aa03a22fe22c9217db08b34b0f4f30fa87ff6c8880b940ebd73cc1fd3cef86753b9e922bc9570d7c72943424862e7b461e7966587facdc367510fb4e10d671a2fe8ea3450df1adad4d2c85985045f8d8d3e50ce0acaa9eb205c746ca3003d4a5b50ef565db36ad0b68eb752e87c288176b27cbd613562a9e99b4869fd39e467f67dbe3f0ffa0706cf461db7acd7c951c2642ad9441ca2ad7021494076b274c760f4683c7e54f379add55bd599db8a0b723d208fbf58da514dd9c85c848384243b69525243efdeeff5d76aedabf3ea376be8612d72d9441f98d162de4a68c26ccbdf0ddfbf0e681454f91d26841501cc838346797400262af868097e7e66ba320389e9e9cfb9dc5e85a98f48d37d25bfc951ac0d4a990ba3212b7e206f9cfec0db9341d2fa210f94f0b656f620a511b9f1f3b2d8cecc9a9647f331b709bfafd92da4537a350ac57fb2c0a891a42827d8985f917d40bc28501a35c06ab575da3103bfc7dcffc6e21745d1a6c5e7df6470b30c6ce1518751b718fb4ccf291421d37335c6a2d444772300898b54a33405840ae1bf7ccfdf5fbdff27c38153fd4cf427172f56bf3c7193beae78a0679b2d23df53656c3807eff4b0dfc6dcdc2bbb6a2567bc6b0b785226a9d347e53ba8937e43e4410df292050cea35fed5088fa4d7e196ec34600b9ee898dcd6e4bbaa8a96c30d526b7c9fe5120a373e012b08d5a6f2411a4876fcda6cb575674746e19c8309a0253c6a0d13e074e3702742c452ae1347d77dc95032ed91b71f12186394cc7fb6cf92c0c7d06ac6747f7fd4e59dd25cb6028f0e4bc9446983ce22314d9ebab3d7f1321fc79913ba52fbcb8fc7f1495649eac62d35b038f9992c89f2c10ae8ef778be6b0cdbf4a6affbac9827d503c38dc4faf29b36e05180092b15724e2e43ac5447a84e2ac9153e974c0a4824edf59dcaa1902d33eed4b3d78918d1da73814848b9bf9c07abcee0f9dcffd1b05fed96e0ab854b530716b625c833d128e6451c0af2668455dba1c279186f435af994e8a02f8bac95b56cf4f60d71a2431524702e02caa137f65d47f5d7c3b8daaeb8a2c49d0bf6f1892e8650dd7dcb61348f112d0d9a0514d27457ed2ebcaca05d7ec5cf3692b48fc08b8dfd01c1a2dfcbd96747549560d70cbbef3956a7adbd060ac8d958fa129db2564e49b0494d6b22056a22f778f3576c2ad72024c89ec80a1439dc1c1ecfb261fbc4a9bce49b486bb9a0256355f38d8d16378ba9b25f182e57c31498607bf62b000c161db6e94374130eab51e7bc449b5f949b79b7106fd0f898e3f7a8449625e52fb7a18e8cc5ae73eea59ead52b2458220ba72e07674faaf7dc618b62dcd7c08e95d484af628bb90b454f5c3fa66c486cb73285985fe5029a1a62846adf685d44a87b35bafabab97a0d07d1d719875b7e93d2b4d5661859697659a0691ca63d144d1fc41869b1893eef9882d8af64c971ae41ea03982038afae7edc52f277f7fb8d630d935d4949bc2d69e5fb3055e73eb7b4d9abbf04de5482a8d655f4f609a894d851140571936dfef8112e863be55da2e5c70c6a7da56270eaa67469a12c3715ba482d256f8a4269d92cceffdc9a022d71de939b639903727f1f8692266a89838ad3ffbabe019b4bc3094dd82a28257f4036c10b6793f73379c36a4508b339c76ce9e90fc0b0e67bc15e411e5c1cb14dc70adfd915b13028b0861f85631d", 0x5ad}], 0x1}, 0x0) 2018/04/26 08:25:59 executing program 4: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000001c0)="240000001a0025f0006bb40400000009020b78b97fc10100000000000000eafc79e33fff", 0x24) 2018/04/26 08:25:59 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f757000361a6f74a1b774b8642f3dfdd313d92946ff0167415d8dc22791dcd496520c1c99f4b07d3b2a11090000000229210b73abdcd2986fc290ac9b6ace278586d39949a54fb276eb1fd3964b0cad27e417b33abb8d3b00e64e75e4dff47de27536dccdde5fc746b04faafcec347560a31b3a35a5f20bc949d75cbb763987", 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r2, &(0x7f0000001480)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) sendfile(r1, r1, &(0x7f0000000000)=0x36, 0x7) 2018/04/26 08:25:59 executing program 5: prctl$setmm(0x2f, 0x4, &(0x7f0000ffd000/0x3000)=nil) 2018/04/26 08:25:59 executing program 6: mkdir(&(0x7f0000000000)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f", 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) rename(&(0x7f0000000080)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000100)='./file0/file0\x00') [ 58.036929] IPVS: ftp: loaded support on port[0] = 21 [ 58.106178] IPVS: ftp: loaded support on port[0] = 21 [ 58.152673] IPVS: ftp: loaded support on port[0] = 21 [ 58.233144] IPVS: ftp: loaded support on port[0] = 21 [ 58.346021] IPVS: ftp: loaded support on port[0] = 21 [ 58.507310] IPVS: ftp: loaded support on port[0] = 21 [ 58.658772] IPVS: ftp: loaded support on port[0] = 21 [ 58.840330] IPVS: ftp: loaded support on port[0] = 21 [ 59.387162] ip (4676) used greatest stack depth: 54408 bytes left [ 59.819624] ip (4710) used greatest stack depth: 53928 bytes left [ 60.746735] ip (4786) used greatest stack depth: 53768 bytes left [ 60.981417] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.987956] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.017171] device bridge_slave_0 entered promiscuous mode [ 61.108875] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.115491] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.154726] device bridge_slave_0 entered promiscuous mode [ 61.300448] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.306955] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.331440] device bridge_slave_1 entered promiscuous mode [ 61.450947] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.457424] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.480162] device bridge_slave_1 entered promiscuous mode [ 61.500261] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.506742] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.521800] device bridge_slave_0 entered promiscuous mode [ 61.558731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.590898] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.597447] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.630636] device bridge_slave_0 entered promiscuous mode [ 61.646258] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.758255] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.764787] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.803266] device bridge_slave_1 entered promiscuous mode [ 61.839554] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.848298] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.854782] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.882649] device bridge_slave_1 entered promiscuous mode [ 61.898688] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.983459] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.099175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.132589] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.139161] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.178161] device bridge_slave_0 entered promiscuous mode [ 62.203262] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.230554] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.262181] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.268729] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.318215] device bridge_slave_0 entered promiscuous mode [ 62.353651] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.360216] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.407396] device bridge_slave_1 entered promiscuous mode [ 62.455811] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.462324] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.471150] device bridge_slave_1 entered promiscuous mode [ 62.488479] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.508125] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.514649] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.542317] device bridge_slave_0 entered promiscuous mode [ 62.599884] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.606510] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.656173] device bridge_slave_0 entered promiscuous mode [ 62.676451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.685189] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.703013] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.757485] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.823341] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.829854] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.874586] device bridge_slave_1 entered promiscuous mode [ 62.889117] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.895597] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.906545] device bridge_slave_1 entered promiscuous mode [ 62.931634] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.944829] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.957704] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.987657] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.002709] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.068246] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 63.099411] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 63.163156] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.170233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.234328] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.243231] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.251086] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.266397] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.295227] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 63.306571] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 63.484989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.492083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.519812] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.562482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.582710] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.590298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.646585] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.686538] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.781440] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.790581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.835316] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.842396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.867554] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.896137] team0: Port device team_slave_0 added [ 63.920644] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.967122] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 64.046191] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 64.063733] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 64.131308] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.160713] team0: Port device team_slave_1 added [ 64.197537] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 64.205329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.233918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 64.242918] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.270092] team0: Port device team_slave_0 added [ 64.286760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.316678] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 64.324855] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.332373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.363438] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 64.422205] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.451150] team0: Port device team_slave_0 added [ 64.471672] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.480589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.498557] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.518864] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.532291] team0: Port device team_slave_1 added [ 64.552224] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.559266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.592380] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 64.600175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 64.608458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.632250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.671878] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.688511] team0: Port device team_slave_0 added [ 64.723720] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.731676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.749109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.766947] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.780154] team0: Port device team_slave_1 added [ 64.808469] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.817382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.839736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 64.847790] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.869716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.901009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.927171] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.951398] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.967193] team0: Port device team_slave_1 added [ 65.023371] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.036422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.048190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.080809] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.089506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.119279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.152895] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.164013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.179394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.216917] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.226651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.243207] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.281824] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 65.303216] team0: Port device team_slave_0 added [ 65.322594] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.331645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.352087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.382574] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.390947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.406921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.433431] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 65.442547] team0: Port device team_slave_0 added [ 65.449240] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.457620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.475881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.501015] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 65.510829] team0: Port device team_slave_0 added [ 65.524992] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.555269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.567980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.608385] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.618735] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 65.636605] team0: Port device team_slave_1 added [ 65.649689] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.660017] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 65.687229] team0: Port device team_slave_1 added [ 65.702876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.719334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.751356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.784230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.801821] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 65.811610] team0: Port device team_slave_1 added [ 65.836013] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 65.844278] team0: Port device team_slave_0 added [ 65.850851] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.873604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.892303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.919320] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.928822] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.947637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.973256] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.008954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.033980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.057118] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.077392] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 66.089862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.101544] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.124413] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 66.133102] team0: Port device team_slave_1 added [ 66.143423] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 66.151425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.168064] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.191991] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.199733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.214816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.269905] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 66.277575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.292439] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.341410] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 66.356408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.383518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.420642] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 66.432786] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 66.444188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.486120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.512625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.531276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.578086] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 66.586078] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 66.593941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.614128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.662056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.682494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.721240] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.730533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.750614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.806725] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.814648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.827675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.842141] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 66.851840] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.881429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.905928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.941396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.980379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.056571] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 67.081463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.112688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.324575] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 67.332101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.348406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.180644] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.187157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.194104] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.200588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.226590] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.242854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.301823] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.308319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.315248] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.321730] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.365687] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.686817] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.693333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.700283] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.706932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.787858] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 69.026556] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.033123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.039974] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.046551] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.057924] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 69.078328] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.084836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.091678] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.098997] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.167209] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 69.283199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.302322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.330209] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.364405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.424640] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.431150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.438018] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.444517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.476905] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 69.505615] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.512127] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.518991] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.525479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.566280] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 69.990646] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.997134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.004009] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.010496] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.071716] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 70.303247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.316529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.341623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.138516] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.616910] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.956911] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.022009] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.057191] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.125017] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.485249] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.532132] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.647716] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.788089] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.794476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.808379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.849496] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.961910] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.991265] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.019452] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.368829] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.380986] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.387328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.395461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.440290] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.632174] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.640408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.649408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.675519] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.811480] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.817808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.828844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.928679] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 79.936679] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.942933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.957980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 80.120989] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 80.127301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 80.138859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 80.211616] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.391618] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 80.398254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 80.410090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 80.446787] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.676159] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.771147] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 80.777474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 80.786597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 80.927609] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.021676] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.280449] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.636950] 8021q: adding VLAN 0 to HW filter on device team0 [ 84.658191] syz-executor0 uses obsolete (PF_INET,SOCK_PACKET) [ 85.914523] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 2018/04/26 08:26:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xd, 0x20011, r0, 0x0) r1 = socket$inet(0x2, 0x80003, 0x6) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @broadcast}, &(0x7f0000000040)=0x1) 2018/04/26 08:26:29 executing program 5: 2018/04/26 08:26:29 executing program 4: 2018/04/26 08:26:29 executing program 1: 2018/04/26 08:26:29 executing program 7: 2018/04/26 08:26:29 executing program 6: 2018/04/26 08:26:29 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$KDGKBLED(r0, 0x80045104, &(0x7f0000000fff)) 2018/04/26 08:26:29 executing program 3: 2018/04/26 08:26:29 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}, {@in6, 0x0, 0x2b}, @in=@broadcast=0xffffffff, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}, 0x1}, 0x0) clock_settime(0x3, &(0x7f0000000100)) recvmmsg(r0, &(0x7f0000006fc0)=[{{&(0x7f0000000000)=@hci, 0x80, &(0x7f0000000400)=[{&(0x7f0000000080)=""/93, 0x5d}, {&(0x7f0000000100)}, {&(0x7f0000000140)=""/43, 0x2b}, {&(0x7f0000000180)=""/119, 0x77}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/141, 0x8d}, {&(0x7f0000000300)=""/249, 0xf9}], 0x7, &(0x7f0000000480)=""/229, 0xe5, 0x5}, 0x7}, {{&(0x7f0000000580)=@nfc_llcp, 0x80, &(0x7f0000000780)=[{&(0x7f0000000600)=""/104, 0x68}, {&(0x7f0000000680)=""/254, 0xfe}], 0x2, &(0x7f00000007c0)=""/4096, 0x1000, 0xf83}, 0x8}, {{&(0x7f00000017c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001840)=""/85, 0x55}, {&(0x7f00000018c0)=""/175, 0xaf}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001a80)=""/123, 0x7b}, 0x9}, {{&(0x7f0000001b00)=@sco, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000001b80)=""/48, 0x30}, {&(0x7f0000001bc0)=""/166, 0xa6}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/255, 0xff}, {&(0x7f0000002d80)=""/12, 0xc}, {&(0x7f0000002dc0)=""/4096, 0x1000}, {&(0x7f0000003dc0)=""/136, 0x88}, {&(0x7f0000003e80)=""/18, 0x12}], 0x8, &(0x7f0000003f40)=""/172, 0xac, 0x8}, 0x9e}, {{&(0x7f0000004000)=@pptp={0x0, 0x0, {0x0, @multicast1}}, 0x80, &(0x7f0000004280)=[{&(0x7f0000004080)=""/142, 0x8e}, {&(0x7f0000004140)=""/205, 0xcd}, {&(0x7f0000004240)=""/19, 0x13}], 0x3, 0x0, 0x0, 0x8}, 0x100000001}, {{&(0x7f00000042c0)=@rc, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004340)=""/52, 0x34}, {&(0x7f0000004380)=""/157, 0x9d}, {&(0x7f0000004440)=""/89, 0x59}], 0x3, &(0x7f0000004500)=""/171, 0xab, 0x3}}, {{&(0x7f00000045c0)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f0000005980)=[{&(0x7f0000004640)=""/141, 0x8d}, {&(0x7f0000004700)=""/206, 0xce}, {&(0x7f0000004800)=""/65, 0x41}, {&(0x7f0000004880)=""/163, 0xa3}, {&(0x7f0000004940)=""/50, 0x32}, {&(0x7f0000004980)=""/4096, 0x1000}], 0x6, &(0x7f0000005a00)=""/4096, 0x1000, 0x7fff}, 0x7}, {{0x0, 0x0, &(0x7f0000006a40)=[{&(0x7f0000006a00)=""/13, 0xd}], 0x1, &(0x7f0000006a80)=""/73, 0x49, 0xfffffffffffffffb}, 0x1}, {{&(0x7f0000006b00)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000006e80)=[{&(0x7f0000006b80)=""/244, 0xf4}, {&(0x7f0000006c80)=""/214, 0xd6}, {&(0x7f0000006d80)=""/221, 0xdd}], 0x3, &(0x7f0000006ec0)=""/197, 0xc5, 0x7d8f}, 0x2}], 0x9, 0x10001, &(0x7f0000007200)={0x0, 0x989680}) 2018/04/26 08:26:29 executing program 5: prctl$void(0x3f) futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x8002) futex(&(0x7f000000cffc), 0xa, 0x0, &(0x7f00006f7000)={0xfffffffffffffffc, 0x100000000000000}, &(0x7f0000000080), 0x23) clock_gettime(0x7, &(0x7f00000000c0)) 2018/04/26 08:26:29 executing program 3: mlock2(&(0x7f0000a93000/0x2000)=nil, 0x2000, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x6, &(0x7f0000e03000/0x1000)=nil) mlock2(&(0x7f0000e03000/0x2000)=nil, 0x2000, 0x0) 2018/04/26 08:26:29 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0xfffffffffffffffd, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x3f) ioctl$KDSETMODE(r0, 0x4b3a, 0x8f13) poll(&(0x7f0000fdeff8)=[{r0}], 0x1, 0xb92) ioctl$TCSETS(r0, 0x5402, &(0x7f0000001180)={0x0, 0x0, 0x0, 0xffffffffffffffff}) 2018/04/26 08:26:29 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, "764017177abf5609e608f45ddc386bf3196e7c3fe2c1e3abc6c6d8b95d08b5dfe50a3da6820b43bba5fcbe2975f2df5d9ce8d9dbcfa50ad39ae0d0578bd5c069", "a492e3cf3c12516ac5f1ea650018d0fee2c7cd064be6a09e5b1594bb411790b2079c96f61d01ebd9168c16abf24211f46865dcd4c563897a50c2a297d8529caa", "6ef96758d0d082ed107b23e0301c3376f66f23adebabd3d6928d5f7155d0e4ae"}) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000780)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$read(0xb, r2, &(0x7f00000007c0)=""/244, 0x1aa) finit_module(r1, &(0x7f0000000040)='{\x00', 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07dd8aa88df543f4e8844a1d2dde3af50eddfaf232aea87d9f0d610bc6036cf5409918395b3e884a674b150031b0a6fe71b0813a5c34171cf9e7afb96de71fd5", "81d5544ff77ddd1ab96cb15c973cc51708890ab416736ecbd95a957c3cd95711c422be2df5b1e2da9dc4a8bc29321d61018f39bffc8dee3a2e9a4ae67fe9198c", "fe3f7b07120d64de9d947ed16020a9327433f12036fc4a9c3f50e1eb5fa6f631"}) recvmsg$netrom(r1, &(0x7f0000000740)={&(0x7f0000000080)=@full={{0x3, {"252d5ea259213e"}}, [{"1a20986e87767f"}, {"25187bb231bab9"}, {"cc83994ccf7957"}, {"ef381a9fdb50c9"}, {"35ff2c82097dba"}, {"7fcc530ef7ef23"}, {"7fcd4248114145"}, {"dd3afe5aace1bb"}]}, 0x48, &(0x7f00000006c0)=[{&(0x7f0000000480)="6cd9de77928f5980d57baff9423bda8ae975d478f657f46848f102fd2d5e469b4ae2d4fc6d9bfb962b390e57820741487bc30e6d81154abc773fddeaca4f740b25a74afd1449042ce42d8f40b42d1233ada0f3991e3cbcb93cf3c18d2133fcb70d075a6e343d5cffdb53903bb0ceb68f2ec77a7119bde44251ff73dbb136e679a7a67b121ec93cf13137c81834a62d81bdfedf19fad20363994472ceea3f57eacbc318d7d7c2d02f99539195dd9780fff52a7f290f36ad3456a810c30a5063b1e9e3ae544f4e664963465b82af4c8181e28cd87160117874c319e3c92b92e7578948a69f269c28b532513072c76ad460e3b461dd", 0xf4}, {&(0x7f0000000580)="34b91c1e39046dea8962401088e4b5b5c83fad6f2cad891772c78dc3538d635e19aee24cff796f2e017b08b576949ccf26517599563115efb04ded44196f292e161cde28b815d9912c00aacdb7699cb87f0b962221b8322e72d7c72a57c421505df7fd16e28578451a623d7ced8771d3b67e163e7a75de053f5e2ddbd2c7624ab8b364be4b4725e653b797a06f0e5aea2d44f6910ea560719ef2d039ed17e7547b9ee0deeec5013f614b49db986fd4ab3fe9142d1128ce3f34e509e2d359cabf7b14c392bcffff44d30e83a1908fb0a24d89a500b8639f635405d2517aae48218e13ae", 0xe3}, {&(0x7f0000000140)="b283cdb381293108579164df43db9c4cd26a4221b8aed2d48d0cc6d904670b08b2fadd46828511120337f9224b835c27783ba397a383d97f105a3531e7b9d288a860bbd22cda3a452011fcabe827398e90ec5f661c1ae3053f0c36025b51a11c5fafd0c06e186d116c7d211e395f1e7137e31bda3d42f0ae106b7af27e664303dd06e623dfb0a6a1e9537bd1", 0x8c}, {&(0x7f0000000340)}, {&(0x7f0000000680)="25c053cf03d712f5e4df653bff70193c", 0x10}], 0x5, 0x0, 0x0, 0x4010}, 0x40002040) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x0, 0x2, 0x8, 0x89, 0x8000, 0x72a3}, 0x1c) 2018/04/26 08:26:29 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) futex(&(0x7f00005a0ffc), 0x5, 0x0, &(0x7f0000000080), &(0x7f0000486000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) setuid(r0) 2018/04/26 08:26:29 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x3, 0x40000) mq_timedreceive(r0, &(0x7f00000006c0)=""/194, 0xc2, 0x4d68, &(0x7f00000007c0)) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_proto_private(r1, 0x0, &(0x7f0000000000)="2fda0c83c4625e5a") syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="c735f06995624191d7261f254da595e221476550aa8f68426454816ddaf16198d7718959ecb68e21be5a8142b94369c3cebc772c9308b9b10f5ccb223d2ab8ed626628dda633463e8aa60b5466256aefd7c759939922f5bbf7d327ac23a19442a5d5329d5f695dc8882f7426adc1bd8e03822fe45c8d25d8cfe9fa1fb8a7544d347f9e2de7869623c0b8ef9cf714a99d55d4337ad5e54f5a028b3ec364397e48ef825a9eb4324c9e29e7b5fd4fbcacaa78d1f86ff5d823b738928af4b53b21ee03028c63f6152980b7dd242362d07695ea061f6afc742b2a1b9ea219754c97e5e2af", 0xe2, 0x7}, {&(0x7f00000001c0)="4a3c7bf1b226132df3c3bb787b802bbb30d2a08a72a32042c61116cb346e4f10f4f9c057abad9198d9a4c566434a7a60ef06c23fd6c4f1d217e792fa9d92a75d91a3c15d2065c7b58443b352c9eea7cb3e0255129ab532f97b64ffee8651434a51", 0x61, 0x1}, {&(0x7f0000000240)="994489a0c11aafe56e8aaefb0dfaf658a6113cf6e63a780c745373211006e4bdbfc3872fd94f6e1c6ecaa7b30e2dc3881a8966f561878ebb98f30a3c6bd200886a5bb7b838ff7bbebea3b667708ebe017f5607ff1fbdaeac1ae7687564f46e59873720e5548c326bd41d52ee48f475e5db267db59202625a72d16f5260bc89e759825449b3c8d336de6270869f2ceb848ec3c1aa4d7a03124bc85b55b83fd5e0213809", 0xa3, 0x90}, {&(0x7f0000000300)="4afb09fb6f57496f2024b060be13ccbca1a3b8bb1dc1034a710761937881a77401c536b2b70d0715c01ab3131411696144a5a292133330ba844c5b230b66057a09e8db03464121e14e0b9e7cbe9181a10040d4406cce2706d99054a9ed315014ce9cc142126bce34f236235b41bc95a9d448b38fd87aed768da176a2bb71c9d4e0fb01687c95304de01c8fdd8fdbc84cea6c52978656d7009289694140caf4be", 0xa0, 0x5}, {&(0x7f00000003c0)="d084955e6b46ba4964af0ace95f9aed846af9b9841b269a4ee0f14980688b0fe5c69be45bdeafaf30491799b0ab103e95d56621220273a2a5ccc8f0b0810d61bd82082313a5ff7f696520d7db4d588d963f63c8032c95d15d6071ebaf2be1dd0a393a74d2a5c3332e31b9d9ab8b6a5e82942de16fdd317f7a657b057dfd9a921c390ad671c8b14305fcb976395ac48a2132680bc8fdf3d30b00b7abaf23a78f5e393b790a07e8555a2806cbb0fee303a04dc59c98cca38ee63222c73e3f58232df3ed20effa4bae22a116b7a4a53dbeb0f949b35809ebb30c257e9aa0da461f0617f712a331d004d148b32", 0xeb, 0xffffffffffff8000}, {&(0x7f00000004c0)="0a37a9cedd1e5e8421849102bbd6ee18dbad8c91ed024797aa392432747145af0d51b444f760bc04c4ee9fbf153d96d5114e27bd18101f1b7dc34874858c430db3da58c59bb7a0a65e92cb8d4f53b7e9a0dbbf2e349837610b917b32d3905981acf91e9aadfec29c3cb555dfe06216fa2edfe4457d4b6b13284b4554f089e8347f95315085d163910f9d91cc66dfd4e0785746e866f9b86de0c7322b750d43763b536976a1e56bc34f", 0xa9, 0x9}], 0x40000, &(0x7f0000000640)={[{@file_umask={'file_umask', 0x3d, [0x30, 0x31, 0x36, 0x34, 0x30, 0x35, 0x31]}, 0x2c}, {@codepage={'codepage', 0x3d, 'cp869'}, 0x2c}, {@uid={'uid', 0x3d, [0x3f, 0x31, 0x32]}, 0x2c}, {@type={'type', 0x3d, "cc4d3f83"}, 0x2c}, {@umask={'umask', 0x3d, [0x36]}, 0x2c}]}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000800)=0x1, 0x4) 2018/04/26 08:26:29 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) r1 = semget(0x0, 0x0, 0x40) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) r3 = getgid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000300)={{0x8, r2, r3, r4, r5, 0x41, 0x3}, 0x7, 0xb1bc, 0xc2a}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x3}, {0x80}, 0xf2ef, 0x4, 0x8000000000000000}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000080)={{0x0, 0x10001}, {0xffffff80}}) 2018/04/26 08:26:29 executing program 1: mkdir(&(0x7f00000002c0)='./control\x00', 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x37, 0x90200) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@generic={0x7fff, 0x2, 0x1}) r1 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) unlink(&(0x7f0000000280)='./control/file1\x00') r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) r3 = fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001700)={{{@in, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001800)=0xe8) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001940)=@assoc_value={0x0}, &(0x7f0000001980)=0x8) getitimer(0x3, &(0x7f0000001a40)) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)={r5, 0x9, 0x36, "46b15c788cafd1a7c96d0022f018aeaf745090cf3b89e95321788e844c3092d12f6bb2002fe44b23454356a74934ef2d41d912daa4ff"}, 0x3e) syz_open_dev$dspn(&(0x7f0000001a00)='/dev/dsp#\x00', 0x1f, 0x1010c0) fstat(r0, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000001900)=[{&(0x7f0000000180)=@file={0x0, './control/file0/file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000000300)="74899321b1ed21aeacaa6bce54d93953b7c4293d5513ecd124aac13ccdce22056bbfa423baf225ede75aad38a749989c7967e83622b43e15f496c35d9880c05602748fdad6679eb113810272577fefb076f174eb06998d5ae2350fb181bccce2c3e4b3c3ea7fef1da6e224eef82b2dd53643ee3fcf6c4302dba895be5e1a262b81393597ace7596c3ea36c83b7f81372314798d561990ec02c01a7a601ccf29eb7d257eefbe63b21506c13bc33150e462b7d24c46320b363395d6478", 0xbc}, {&(0x7f0000000200)="5ef5f051b03fd45bc8aad925916379b5e9e908ef92381a35275b9eb1b66ae1f253e816a53db570fb03d953ed256b5677a3094ae80e818859499ac3b75f9949a7f193640df1808b92f365425df2223e6875d20369990caa2c3e4c05906b01cba545f6fe159cb1dd8382aa089f8c91177a3507972d4ade93834a", 0x79}, {&(0x7f00000003c0)="c5fd41d47818b46e9395d23ec9b69a081d078611d0a99d1c77d1f9bdac3f6424c9da004355b9044e8564e2a21ecaf72d852584213cbeb09a98227d1c05d85bc3fd4153593228d6132fc7d07818eccd5ca4950a8ae661aed1599ebf4588692f36318878cb6957d81ff541ae83de7facec6c4d19d12bf41a773c959c22dbdbf003717ee15c52a99a86b733ecba", 0x8c}, {&(0x7f0000000480)="2a790459539cf18816f6a5679c673a08ff3c678a5ebc04f059c38c4f025454b5e1b63fb1183fca568d9025cc33a298a0eea0db4f01ffba5577e4f6a11d9d084bdac9d2a219fc23f3427f6600ebdf2105b831369cb50506ee495d12faf85f99c940e924f11139fc931407f348e1c399f925ab4117776b95debbdaa165f3ee7b008398f9587156d13e6ee4d1fd9639cf564a40d2c8", 0x94}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="d3b7c6e09e31522705050bfc8ebbd70e72f11e06c118f8d0825a09fbe9ba3a1ae2dc2eac45a2e12564c077868d9bdfa8b46e", 0x32}, {&(0x7f0000001580)="5c5d3e233b682b8e798e7b10445b84577efd7b2206fd84239770764d9a31b4497c89048a84f0e26125251f1b12485739513b1fe415401eb16e0d19c22aa8514db4b0152375b8c993f010f8cffa3692845c923f21c82681d21d74abb4448e4be85b7953fc9314033f1f24de4ee70f6ca3b7db105570672be3b062dff2d2464be983435ed7494f8377221e07bd62e80e4ed97dff2e1ba238d121cd90ca3d28b80e605fb70dce7f4c74b85229cdd892e5ea9df90d42f989729760e3eb8bd8b25588651fada4d81cf86931b90e8112dada2d7448477aef9c5bc4703f0db4d8a65f7603349920", 0xe4}], 0x7, &(0x7f00000018c0)=[@cred={0x20, 0x1, 0x2, r3, r4, r6}], 0x20, 0x40000}], 0x1, 0x4) unlink(&(0x7f00000000c0)='./control/file0\x00') chmod(&(0x7f0000000140)='./control/file0\x00', 0x168) rmdir(&(0x7f000015dff6)='./control\x00') 2018/04/26 08:26:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2, 0x4, 0x4cc1, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000200), &(0x7f0000000180), 0xfffffffffffffffd}, 0x20) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080)={0x2, 0x8, 0x0, 0x5, 0x3, 0x6850, 0x0, 0x401, 0x9, 0xfffffffffffffff9, 0x2}, 0xb) 2018/04/26 08:26:30 executing program 7: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000222000)=0xa, 0x334) connect$inet6(r0, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000b7ff8), &(0x7f0000000000)=0x721) 2018/04/26 08:26:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) r3 = getpgrp(0xffffffffffffffff) splice(r0, &(0x7f0000000140), r2, &(0x7f00000001c0), 0x6, 0x4) fcntl$setown(r2, 0x8, r3) ioctl$void(r1, 0x5451) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000100)={0x10001, 0x6, 0x20}) 2018/04/26 08:26:30 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, "764017177abf5609e608f45ddc386bf3196e7c3fe2c1e3abc6c6d8b95d08b5dfe50a3da6820b43bba5fcbe2975f2df5d9ce8d9dbcfa50ad39ae0d0578bd5c069", "a492e3cf3c12516ac5f1ea650018d0fee2c7cd064be6a09e5b1594bb411790b2079c96f61d01ebd9168c16abf24211f46865dcd4c563897a50c2a297d8529caa", "6ef96758d0d082ed107b23e0301c3376f66f23adebabd3d6928d5f7155d0e4ae"}) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000780)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$read(0xb, r2, &(0x7f00000007c0)=""/244, 0x1aa) finit_module(r1, &(0x7f0000000040)='{\x00', 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07dd8aa88df543f4e8844a1d2dde3af50eddfaf232aea87d9f0d610bc6036cf5409918395b3e884a674b150031b0a6fe71b0813a5c34171cf9e7afb96de71fd5", "81d5544ff77ddd1ab96cb15c973cc51708890ab416736ecbd95a957c3cd95711c422be2df5b1e2da9dc4a8bc29321d61018f39bffc8dee3a2e9a4ae67fe9198c", "fe3f7b07120d64de9d947ed16020a9327433f12036fc4a9c3f50e1eb5fa6f631"}) recvmsg$netrom(r1, &(0x7f0000000740)={&(0x7f0000000080)=@full={{0x3, {"252d5ea259213e"}}, [{"1a20986e87767f"}, {"25187bb231bab9"}, {"cc83994ccf7957"}, {"ef381a9fdb50c9"}, {"35ff2c82097dba"}, {"7fcc530ef7ef23"}, {"7fcd4248114145"}, {"dd3afe5aace1bb"}]}, 0x48, &(0x7f00000006c0)=[{&(0x7f0000000480)="6cd9de77928f5980d57baff9423bda8ae975d478f657f46848f102fd2d5e469b4ae2d4fc6d9bfb962b390e57820741487bc30e6d81154abc773fddeaca4f740b25a74afd1449042ce42d8f40b42d1233ada0f3991e3cbcb93cf3c18d2133fcb70d075a6e343d5cffdb53903bb0ceb68f2ec77a7119bde44251ff73dbb136e679a7a67b121ec93cf13137c81834a62d81bdfedf19fad20363994472ceea3f57eacbc318d7d7c2d02f99539195dd9780fff52a7f290f36ad3456a810c30a5063b1e9e3ae544f4e664963465b82af4c8181e28cd87160117874c319e3c92b92e7578948a69f269c28b532513072c76ad460e3b461dd", 0xf4}, {&(0x7f0000000580)="34b91c1e39046dea8962401088e4b5b5c83fad6f2cad891772c78dc3538d635e19aee24cff796f2e017b08b576949ccf26517599563115efb04ded44196f292e161cde28b815d9912c00aacdb7699cb87f0b962221b8322e72d7c72a57c421505df7fd16e28578451a623d7ced8771d3b67e163e7a75de053f5e2ddbd2c7624ab8b364be4b4725e653b797a06f0e5aea2d44f6910ea560719ef2d039ed17e7547b9ee0deeec5013f614b49db986fd4ab3fe9142d1128ce3f34e509e2d359cabf7b14c392bcffff44d30e83a1908fb0a24d89a500b8639f635405d2517aae48218e13ae", 0xe3}, {&(0x7f0000000140)="b283cdb381293108579164df43db9c4cd26a4221b8aed2d48d0cc6d904670b08b2fadd46828511120337f9224b835c27783ba397a383d97f105a3531e7b9d288a860bbd22cda3a452011fcabe827398e90ec5f661c1ae3053f0c36025b51a11c5fafd0c06e186d116c7d211e395f1e7137e31bda3d42f0ae106b7af27e664303dd06e623dfb0a6a1e9537bd1", 0x8c}, {&(0x7f0000000340)}, {&(0x7f0000000680)="25c053cf03d712f5e4df653bff70193c", 0x10}], 0x5, 0x0, 0x0, 0x4010}, 0x40002040) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x0, 0x2, 0x8, 0x89, 0x8000, 0x72a3}, 0x1c) 2018/04/26 08:26:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="ac", 0x1, 0x20020003, &(0x7f0000000b00)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f00000002c0)=0x20) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000340), 0x0) recvfrom$inet(r0, &(0x7f0000000140)=""/112, 0x70, 0x10000, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) sendto$inet(r0, &(0x7f00000001c0)="9a", 0x1, 0x93, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) connect$llc(r1, &(0x7f0000000300)={0x1a, 0x33d, 0x9, 0x0, 0x1f, 0x7, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) sendto$inet(r0, &(0x7f00000000c0)="92", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14}}, 0x10) 2018/04/26 08:26:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000840)=""/4096) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:30 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file1\x00', 0x14) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140)={0x0, 0x0, 0x1, 0x2, 0xacc, 0x80000000, 0x3}, 0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x7, 0x30, 0x4, 0x200}, &(0x7f0000000340)=0x18) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000380), 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000100)={r2, 0x190d}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f0000000440), 0x0, 0xfffffffffffffff8) keyctl$setperm(0x5, 0x0, 0x10001010) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000200)=@generic={0x0, 0x0, 0x401}) unlink(&(0x7f0000000080)='./file1\x00') sched_yield() r4 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) fcntl$setlease(r4, 0x400, 0x0) fcntl$getflags(r4, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) utimensat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={{0x0, 0x7530}, {0x0, 0x7530}}, 0x100) symlink(&(0x7f0000000500)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f", &(0x7f0000000580)='./file1\x00') syz_open_pts(r0, 0x0) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) bind$netlink(r5, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfb}, 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.current\x00', 0x0, 0x0) 2018/04/26 08:26:30 executing program 5: prctl$void(0x3f) futex(&(0x7f000000cffc)=0x4, 0x9, 0x4, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x8002) futex(&(0x7f000000cffc), 0xa, 0x0, &(0x7f00006f7000)={0xfffffffffffffffc, 0x100000000000000}, &(0x7f0000000080), 0x23) clock_gettime(0x7, &(0x7f00000000c0)) [ 88.359977] device team0 entered promiscuous mode [ 88.364984] device team_slave_0 entered promiscuous mode [ 88.370745] device team_slave_1 entered promiscuous mode [ 88.399273] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/26 08:26:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0xe, 0x7) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x684}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e23, @broadcast=0xffffffff}}, 0x100000000000000, 0x800, 0x4, 0xffff, 0x10001}, &(0x7f0000000280)=0x98) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@setlink={0x28, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8, 0x13}]}, 0x28}, 0x1}, 0x0) socketpair$inet6(0xa, 0x3, 0x7b9, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000200000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) 2018/04/26 08:26:30 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, "764017177abf5609e608f45ddc386bf3196e7c3fe2c1e3abc6c6d8b95d08b5dfe50a3da6820b43bba5fcbe2975f2df5d9ce8d9dbcfa50ad39ae0d0578bd5c069", "a492e3cf3c12516ac5f1ea650018d0fee2c7cd064be6a09e5b1594bb411790b2079c96f61d01ebd9168c16abf24211f46865dcd4c563897a50c2a297d8529caa", "6ef96758d0d082ed107b23e0301c3376f66f23adebabd3d6928d5f7155d0e4ae"}) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000780)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$read(0xb, r2, &(0x7f00000007c0)=""/244, 0x1aa) finit_module(r1, &(0x7f0000000040)='{\x00', 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07dd8aa88df543f4e8844a1d2dde3af50eddfaf232aea87d9f0d610bc6036cf5409918395b3e884a674b150031b0a6fe71b0813a5c34171cf9e7afb96de71fd5", "81d5544ff77ddd1ab96cb15c973cc51708890ab416736ecbd95a957c3cd95711c422be2df5b1e2da9dc4a8bc29321d61018f39bffc8dee3a2e9a4ae67fe9198c", "fe3f7b07120d64de9d947ed16020a9327433f12036fc4a9c3f50e1eb5fa6f631"}) recvmsg$netrom(r1, &(0x7f0000000740)={&(0x7f0000000080)=@full={{0x3, {"252d5ea259213e"}}, [{"1a20986e87767f"}, {"25187bb231bab9"}, {"cc83994ccf7957"}, {"ef381a9fdb50c9"}, {"35ff2c82097dba"}, {"7fcc530ef7ef23"}, {"7fcd4248114145"}, {"dd3afe5aace1bb"}]}, 0x48, &(0x7f00000006c0)=[{&(0x7f0000000480)="6cd9de77928f5980d57baff9423bda8ae975d478f657f46848f102fd2d5e469b4ae2d4fc6d9bfb962b390e57820741487bc30e6d81154abc773fddeaca4f740b25a74afd1449042ce42d8f40b42d1233ada0f3991e3cbcb93cf3c18d2133fcb70d075a6e343d5cffdb53903bb0ceb68f2ec77a7119bde44251ff73dbb136e679a7a67b121ec93cf13137c81834a62d81bdfedf19fad20363994472ceea3f57eacbc318d7d7c2d02f99539195dd9780fff52a7f290f36ad3456a810c30a5063b1e9e3ae544f4e664963465b82af4c8181e28cd87160117874c319e3c92b92e7578948a69f269c28b532513072c76ad460e3b461dd", 0xf4}, {&(0x7f0000000580)="34b91c1e39046dea8962401088e4b5b5c83fad6f2cad891772c78dc3538d635e19aee24cff796f2e017b08b576949ccf26517599563115efb04ded44196f292e161cde28b815d9912c00aacdb7699cb87f0b962221b8322e72d7c72a57c421505df7fd16e28578451a623d7ced8771d3b67e163e7a75de053f5e2ddbd2c7624ab8b364be4b4725e653b797a06f0e5aea2d44f6910ea560719ef2d039ed17e7547b9ee0deeec5013f614b49db986fd4ab3fe9142d1128ce3f34e509e2d359cabf7b14c392bcffff44d30e83a1908fb0a24d89a500b8639f635405d2517aae48218e13ae", 0xe3}, {&(0x7f0000000140)="b283cdb381293108579164df43db9c4cd26a4221b8aed2d48d0cc6d904670b08b2fadd46828511120337f9224b835c27783ba397a383d97f105a3531e7b9d288a860bbd22cda3a452011fcabe827398e90ec5f661c1ae3053f0c36025b51a11c5fafd0c06e186d116c7d211e395f1e7137e31bda3d42f0ae106b7af27e664303dd06e623dfb0a6a1e9537bd1", 0x8c}, {&(0x7f0000000340)}, {&(0x7f0000000680)="25c053cf03d712f5e4df653bff70193c", 0x10}], 0x5, 0x0, 0x0, 0x4010}, 0x40002040) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x0, 0x2, 0x8, 0x89, 0x8000, 0x72a3}, 0x1c) [ 88.512572] xt_connbytes: cannot load conntrack support for proto=7 [ 88.519162] xt_connbytes: Forcing CT accounting to be enabled [ 88.537241] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 88.563752] device team0 left promiscuous mode [ 88.568880] device team_slave_0 left promiscuous mode [ 88.574502] device team_slave_1 left promiscuous mode [ 88.597876] xt_connbytes: cannot load conntrack support for proto=7 2018/04/26 08:26:31 executing program 6: r0 = socket(0x10, 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='reno\x00', 0x5) sendmsg$nl_route(r0, &(0x7f0000504000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000434ff0)={&(0x7f00000000c0)=@newlink={0x7c, 0x10, 0x409, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x5c, 0x12, [@IFLA_INFO_KIND={0x58, 0x1, "73656c696e7578766d6e6574302d7b70726f63fb47504c2d73656375726974796d643573756d76626f786e6574306d696d655f7479706576626f786e6574307d47504c282c2a707070307472757374656400"}]}]}, 0xfd4b}, 0x1}, 0x0) 2018/04/26 08:26:31 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f00000001c0)={0x0, 0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000180)=[{}]}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000080)=""/223) 2018/04/26 08:26:31 executing program 3: r0 = memfd_create(&(0x7f0000000140)='dev ', 0x0) write(r0, &(0x7f0000000040)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) readv(r0, &(0x7f0000000740)=[{&(0x7f0000000180)=""/112, 0x70}, {&(0x7f0000000200)=""/231, 0xe7}, {&(0x7f0000000300)=""/179, 0xb3}, {&(0x7f00000003c0)=""/183, 0xb7}, {&(0x7f0000000480)=""/152, 0x98}, {&(0x7f0000000540)=""/200, 0xc8}, {&(0x7f0000000640)=""/165, 0xa5}, {&(0x7f0000000100)}, {&(0x7f0000000700)=""/27, 0x1b}], 0x9) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cpuset\x00', 0x0, &(0x7f0000000280)) 2018/04/26 08:26:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) r3 = getpgrp(0xffffffffffffffff) splice(r0, &(0x7f0000000140), r2, &(0x7f00000001c0), 0x6, 0x4) fcntl$setown(r2, 0x8, r3) ioctl$void(r1, 0x5451) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000100)={0x10001, 0x6, 0x20}) 2018/04/26 08:26:31 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000180)={{0x1, 0x3, 0xffff, 0x1, 0x8}, 0x7, 0x58}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @rand_addr}, {0x0, @random="87253169f6ee"}, 0xfffffffffffffffc, {0x2, 0x0, @loopback=0x7f000001}}) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockname$packet(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x14) accept4(r0, &(0x7f0000000240)=@can={0x0, 0x0}, &(0x7f00000002c0)=0x80, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) accept4$packet(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000480)=0x14, 0x80000) accept$packet(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000500)=0x14) getpeername$packet(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000700)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000740)={0x0, @rand_addr, @multicast1}, &(0x7f0000000780)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000007c0)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000900)=0xe8) recvmsg(r1, &(0x7f00000021c0)={&(0x7f0000001fc0)=@hci={0x0, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002040)=""/114, 0x72}], 0x1, &(0x7f0000002100)=""/184, 0xb8, 0xc47}, 0x40) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000002200)={'vcan0\x00', 0x0}) accept$packet(r1, &(0x7f0000002480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000024c0)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000002500)={@local, @remote, 0x0}, &(0x7f0000002540)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000002680)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000026c0)={@loopback, @local, 0x0}, &(0x7f0000002700)=0xc) accept$packet(r1, &(0x7f0000002740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000002780)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000027c0)={@local, @multicast1, 0x0}, &(0x7f0000002800)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002840)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000002940)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000002980)={0x0, @multicast2, @multicast1}, &(0x7f00000029c0)=0xc) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000002a40)={@loopback, 0x0}, &(0x7f0000002a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002ac0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002bc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000002c00)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002d00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002d40)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002e40)=0xe8) getsockname$packet(r1, &(0x7f0000002ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000002f00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002f40)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000003040)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000003a00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000039c0)={&(0x7f0000000940)=ANY=[@ANYBLOB='(\t\x00\x00', @ANYRES16=r2, @ANYBLOB="00002bbd7000ffdbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="1c02020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004002c5b000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400ff00000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000000000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="08000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000200000008000600", @ANYRES32=r8, @ANYBLOB="3800010024000100616374697665706f7274805b53d31f2444400000000000000000000000000000080003000300000008000400", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="ec00020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000000000008000600", @ANYRES32=r11, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400f7ffffff38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000180000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000800000008000100", @ANYRES32=r12, @ANYBLOB="fc0002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040003000000080007000000000008000100", @ANYRES32=r15, @ANYBLOB="0400020008000100", @ANYRES32=r16, @ANYBLOB="f001020040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB="080007000200000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000700000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000100008040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004005f5b000008000600", @ANYRES32=r19, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000400000008000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="08000100", @ANYRES32=r21, @ANYBLOB="b000020074000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000044000400020002fffe0e0000050000095f7c00009fabdc080900000000801d080500000003000703ffffffffff016d06ff0700000900007f00000000ffff7f050600000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000100000008000100", @ANYRES32=r22, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400f603000008000600", @ANYRES32=r23, @ANYBLOB="08000100", @ANYRES32=r24, @ANYBLOB="e801020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000500000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000100000008000600", @ANYRES32=r25, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e0000000800040003000000080006003cbdca95c1bdcd1816003df99839bee68beceb68dae7484e215242f199ad11cb20c0120549e6a5527028ed2e2cda71b49a8e87815e40006f444ebf22e68a8cb1a7a751e4243baab190e4f44334a7954f539ff4", @ANYRES32=r26, @ANYBLOB="54000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002400040046f00000670000000900ff000400000000000037810000000101fd00060000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r27, @ANYBLOB="64000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000003400040000100003010000000900923300000000ff03670800000000000005400800000000000208010000000500030204000000"], 0x928}, 0x1, 0x0, 0x0, 0x4001}, 0x8080) 2018/04/26 08:26:31 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, "764017177abf5609e608f45ddc386bf3196e7c3fe2c1e3abc6c6d8b95d08b5dfe50a3da6820b43bba5fcbe2975f2df5d9ce8d9dbcfa50ad39ae0d0578bd5c069", "a492e3cf3c12516ac5f1ea650018d0fee2c7cd064be6a09e5b1594bb411790b2079c96f61d01ebd9168c16abf24211f46865dcd4c563897a50c2a297d8529caa", "6ef96758d0d082ed107b23e0301c3376f66f23adebabd3d6928d5f7155d0e4ae"}) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000780)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$read(0xb, r2, &(0x7f00000007c0)=""/244, 0x1aa) finit_module(r1, &(0x7f0000000040)='{\x00', 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07dd8aa88df543f4e8844a1d2dde3af50eddfaf232aea87d9f0d610bc6036cf5409918395b3e884a674b150031b0a6fe71b0813a5c34171cf9e7afb96de71fd5", "81d5544ff77ddd1ab96cb15c973cc51708890ab416736ecbd95a957c3cd95711c422be2df5b1e2da9dc4a8bc29321d61018f39bffc8dee3a2e9a4ae67fe9198c", "fe3f7b07120d64de9d947ed16020a9327433f12036fc4a9c3f50e1eb5fa6f631"}) recvmsg$netrom(r1, &(0x7f0000000740)={&(0x7f0000000080)=@full={{0x3, {"252d5ea259213e"}}, [{"1a20986e87767f"}, {"25187bb231bab9"}, {"cc83994ccf7957"}, {"ef381a9fdb50c9"}, {"35ff2c82097dba"}, {"7fcc530ef7ef23"}, {"7fcd4248114145"}, {"dd3afe5aace1bb"}]}, 0x48, &(0x7f00000006c0)=[{&(0x7f0000000480)="6cd9de77928f5980d57baff9423bda8ae975d478f657f46848f102fd2d5e469b4ae2d4fc6d9bfb962b390e57820741487bc30e6d81154abc773fddeaca4f740b25a74afd1449042ce42d8f40b42d1233ada0f3991e3cbcb93cf3c18d2133fcb70d075a6e343d5cffdb53903bb0ceb68f2ec77a7119bde44251ff73dbb136e679a7a67b121ec93cf13137c81834a62d81bdfedf19fad20363994472ceea3f57eacbc318d7d7c2d02f99539195dd9780fff52a7f290f36ad3456a810c30a5063b1e9e3ae544f4e664963465b82af4c8181e28cd87160117874c319e3c92b92e7578948a69f269c28b532513072c76ad460e3b461dd", 0xf4}, {&(0x7f0000000580)="34b91c1e39046dea8962401088e4b5b5c83fad6f2cad891772c78dc3538d635e19aee24cff796f2e017b08b576949ccf26517599563115efb04ded44196f292e161cde28b815d9912c00aacdb7699cb87f0b962221b8322e72d7c72a57c421505df7fd16e28578451a623d7ced8771d3b67e163e7a75de053f5e2ddbd2c7624ab8b364be4b4725e653b797a06f0e5aea2d44f6910ea560719ef2d039ed17e7547b9ee0deeec5013f614b49db986fd4ab3fe9142d1128ce3f34e509e2d359cabf7b14c392bcffff44d30e83a1908fb0a24d89a500b8639f635405d2517aae48218e13ae", 0xe3}, {&(0x7f0000000140)="b283cdb381293108579164df43db9c4cd26a4221b8aed2d48d0cc6d904670b08b2fadd46828511120337f9224b835c27783ba397a383d97f105a3531e7b9d288a860bbd22cda3a452011fcabe827398e90ec5f661c1ae3053f0c36025b51a11c5fafd0c06e186d116c7d211e395f1e7137e31bda3d42f0ae106b7af27e664303dd06e623dfb0a6a1e9537bd1", 0x8c}, {&(0x7f0000000340)}, {&(0x7f0000000680)="25c053cf03d712f5e4df653bff70193c", 0x10}], 0x5, 0x0, 0x0, 0x4010}, 0x40002040) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x0, 0x2, 0x8, 0x89, 0x8000, 0x72a3}, 0x1c) 2018/04/26 08:26:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000840)=""/4096) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) [ 89.217760] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 89.234431] device team0 entered promiscuous mode [ 89.239516] device team_slave_0 entered promiscuous mode [ 89.245364] device team_slave_1 entered promiscuous mode 2018/04/26 08:26:31 executing program 6: socket$nl_crypto(0x10, 0x3, 0x15) unshare(0x40600) r0 = socket$inet6(0xa, 0x1000080005, 0x2000000000088) setsockopt$inet6_udp_int(r0, 0x11, 0x140000000000a, &(0x7f0000000040)=0x1000000020008004, 0x100000448) r1 = fcntl$dupfd(r0, 0x406, r0) sendto$ipx(r1, &(0x7f0000000080)="0a5b3bc89eff4abcb67a78994cc4de906218fb66cd269d40691d950977b860e41ee56c191cad8498836aeae38ba76367cad3b29515bb7d9a398ec006b39de5141d4d50b6c4dca23fc003f49f465fee6e24e1ae1c905d8c765cad950ad3185958b592e125bd17a5036877dea9abd8cd0f2aea5ea196306a6856a491dc729d1206f5f4b359e6a2429fec41c5776ba2b1cf8a55e901ebb3", 0x96, 0x8000, &(0x7f0000000000)={0x4, 0x3, 0x7ff, "346772db68e6", 0x1}, 0x10) 2018/04/26 08:26:31 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$getregset(0x4204, r2, 0x201, &(0x7f0000000000)={&(0x7f00000023c0)=""/4096, 0x1000}) 2018/04/26 08:26:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000001ffc)=0xe) ioctl$TCFLSH(r0, 0x541b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @loopback}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000000)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) getresuid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) setresuid(r1, r2, r3) r4 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f0000000380)=0x8001, 0x4) [ 89.345174] xt_connbytes: cannot load conntrack support for proto=7 2018/04/26 08:26:31 executing program 7: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xffffffffffffff80, 0x40000) getsockopt$inet_buf(r3, 0x0, 0x2f, &(0x7f0000000180)=""/83, &(0x7f0000000080)=0x53) signalfd4(r0, &(0x7f0000000000)={0x8000}, 0x8, 0x80800) fcntl$lock(r1, 0x26, &(0x7f0000f66000)={0x1, 0x0, 0x0, 0x0, r2}) sendmsg$nl_netfilter(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x80, 0x10, 0xa, 0x100, 0x70bd25, 0x25dfdbff, {0xa, 0x0, 0x5}, [@nested={0x68, 0x9, [@generic="654a8ce8444058118027e6682f1dd126b21bfdbbeab9ce519097048ef523393ec06cd618267263df302104e98b686cc313a9b925b98748716c035b7fb9ba2b57ad1be83bda6772abd6cc477f3f9f592a2843ca69c0cbde7b2c77821f7497939cf25aa0dc"]}, @typed={0x4, 0x6f}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000}, 0x5) 2018/04/26 08:26:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000840)=""/4096) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) r3 = getpgrp(0xffffffffffffffff) splice(r0, &(0x7f0000000140), r2, &(0x7f00000001c0), 0x6, 0x4) fcntl$setown(r2, 0x8, r3) ioctl$void(r1, 0x5451) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000100)={0x10001, 0x6, 0x20}) [ 89.473659] device team0 left promiscuous mode [ 89.478469] device team_slave_0 left promiscuous mode [ 89.483961] device team_slave_1 left promiscuous mode 2018/04/26 08:26:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:31 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$getregset(0x4204, r2, 0x201, &(0x7f0000000000)={&(0x7f00000023c0)=""/4096, 0x1000}) 2018/04/26 08:26:31 executing program 5: unshare(0x20000400) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000000c0)=0x800000008000040) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x800, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)=0x0) r3 = getpgid(r2) sched_getparam(r3, &(0x7f0000000080)) [ 89.617645] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/26 08:26:31 executing program 7: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) sendfile(r0, r0, &(0x7f0000000000), 0x43) shutdown(r1, 0x1) socket$bt_cmtp(0x1f, 0x3, 0x5) [ 89.746508] device team0 entered promiscuous mode [ 89.751654] device team_slave_0 entered promiscuous mode [ 89.757426] device team_slave_1 entered promiscuous mode [ 89.782846] xt_connbytes: cannot load conntrack support for proto=7 2018/04/26 08:26:31 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x4000000) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000a00)=@filter={'filter\x00', 0xe, 0x1, 0xa18, [0x0, 0x20000e40, 0x20000e70, 0x20000ea0], 0x0, &(0x7f0000000040), &(0x7f0000000e40)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000011000000000000000000726f736530000000000000000000000076657468315f746f5f626f6e640000006772657461703000000000000000000067726530000000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaaaa00000000000000009808000010090000580900006d61726b5f6d00000000000000000000000000000000000000000081ce000000000018000000000000000000000000000000000000000000000000020000000000007533320000000000000000000000000000000000000000000000000000000000c0070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c6700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a31000000000000000000000000000000000000000000000000000000004e46515545554500000000000000000000000000000000000000000000000000080000000000000000000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000"]}, 0xa90) [ 89.899187] device team0 left promiscuous mode [ 89.903944] device team_slave_0 left promiscuous mode [ 89.909407] device team_slave_1 left promiscuous mode 2018/04/26 08:26:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000840)=""/4096) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) r3 = getpgrp(0xffffffffffffffff) splice(r0, &(0x7f0000000140), r2, &(0x7f00000001c0), 0x6, 0x4) fcntl$setown(r2, 0x8, r3) ioctl$void(r1, 0x5451) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f0000000100)={0x10001, 0x6, 0x20}) 2018/04/26 08:26:32 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$getregset(0x4204, r2, 0x201, &(0x7f0000000000)={&(0x7f00000023c0)=""/4096, 0x1000}) 2018/04/26 08:26:32 executing program 5: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r0, &(0x7f0000000b00)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x5}, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)}, 0x20000000) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x80, &(0x7f0000000440)}, 0x20008084) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x10000, 0x0) timerfd_gettime(r1, &(0x7f0000000140)) 2018/04/26 08:26:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:32 executing program 6: sendmsg$key(0xffffffffffffffff, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x28000) ioctl$TIOCNXCL(r0, 0x540d) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) r2 = syz_open_procfs(r1, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") preadv(r2, &(0x7f00000023c0), 0x10000000000003ca, 0x0) 2018/04/26 08:26:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='io\x00') bind$alg(r0, &(0x7f0000b59fa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) connect(r0, &(0x7f0000000140)=@ethernet={0x1, @random="8be94b321208"}, 0x80) sendfile(r2, r1, &(0x7f0000000000), 0x101) getpeername$packet(r1, &(0x7f0000003ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000003b00)=0x14) sendto(r2, &(0x7f00000000c0)="7a7e251a3fbce06ed487de6ffce2ebd9562a43489abf1c210aee9d4064c9046760533ce965214c2a351c9ffe71d12bb35994f18dfdfe0cee19ca0e3b69e24ba45071", 0x42, 0x50, &(0x7f0000003b40)=@ll={0x11, 0xf6, r3, 0x1, 0xfffffffffffffffa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) 2018/04/26 08:26:32 executing program 7: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)) acct(&(0x7f0000000040)='./file0\x00') [ 90.225620] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 90.247090] device team0 entered promiscuous mode [ 90.252921] device team_slave_0 entered promiscuous mode [ 90.258693] device team_slave_1 entered promiscuous mode 2018/04/26 08:26:32 executing program 7: unshare(0x400) r0 = syz_open_dev$sndtimer(&(0x7f0000000ff1)='/dev/snd/timer\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x40485404, &(0x7f0000011f08)={{0x1}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) 2018/04/26 08:26:32 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$getregset(0x4204, r2, 0x201, &(0x7f0000000000)={&(0x7f00000023c0)=""/4096, 0x1000}) [ 90.347347] xt_connbytes: cannot load conntrack support for proto=7 2018/04/26 08:26:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt(r1, 0x20000100000114, 0xa, &(0x7f00003cbffc)="02000000", 0x4) connect$inet(r1, &(0x7f0000adf000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) read(r1, &(0x7f000083b000)=""/1, 0x1) sendmsg$alg(r1, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 2018/04/26 08:26:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) r3 = getpgrp(0xffffffffffffffff) splice(r0, &(0x7f0000000140), r2, &(0x7f00000001c0), 0x6, 0x4) fcntl$setown(r2, 0x8, r3) ioctl$void(r1, 0x5451) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40000, 0x0) 2018/04/26 08:26:32 executing program 6: sendmsg$key(0xffffffffffffffff, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[]}, 0x1}, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x28000) ioctl$TIOCNXCL(r0, 0x540d) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) r2 = syz_open_procfs(r1, &(0x7f00004c6f8b)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") preadv(r2, &(0x7f00000023c0), 0x10000000000003ca, 0x0) 2018/04/26 08:26:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) [ 90.511914] device team0 left promiscuous mode [ 90.516698] device team_slave_0 left promiscuous mode [ 90.522209] device team_slave_1 left promiscuous mode [ 90.531431] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/26 08:26:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:32 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_address={0x5, 0x8, 0x0, 0xa0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}]}, 0x98}, 0x1}, 0x0) r1 = open(&(0x7f0000000380)='./file0\x00', 0x140, 0x42) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000480)=[{{r2, r3/1000+10000}, 0xfff, 0x0, 0x3}, {{}, 0x1, 0x9, 0x100000000}, {{0x77359400}, 0x7ff, 0x51d2, 0x1}, {{0x0, 0x2710}, 0x2cc, 0x1, 0x1}, {{r4, r5/1000+30000}, 0x8000, 0x50, 0x7}, {{r6, r7/1000+10000}, 0x500000, 0x8001, 0x6}, {{0x0, 0x7530}, 0x8001, 0x179e, 0x3}], 0xa8) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0xc) ioctl$int_in(r1, 0x5473, &(0x7f0000000540)=0xffff) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r8, 0x84, 0xf, &(0x7f0000000280)={r9, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x9, 0x0, 0xffffffffffffff2a, 0x9, 0x6}, &(0x7f0000000340)=0x98) r10 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7f, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r10, 0x29, 0x32, &(0x7f0000000180)={@empty, r11}, 0x14) [ 90.721376] device team0 entered promiscuous mode [ 90.726398] device team_slave_0 entered promiscuous mode [ 90.732199] device team_slave_1 entered promiscuous mode [ 90.755779] xt_connbytes: cannot load conntrack support for proto=7 [ 90.837636] device team0 left promiscuous mode [ 90.842355] device team_slave_0 left promiscuous mode [ 90.847878] device team_slave_1 left promiscuous mode 2018/04/26 08:26:33 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) 2018/04/26 08:26:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) r3 = getpgrp(0xffffffffffffffff) splice(r0, &(0x7f0000000140), r2, &(0x7f00000001c0), 0x6, 0x4) fcntl$setown(r2, 0x8, r3) ioctl$void(r1, 0x5451) 2018/04/26 08:26:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:33 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt(r1, 0x20000100000114, 0xa, &(0x7f00003cbffc)="02000000", 0x4) connect$inet(r1, &(0x7f0000adf000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) read(r1, &(0x7f000083b000)=""/1, 0x1) sendmsg$alg(r1, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 2018/04/26 08:26:33 executing program 7: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000011c0)=0x8) 2018/04/26 08:26:33 executing program 5: r0 = socket$inet6(0xa, 0x80802, 0x80000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}, 0xe8) setsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000040)="81336be45a1934b216b5477a8be7455387c9a8b68febfe645090458b9eae429f3d1c5939461e2c528811cbf85e72a5580ee08ed0b75d0d7540655bd1e2a70860bd9d4a35bf4e7749a330f774114d354905ff8be5099956141368242b46f302be35e571de8f8b0ba31a8eee6a9ac8c38d025f3e6906a62520f965eec048561f624be5cb59078f410e3bc2216682e9c238ae2110238a512bcc68768ae7d919ce5fd4d03f4516690ccd5ffe6c39a34a267112abb513223c71cf2f4fd88d28757e4b591d5f", 0xc3) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 91.303172] device team0 entered promiscuous mode [ 91.308149] device team_slave_0 entered promiscuous mode [ 91.313903] device team_slave_1 entered promiscuous mode [ 91.335382] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/26 08:26:33 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) 2018/04/26 08:26:33 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) 2018/04/26 08:26:33 executing program 5: r0 = socket(0xa, 0x2, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x200, 0x0) clock_gettime(0x0, &(0x7f0000000080)) mq_timedreceive(r1, &(0x7f0000000300)=""/55, 0x37, 0x800, &(0x7f00000000c0)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) sendto$packet(r1, &(0x7f0000000140)="4088e01442994684adbaf0bb0144a9a250684f93dc59a30260f14b07c03e8ba567656ccf6c4ab354047791c95ac9afa75ce91cfb9df1ca439490dc6a5d52022eb7400b13ee0b37ae070778dcaf5f7ad7c5502232", 0x54, 0x4000, &(0x7f00000005c0)={0x11, 0xf7, r2, 0x1, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x100000002}, 0x1c) write$sndseq(r1, &(0x7f00000001c0)=[{0x3, 0x4, 0x5, 0x2, @tick=0x2, {0x3, 0xfffffffffffffffe}, {0xbcc, 0x3}, @raw32={[0x7fffffff, 0x3f, 0xb066]}}, {0x3, 0x11967dd3, 0x6, 0xffffffff, @time={0x0, 0x1c9c380}, {0xfff, 0x6}, {0x3f41}, @result={0x6, 0xdcf}}, {0x1, 0x6, 0x2, 0x8001, @tick=0x3, {0x2}, {0x74978518, 0x101}, @addr={0x401, 0x6}}, {0x5, 0x5, 0x9, 0xcf9, @time={0x0, 0x989680}, {0x20, 0x1}, {0x4d, 0x1}, @note={0x81, 0x7, 0x75b, 0xf13d, 0x7}}, {0x401, 0x144c, 0x1ff, 0x5, @tick, {0x1, 0xfff}, {0x401, 0x4}, @addr={0x2, 0x8}}], 0xf0) sendto$inet(r0, &(0x7f0000509f92), 0xff77, 0x0, &(0x7f000055fff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000002c0)=r1) 2018/04/26 08:26:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) r2 = getpgrp(0xffffffffffffffff) splice(r0, &(0x7f0000000140), r1, &(0x7f00000001c0), 0x6, 0x4) fcntl$setown(r1, 0x8, r2) [ 91.518453] device team0 left promiscuous mode [ 91.523193] device team_slave_0 left promiscuous mode [ 91.528670] device team_slave_1 left promiscuous mode 2018/04/26 08:26:33 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 91.562244] xt_connbytes: cannot load conntrack support for proto=7 [ 91.573512] xt_connbytes: cannot load conntrack support for proto=7 [ 91.580111] xt_connbytes: Forcing CT accounting to be enabled 2018/04/26 08:26:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) [ 91.631397] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/26 08:26:33 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) [ 91.732615] device team0 entered promiscuous mode [ 91.737655] device team_slave_0 entered promiscuous mode [ 91.743446] device team_slave_1 entered promiscuous mode 2018/04/26 08:26:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:33 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)) [ 91.968721] xt_connbytes: cannot load conntrack support for proto=7 [ 91.998404] xt_connbytes: cannot load conntrack support for proto=7 [ 91.999316] device team0 left promiscuous mode [ 92.009755] device team_slave_0 left promiscuous mode [ 92.015263] device team_slave_1 left promiscuous mode [ 92.024371] xt_connbytes: Forcing CT accounting to be enabled 2018/04/26 08:26:34 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) 2018/04/26 08:26:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) r2 = getpgrp(0xffffffffffffffff) splice(r0, &(0x7f0000000140), r1, &(0x7f00000001c0), 0x6, 0x4) fcntl$setown(r1, 0x8, r2) 2018/04/26 08:26:34 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) 2018/04/26 08:26:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:34 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt(r1, 0x20000100000114, 0xa, &(0x7f00003cbffc)="02000000", 0x4) connect$inet(r1, &(0x7f0000adf000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) read(r1, &(0x7f000083b000)=""/1, 0x1) sendmsg$alg(r1, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 2018/04/26 08:26:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) [ 92.225188] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/26 08:26:34 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) 2018/04/26 08:26:34 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:34 executing program 6: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) mmap(&(0x7f0000000000/0xfea000)=nil, 0xfea000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)) 2018/04/26 08:26:34 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) splice(r0, &(0x7f0000000140), r1, &(0x7f00000001c0), 0x6, 0x4) [ 92.578454] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/26 08:26:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt(r1, 0x20000100000114, 0xa, &(0x7f00003cbffc)="02000000", 0x4) connect$inet(r1, &(0x7f0000adf000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) read(r1, &(0x7f000083b000)=""/1, 0x1) sendmsg$alg(r1, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 2018/04/26 08:26:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:35 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) splice(r0, &(0x7f0000000140), r1, &(0x7f00000001c0), 0x6, 0x4) 2018/04/26 08:26:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000d09fe9)='smaps\x00') mmap(&(0x7f000085a000/0x3000)=nil, 0x3000, 0x0, 0x80000000004d031, r0, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x8, 0x100000) 2018/04/26 08:26:35 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) 2018/04/26 08:26:35 executing program 4: inotify_init1(0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:35 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) [ 93.061382] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/26 08:26:35 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:35 executing program 4: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:35 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r0, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:35 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)) 2018/04/26 08:26:35 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) [ 93.368519] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/26 08:26:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:35 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x80) ioctl$void(r0, 0xc0045c77) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$sock_netrom_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'ip6tnl0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}}) syz_open_pts(r0, 0x1) [ 93.563760] connbytes_mt_check: 5 callbacks suppressed [ 93.563829] xt_connbytes: cannot load conntrack support for proto=7 [ 93.634488] xt_connbytes: cannot load conntrack support for proto=7 2018/04/26 08:26:35 executing program 4: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) 2018/04/26 08:26:35 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r0, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:35 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) 2018/04/26 08:26:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) 2018/04/26 08:26:35 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="8500000008000000570000000000ffffffff000000000000fec4bf6027d53bd3c87ea3c7c767c87075281b0a749290e7dfdde023b99bc78b88710a282d15ab677b7460"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) r1 = syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'bpq0\x00\x00\x00\x00\x00\x00\x00 \x00', 0x2}) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)=r0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000040)=r0) 2018/04/26 08:26:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x14) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xc8b, 0x40000) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000001240)={0x1, &(0x7f0000000100)=""/247, &(0x7f0000001200)=[{0x7fff, 0x1000, 0x4c44, &(0x7f0000000200)=""/4096}]}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x1c7480) readv(r2, &(0x7f00001aa000)=[{&(0x7f00006aaf01)=""/255, 0xff}], 0x1) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0xde1d, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) connect$ax25(r3, &(0x7f0000000080)={0x3, {"71c8e5b2307683"}, 0xfffffffffffff000}, 0x10) 2018/04/26 08:26:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt(r1, 0x20000100000114, 0xa, &(0x7f00003cbffc)="02000000", 0x4) connect$inet(r1, &(0x7f0000adf000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) read(r1, &(0x7f000083b000)=""/1, 0x1) 2018/04/26 08:26:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) [ 93.999022] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/26 08:26:36 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r0, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:36 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e21, @broadcast=0xffffffff}}) 2018/04/26 08:26:36 executing program 4: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) 2018/04/26 08:26:36 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="6664001f66d0") execveat(r0, &(0x7f0000018ff8)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000018fed)="2d1fe7f7ff5076696e6574306e"], &(0x7f00000c7000), 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r1, 0x4) 2018/04/26 08:26:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:36 executing program 5: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) sendto$llc(r0, &(0x7f0000000100)="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", 0x1000, 0x1, 0x0, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x1) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x4001}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'ifb0\x00', 0xa1fd}) write$tun(r2, &(0x7f0000000000)={@pi, @hdr={0x0, 0x83}, @arp=@generic={0x0, 0x0, 0x6, 0x0, 0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, "", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], "15d848a3e239ba4703d65f73d98be8ff"}}, 0x32) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7) syz_open_dev$tun(&(0x7f0000001100)='/dev/net/tun\x00', 0x0, 0x80000) 2018/04/26 08:26:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) 2018/04/26 08:26:36 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) [ 94.328395] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 94.404419] device ifb0 entered promiscuous mode 2018/04/26 08:26:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt(r1, 0x20000100000114, 0xa, &(0x7f00003cbffc)="02000000", 0x4) connect$inet(r1, &(0x7f0000adf000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) read(r1, &(0x7f000083b000)=""/1, 0x1) 2018/04/26 08:26:36 executing program 7: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:36 executing program 6: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) 2018/04/26 08:26:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) 2018/04/26 08:26:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:36 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:36 executing program 4: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) 2018/04/26 08:26:36 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket(0x10, 0x80002, 0x0) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x25dfdbfb}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt(r2, 0x10e, 0xf, &(0x7f0000f67000)="9adc01ce", 0x4) write(r2, &(0x7f0000000080)="2200000018000700f40700000900071502040008dd200828060009040005009f004b", 0x22) write(r1, &(0x7f00000001c0)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x4000, 0x0) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/154) connect$netlink(r1, &(0x7f0000000100)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000200)=""/159, &(0x7f0000000000)=0x9f) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'ip6tnl0\x00', {0x2, 0x4e22, @broadcast=0xffffffff}}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x20, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="52c202b6f80b6de474e5c4c5dc4727e5710eb9b0e7b0dbe5fa5457726dfdced29910f273313e065d8833a9bc543f71b26d8c0c3ccdde60f0cd66f9fed9086267d26fd5eed87bebf96704eb73f748dac9bc1bbe0cd5f386c186c19479b2e3f799bd09ce9325a31700df5750376c081305c863d0", 0x73, 0xffff}], 0x10080a0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6fe4ba65126f7bf48365620346f13f4cdf75ca74b577445b1c5d1ba3c6353d37c3672c8dd3a8fee97a5ea975d1b1ff07f24019269a6175746f6465667261672c0054a4c94ca6dff6f32f5d435d48ce7582a84292747adf26eb1584c0fbdae6ce7757f4aebc63371e25834c037b81951b9b63a006071703efb6157a"]) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000640)=0x0) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000680)=r4) sendto(r1, &(0x7f0000cfefee), 0x321, 0xfffffffffffffffe, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x5, @loopback={0x0, 0x1}, 0x1000}, @in6={0xa, 0x4e23, 0x7fffffff, @empty, 0xffffffffffff0000}, @in6={0xa, 0x4e20, 0x2, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0xffffffff}, @in6={0xa, 0x4e21, 0x2, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e23, @rand_addr=0x7f}, @in6={0xa, 0x4e23, 0x63a4, @ipv4={[], [0xff, 0xff]}}, @in6={0xa, 0x4e20, 0xfffffffffffffff7, @mcast1={0xff, 0x1, [], 0x1}, 0x80000001}, @in6={0xa, 0x4e20, 0x3, @ipv4={[], [0xff, 0xff]}, 0x56d6}, @in={0x2, 0x4e20, @rand_addr=0x1}], 0xe4) recvmsg$netrom(r0, &(0x7f0000000180)={&(0x7f0000000080)=@ax25={0x3, {"05345a752f8e3c"}}, 0x10, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x20000001}, 0x2) ioctl$int_out(r1, 0x5460, &(0x7f0000000340)) [ 94.904189] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/26 08:26:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:36 executing program 7: inotify_init1(0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:37 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:37 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:37 executing program 4: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) 2018/04/26 08:26:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) getpgrp(0xffffffffffffffff) [ 95.113375] kernel msg: ebtables bug: please report to author: bad policy [ 95.223413] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/26 08:26:37 executing program 7: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:37 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:37 executing program 4 (fault-call:0 fault-nth:0): syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:37 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket(0x10, 0x80002, 0x0) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x25dfdbfb}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt(r2, 0x10e, 0xf, &(0x7f0000f67000)="9adc01ce", 0x4) write(r2, &(0x7f0000000080)="2200000018000700f40700000900071502040008dd200828060009040005009f004b", 0x22) write(r1, &(0x7f00000001c0)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x4000, 0x0) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000580)=""/154) connect$netlink(r1, &(0x7f0000000100)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000200)=""/159, &(0x7f0000000000)=0x9f) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000380)={'ip6tnl0\x00', {0x2, 0x4e22, @broadcast=0xffffffff}}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x20, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="52c202b6f80b6de474e5c4c5dc4727e5710eb9b0e7b0dbe5fa5457726dfdced29910f273313e065d8833a9bc543f71b26d8c0c3ccdde60f0cd66f9fed9086267d26fd5eed87bebf96704eb73f748dac9bc1bbe0cd5f386c186c19479b2e3f799bd09ce9325a31700df5750376c081305c863d0", 0x73, 0xffff}], 0x10080a0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e6fe4ba65126f7bf48365620346f13f4cdf75ca74b577445b1c5d1ba3c6353d37c3672c8dd3a8fee97a5ea975d1b1ff07f24019269a6175746f6465667261672c0054a4c94ca6dff6f32f5d435d48ce7582a84292747adf26eb1584c0fbdae6ce7757f4aebc63371e25834c037b81951b9b63a006071703efb6157a"]) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000640)=0x0) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000680)=r4) sendto(r1, &(0x7f0000cfefee), 0x321, 0xfffffffffffffffe, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x5, @loopback={0x0, 0x1}, 0x1000}, @in6={0xa, 0x4e23, 0x7fffffff, @empty, 0xffffffffffff0000}, @in6={0xa, 0x4e20, 0x2, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0xffffffff}, @in6={0xa, 0x4e21, 0x2, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, @in={0x2, 0x4e23, @rand_addr=0x7f}, @in6={0xa, 0x4e23, 0x63a4, @ipv4={[], [0xff, 0xff]}}, @in6={0xa, 0x4e20, 0xfffffffffffffff7, @mcast1={0xff, 0x1, [], 0x1}, 0x80000001}, @in6={0xa, 0x4e20, 0x3, @ipv4={[], [0xff, 0xff]}, 0x56d6}, @in={0x2, 0x4e20, @rand_addr=0x1}], 0xe4) recvmsg$netrom(r0, &(0x7f0000000180)={&(0x7f0000000080)=@ax25={0x3, {"05345a752f8e3c"}}, 0x10, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x20000001}, 0x2) ioctl$int_out(r1, 0x5460, &(0x7f0000000340)) 2018/04/26 08:26:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt(r1, 0x20000100000114, 0xa, &(0x7f00003cbffc)="02000000", 0x4) connect$inet(r1, &(0x7f0000adf000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) read(r1, &(0x7f000083b000)=""/1, 0x1) [ 95.899171] FAULT_INJECTION: forcing a failure. [ 95.899171] name failslab, interval 1, probability 0, space 0, times 1 [ 95.903847] kernel msg: ebtables bug: please report to author: bad policy [ 95.910626] CPU: 0 PID: 7209 Comm: syz-executor4 Not tainted 4.16.0+ #87 [ 95.924363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.933749] Call Trace: [ 95.936391] dump_stack+0x185/0x1d0 [ 95.940075] should_fail+0x87b/0xab0 [ 95.943896] should_failslab+0x279/0x2a0 2018/04/26 08:26:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) getpgrp(0xffffffffffffffff) [ 95.948024] kmem_cache_alloc+0x136/0xb90 [ 95.952224] ? getname_flags+0x12a/0xaa0 [ 95.956370] getname_flags+0x12a/0xaa0 [ 95.960319] ? SYSC_open+0xab/0xc0 [ 95.963902] getname+0x55/0x60 [ 95.967198] do_sys_open+0x52a/0x960 [ 95.970980] SYSC_open+0xab/0xc0 [ 95.974434] SyS_open+0x54/0x80 [ 95.977796] do_syscall_64+0x309/0x430 [ 95.981737] ? do_sys_open+0x960/0x960 [ 95.985667] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 95.990878] RIP: 0033:0x40f5e1 2018/04/26 08:26:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) [ 95.994091] RSP: 002b:00007fb91e8a17a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 96.001850] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040f5e1 [ 96.009175] RDX: 0000000000000000 RSI: 00000000d0065b12 RDI: 00007fb91e8a1850 [ 96.016483] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 96.023792] R10: 0000000020000040 R11: 0000000000000293 R12: 0000000000000013 [ 96.031093] R13: 000000000000068f R14: 00000000006fce08 R15: 0000000000000000 2018/04/26 08:26:38 executing program 7: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) [ 96.136261] device team0 entered promiscuous mode [ 96.141373] device team_slave_0 entered promiscuous mode [ 96.147211] device team_slave_1 entered promiscuous mode [ 96.153339] kernel msg: ebtables bug: please report to author: bad policy 2018/04/26 08:26:38 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:38 executing program 4 (fault-call:0 fault-nth:1): syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) [ 96.347964] nla_parse: 2 callbacks suppressed [ 96.347981] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 96.366371] device team0 left promiscuous mode [ 96.371255] device team_slave_0 left promiscuous mode [ 96.376746] device team_slave_1 left promiscuous mode [ 96.432957] kernel msg: ebtables bug: please report to author: bad policy [ 96.517649] FAULT_INJECTION: forcing a failure. [ 96.517649] name failslab, interval 1, probability 0, space 0, times 0 [ 96.529145] CPU: 0 PID: 7246 Comm: syz-executor4 Not tainted 4.16.0+ #87 [ 96.536017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.545405] Call Trace: [ 96.548048] dump_stack+0x185/0x1d0 [ 96.551728] should_fail+0x87b/0xab0 [ 96.555497] should_failslab+0x279/0x2a0 [ 96.559660] kmem_cache_alloc+0x136/0xb90 [ 96.563900] ? get_empty_filp+0x1f1/0x870 [ 96.568104] ? __msan_poison_alloca+0x15c/0x1d0 [ 96.572927] get_empty_filp+0x1f1/0x870 [ 96.576953] ? do_filp_open+0x261/0x640 [ 96.581232] path_openat+0x156/0x6610 [ 96.585255] ? kmsan_set_origin_inline+0x6b/0x120 [ 96.590199] ? kmsan_set_origin_inline+0x6b/0x120 [ 96.595139] ? __msan_poison_alloca+0x15c/0x1d0 [ 96.599866] ? __alloc_fd+0x480/0xb90 [ 96.603765] ? expand_files+0x5b/0xde0 [ 96.607745] ? __msan_poison_alloca+0x15c/0x1d0 [ 96.612462] ? do_sys_open+0x624/0x960 [ 96.616427] ? do_filp_open+0x69/0x640 [ 96.620334] do_filp_open+0x261/0x640 [ 96.624196] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 96.629717] ? __alloc_fd+0x9f0/0xb90 [ 96.633619] do_sys_open+0x624/0x960 [ 96.637384] SYSC_open+0xab/0xc0 [ 96.640842] SyS_open+0x54/0x80 [ 96.644197] do_syscall_64+0x309/0x430 [ 96.648114] ? do_sys_open+0x960/0x960 [ 96.652036] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 96.657235] RIP: 0033:0x40f5e1 [ 96.660432] RSP: 002b:00007fb91e8a17a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 96.668164] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040f5e1 [ 96.675461] RDX: 0000000000000000 RSI: 00000000d0065b12 RDI: 00007fb91e8a1850 [ 96.682758] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 96.690057] R10: 0000000020000040 R11: 0000000000000293 R12: 0000000000000013 [ 96.697346] R13: 000000000000068f R14: 00000000006fce08 R15: 0000000000000001 2018/04/26 08:26:38 executing program 7: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) 2018/04/26 08:26:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:38 executing program 6: inotify_init1(0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt(r1, 0x20000100000114, 0xa, &(0x7f00003cbffc)="02000000", 0x4) read(r1, &(0x7f000083b000)=""/1, 0x1) sendmsg$alg(r1, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 2018/04/26 08:26:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:38 executing program 4 (fault-call:0 fault-nth:2): syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) [ 96.981157] FAULT_INJECTION: forcing a failure. [ 96.981157] name failslab, interval 1, probability 0, space 0, times 0 [ 96.992560] CPU: 0 PID: 7256 Comm: syz-executor4 Not tainted 4.16.0+ #87 [ 96.999433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.004221] device team0 entered promiscuous mode [ 97.008818] Call Trace: [ 97.008869] dump_stack+0x185/0x1d0 [ 97.008908] should_fail+0x87b/0xab0 [ 97.008952] should_failslab+0x279/0x2a0 [ 97.008987] __kmalloc+0xc2/0x350 [ 97.009070] ? mousedev_open+0xa7/0x950 [ 97.013911] device team_slave_0 entered promiscuous mode [ 97.016482] mousedev_open+0xa7/0x950 [ 97.016529] ? __msan_poison_alloca+0x15c/0x1d0 [ 97.016572] ? do_dentry_open+0xcc6/0x1430 [ 97.020415] device team_slave_1 entered promiscuous mode [ 97.023889] ? kobject_get+0x28/0x1b0 [ 97.023930] ? mousedev_poll+0x2b0/0x2b0 [ 97.023973] chrdev_open+0xc20/0xd90 [ 97.070649] ? cd_forget+0x330/0x330 [ 97.072242] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 97.074407] do_dentry_open+0xcc6/0x1430 [ 97.074454] vfs_open+0x1b7/0x2e0 [ 97.074494] path_openat+0x481d/0x6610 [ 97.074576] ? __msan_poison_alloca+0x15c/0x1d0 [ 97.074617] ? __alloc_fd+0x480/0xb90 [ 97.102912] ? do_sys_open+0x624/0x960 [ 97.106855] do_filp_open+0x261/0x640 [ 97.110729] do_sys_open+0x624/0x960 [ 97.114504] SYSC_open+0xab/0xc0 [ 97.117969] SyS_open+0x54/0x80 [ 97.121351] do_syscall_64+0x309/0x430 [ 97.125294] ? do_sys_open+0x960/0x960 [ 97.129224] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 97.134437] RIP: 0033:0x40f5e1 [ 97.137647] RSP: 002b:00007fb91e8a17a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 97.145395] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040f5e1 [ 97.152702] RDX: 0000000000000000 RSI: 00000000d0065b12 RDI: 00007fb91e8a1850 [ 97.160000] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 97.165754] device team0 left promiscuous mode [ 97.167292] R10: 0000000020000040 R11: 0000000000000293 R12: 0000000000000013 2018/04/26 08:26:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:39 executing program 7: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) [ 97.167310] R13: 000000000000068f R14: 00000000006fce08 R15: 0000000000000002 [ 97.187081] device team_slave_0 left promiscuous mode [ 97.192556] device team_slave_1 left promiscuous mode [ 97.205719] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 97.215229] kernel msg: ebtables bug: please report to author: bad policy 2018/04/26 08:26:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) [ 97.306364] device team0 entered promiscuous mode [ 97.311451] device team_slave_0 entered promiscuous mode [ 97.317290] device team_slave_1 entered promiscuous mode 2018/04/26 08:26:39 executing program 7 (fault-call:0 fault-nth:0): syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:39 executing program 6: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:39 executing program 4 (fault-call:0 fault-nth:3): syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) [ 97.396720] kernel msg: ebtables bug: please report to author: bad policy 2018/04/26 08:26:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x40, 0x0, 0x0, 0xfffffffffffffffe}, {0x6}]}, 0x10) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x3, 0x40) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000001c0)={r2, 0x7, 0xb1, "2f24999dd63e3daa7f7d104f94ff0131045013b64f0c346c37b0a6205dabaf8dae046adfe973475db223b30d1c41c7c23ae77ce6d63baf980bb692a295908a2612bf95606696877d830b6afe345dfafb176daa3fd770899423600d23b1e73327af63c4db839438098d2127e8629d3e807a2b5f748036bc2764297df54e5485046a4ba78e3560030329374928f19162971407bad22ea9ba5d51a5da03bb2c085e24fbd75f5fa102965f2c80b3daae94c300"}, 0xb9) syz_emit_ethernet(0x16, &(0x7f0000000080)={@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@llc={0x4, {@snap={0x0, 0x0, '\n', "12e185"}}}}}, &(0x7f0000000140)) [ 97.500720] FAULT_INJECTION: forcing a failure. [ 97.500720] name failslab, interval 1, probability 0, space 0, times 0 [ 97.503253] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 97.512287] CPU: 0 PID: 7294 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 97.527388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.536776] Call Trace: [ 97.539421] dump_stack+0x185/0x1d0 [ 97.543100] should_fail+0x87b/0xab0 [ 97.546924] should_failslab+0x279/0x2a0 [ 97.551046] kmem_cache_alloc+0x136/0xb90 [ 97.555243] ? getname_flags+0x12a/0xaa0 [ 97.559088] device team0 left promiscuous mode [ 97.559375] getname_flags+0x12a/0xaa0 [ 97.564043] device team_slave_0 left promiscuous mode [ 97.568068] ? SYSC_open+0xab/0xc0 [ 97.568093] getname+0x55/0x60 [ 97.568175] do_sys_open+0x52a/0x960 [ 97.568217] SYSC_open+0xab/0xc0 [ 97.568277] SyS_open+0x54/0x80 [ 97.568338] do_syscall_64+0x309/0x430 [ 97.568377] ? do_sys_open+0x960/0x960 [ 97.568411] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 97.568433] RIP: 0033:0x40f5e1 [ 97.568447] RSP: 002b:00007f64c3e907a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 97.568474] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040f5e1 [ 97.568489] RDX: 0000000000000000 RSI: 00000000d0065b12 RDI: 00007f64c3e90850 [ 97.568503] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 97.568517] R10: 0000000020000040 R11: 0000000000000293 R12: 0000000000000013 [ 97.568530] R13: 000000000000068f R14: 00000000006fce08 R15: 0000000000000000 [ 97.652663] device team_slave_1 left promiscuous mode 2018/04/26 08:26:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:39 executing program 6: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) 2018/04/26 08:26:39 executing program 7 (fault-call:0 fault-nth:1): syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:39 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x50000, 0x8) dup2(r0, r1) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400000) 2018/04/26 08:26:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt(r1, 0x20000100000114, 0xa, &(0x7f00003cbffc)="02000000", 0x4) read(r1, &(0x7f000083b000)=""/1, 0x1) sendmsg$alg(r1, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 2018/04/26 08:26:39 executing program 0: write(0xffffffffffffffff, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000004c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffff}, 0x111}}, 0x20) write$rdma_cm(r0, &(0x7f0000000500)=@join_ip_mcast={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x0, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, r2}}, 0x38) [ 97.937932] kernel msg: ebtables bug: please report to author: Wrong len argument [ 97.953206] FAULT_INJECTION: forcing a failure. [ 97.953206] name failslab, interval 1, probability 0, space 0, times 0 [ 97.964627] CPU: 1 PID: 7323 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 97.971504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.981064] Call Trace: [ 97.983712] dump_stack+0x185/0x1d0 [ 97.987558] should_fail+0x87b/0xab0 [ 97.991323] should_failslab+0x279/0x2a0 [ 97.995480] kmem_cache_alloc+0x136/0xb90 [ 97.999716] ? get_empty_filp+0x1f1/0x870 [ 98.003908] ? __msan_poison_alloca+0x15c/0x1d0 [ 98.008623] get_empty_filp+0x1f1/0x870 [ 98.012726] ? do_filp_open+0x261/0x640 [ 98.016738] path_openat+0x156/0x6610 [ 98.020577] ? kmsan_set_origin_inline+0x6b/0x120 [ 98.025498] ? kmsan_set_origin_inline+0x6b/0x120 [ 98.027698] device team0 entered promiscuous mode 2018/04/26 08:26:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) [ 98.030413] ? __msan_poison_alloca+0x15c/0x1d0 [ 98.030448] ? __alloc_fd+0x480/0xb90 [ 98.030501] ? expand_files+0x5b/0xde0 [ 98.030568] ? __msan_poison_alloca+0x15c/0x1d0 [ 98.035430] device team_slave_0 entered promiscuous mode [ 98.040050] ? do_sys_open+0x624/0x960 [ 98.040112] ? do_filp_open+0x69/0x640 [ 98.040148] do_filp_open+0x261/0x640 [ 98.044224] device team_slave_1 entered promiscuous mode [ 98.047873] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 98.047942] ? __alloc_fd+0x9f0/0xb90 [ 98.084398] do_sys_open+0x624/0x960 2018/04/26 08:26:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000000)=0xe8) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) recvfrom(r1, &(0x7f0000000180)=""/126, 0x7e, 0x20, 0x0, 0x0) [ 98.088203] ? mmdrop+0x3f/0xd0 [ 98.091519] ? finish_task_switch+0xfe/0x230 [ 98.095981] SYSC_open+0xab/0xc0 [ 98.099437] SyS_open+0x54/0x80 [ 98.102811] do_syscall_64+0x309/0x430 [ 98.106749] ? do_sys_open+0x960/0x960 [ 98.110685] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 98.115903] RIP: 0033:0x40f5e1 [ 98.119114] RSP: 002b:00007f64c3e907a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 98.119166] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/04/26 08:26:40 executing program 6: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) [ 98.126855] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040f5e1 [ 98.126874] RDX: 0000000000000000 RSI: 00000000d0065b12 RDI: 00007f64c3e90850 [ 98.126893] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 98.126910] R10: 0000000020000040 R11: 0000000000000293 R12: 0000000000000013 [ 98.126930] R13: 000000000000068f R14: 00000000006fce08 R15: 0000000000000001 2018/04/26 08:26:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:40 executing program 5: socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x3, 0x0) recvfrom(r0, &(0x7f0000000040)=""/72, 0x48, 0x20, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x3, 0x2, 0x3, {0xa, 0x4e24, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0x500000000000}}}, 0x80) syz_open_procfs(0x0, &(0x7f0000000900)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660a6763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb05") mkdir(&(0x7f00000001c0)='./file0\x00', 0x100000000000000) mount(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='efivarfs\x00', 0x21, &(0x7f00000004c0)="c80914370258a473522a89ed6b9fa0aad3f2591ebe184717d9efe3878e78ea583df13d0fc07c602cd63d0b875e145294aabe5aed6322d4a820aee76ee67a318ba4d75a4d894a28a4975fec4e9f4041a9a30f6de42f0a7963bddfcc4399103b24d3ae1585bb74b3644a3e2265d24397d02391992c6db10fe2269a80fffd0d16968e1d75b6cedc83dae48b7d481f3be0279a85b28288043e8f6f057f8ba2961bf41f6e0f3ea36816dacf9a8042ddb467deb1cc01da0499d18114d5a735125962905cfec124d0266a69cbf946d512f5390f0286b69b3767cccf078267bf") mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000000480)='./file0\x00', &(0x7f0000000980)="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", 0x5, &(0x7f0000000200)="056fdd8da7df4a0d78366fce576630d308d32b13ea85d4b27be8f2683b52b1c80203ff23925d949a0b7732b88eb98d4a0407b79bfd6e655dc804d79b39b886e9d05072716de51f516f4820ecb2041827d267fd8367e313384cf9b3d2cce8e7b9a458a9167a478453a643945898d54bcb25925ffc0e021bf180e2b22037bc6759202ed424abd9f1a1fb920199a948c19222a669f8d4442f64d1e46461ae9f47dc94360cd94f6d7246d56938f37aaced") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) [ 98.267615] device team0 left promiscuous mode [ 98.273484] device team_slave_0 left promiscuous mode [ 98.278978] device team_slave_1 left promiscuous mode 2018/04/26 08:26:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt(r1, 0x20000100000114, 0xa, &(0x7f00003cbffc)="02000000", 0x4) read(r1, &(0x7f000083b000)=""/1, 0x1) sendmsg$alg(r1, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 2018/04/26 08:26:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:40 executing program 7 (fault-call:0 fault-nth:2): syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:40 executing program 4: socket$inet_smc(0x2b, 0x1, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000400)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000380)={0x17c5, {0x2, 0x4e24, @multicast1=0xe0000001}, {0x2, 0x4e20, @multicast2=0xe0000002}, {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x1, 0x48c3d622, 0x8, 0x7385, 0x0, &(0x7f0000000340)='dummy0\x00', 0x0, 0x9, 0x5}) sendmmsg$unix(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000000180)="92f18df478adb0a2043404486c29b37e73267f53c2ced8b94ea791b305b7b099c64a519784718fce5970026e7979c00ca589ee607b68d99b330fa9aaa3b03cc7a68baf0867ac44eef1e05852bee47e76aef598e80d76b08cd9c4e689620f7bba574b99389a29231ebf2ab3534fd92316b39bf253216d6ba1450b6d9379d9db3097be3cda3878ad3499654becf323f39f393c4100bafc984c19781fae697fdca69976397745a837cf4f21746bccf1b90513f99f2a1d8860de3d95ebc4876ed37aacf7c0951ca427d100e075f0eed42dbdb9c6d905a76466e6c10a3d0a11cd4c0b4fdc6efd438c65c3394e90f2b538", 0xee}], 0x1, 0x0, 0x0, 0x8000}], 0x1, 0x80) pipe2(&(0x7f0000000000), 0x80000) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_inet_SIOCRTMSG(r3, 0x890d, &(0x7f0000000480)={0x100, {0x2, 0x4e21, @rand_addr=0x7a}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1a}}, {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8, 0xfff, 0x100000001, 0x3, 0x7, &(0x7f0000000440)='ifb0\x00', 0x2, 0xffff, 0x8}) 2018/04/26 08:26:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000300), &(0x7f0000000340)=0xb) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4), 0xfffffffffffffec8) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400001, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffc, 0xc0000) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x10, r2, 0x23) sendto$inet(r2, &(0x7f0000000100)="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", 0x200, 0x0, &(0x7f00006e2000)={0x2, 0x4e26, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000bd6f60)={0x0, @in={{0x2, 0x4e23, @loopback=0x7f000001}}}, &(0x7f0000f67000)=0xe0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={r3}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0x50, &(0x7f0000000380)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)=r4, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='\x00') setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000480)={0x1d2, 0x53e2c453, 0x1, 0x1f, 0x3, 0x40, 0x3, 0xffffffff7fffffff, 0xe4, 0x4, 0x5}, 0xb) 2018/04/26 08:26:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:40 executing program 6: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) [ 99.022271] device team0 entered promiscuous mode [ 99.022315] FAULT_INJECTION: forcing a failure. [ 99.022315] name failslab, interval 1, probability 0, space 0, times 0 [ 99.027304] device team_slave_0 entered promiscuous mode [ 99.038507] CPU: 1 PID: 7379 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 99.038535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.044256] device team_slave_1 entered promiscuous mode [ 99.050811] Call Trace: [ 99.050856] dump_stack+0x185/0x1d0 [ 99.050897] should_fail+0x87b/0xab0 [ 99.050943] should_failslab+0x279/0x2a0 [ 99.066826] kernel msg: ebtables bug: please report to author: Wrong len argument [ 99.068336] __kmalloc+0xc2/0x350 [ 99.068427] ? mousedev_open+0xa7/0x950 [ 99.068459] mousedev_open+0xa7/0x950 [ 99.068504] ? __msan_poison_alloca+0x15c/0x1d0 [ 99.103412] ? do_dentry_open+0xcc6/0x1430 [ 99.107695] ? kobject_get+0x28/0x1b0 [ 99.111539] ? mousedev_poll+0x2b0/0x2b0 [ 99.115645] chrdev_open+0xc20/0xd90 [ 99.119407] ? cd_forget+0x330/0x330 [ 99.123159] do_dentry_open+0xcc6/0x1430 [ 99.127267] vfs_open+0x1b7/0x2e0 [ 99.130755] path_openat+0x481d/0x6610 [ 99.134741] ? __msan_poison_alloca+0x15c/0x1d0 [ 99.139447] ? __alloc_fd+0x480/0xb90 [ 99.143334] ? do_sys_open+0x624/0x960 [ 99.147257] do_filp_open+0x261/0x640 [ 99.151171] do_sys_open+0x624/0x960 [ 99.154933] SYSC_open+0xab/0xc0 [ 99.158382] SyS_open+0x54/0x80 [ 99.161743] do_syscall_64+0x309/0x430 [ 99.165680] ? do_sys_open+0x960/0x960 2018/04/26 08:26:41 executing program 5: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') write$eventfd(r0, &(0x7f0000000040)=0x2, 0x8) 2018/04/26 08:26:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) [ 99.169608] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 99.174828] RIP: 0033:0x40f5e1 [ 99.178036] RSP: 002b:00007f64c3e907a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 99.185779] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040f5e1 [ 99.193075] RDX: 0000000000000000 RSI: 00000000d0065b12 RDI: 00007f64c3e90850 [ 99.200372] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 99.207673] R10: 0000000020000040 R11: 0000000000000293 R12: 0000000000000013 [ 99.214965] R13: 000000000000068f R14: 00000000006fce08 R15: 0000000000000002 [ 99.225620] random: crng init done 2018/04/26 08:26:41 executing program 6 (fault-call:0 fault-nth:0): syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) [ 99.324116] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 99.358030] FAULT_INJECTION: forcing a failure. [ 99.358030] name failslab, interval 1, probability 0, space 0, times 0 [ 99.369500] CPU: 1 PID: 7399 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 99.376370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.385744] Call Trace: [ 99.388375] dump_stack+0x185/0x1d0 [ 99.392051] should_fail+0x87b/0xab0 [ 99.395860] should_failslab+0x279/0x2a0 [ 99.399980] kmem_cache_alloc+0x136/0xb90 [ 99.404172] ? getname_flags+0x12a/0xaa0 [ 99.408315] getname_flags+0x12a/0xaa0 [ 99.412249] ? SYSC_open+0xab/0xc0 [ 99.415828] getname+0x55/0x60 [ 99.419111] do_sys_open+0x52a/0x960 [ 99.420405] device team0 left promiscuous mode [ 99.422889] SYSC_open+0xab/0xc0 [ 99.422964] SyS_open+0x54/0x80 [ 99.423039] do_syscall_64+0x309/0x430 [ 99.427622] device team_slave_0 left promiscuous mode [ 99.430975] ? do_sys_open+0x960/0x960 [ 99.431013] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 99.431043] RIP: 0033:0x40f5e1 [ 99.434531] device team_slave_1 left promiscuous mode [ 99.438176] RSP: 002b:00007fac4606e7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 2018/04/26 08:26:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(0xffffffffffffffff, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad06ffef", 0x1f) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:41 executing program 5: r0 = epoll_create1(0x80002) r1 = epoll_create1(0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000340)={0x0, 0x5}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000003c0)={r3, 0x6}, &(0x7f0000000400)=0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000900)={0x10000010}) vmsplice(r2, &(0x7f0000000840)=[{&(0x7f0000000000)="b565deca23d610479b5aabc8fa1d5a047b007b1710e650e35168d291bbded897c1e8b912b9981b8e450aa52972ea494fe0c62ac6beefd1cc23798c59cc5e998f6ee0be85ca586eaed7da099b5dc368921a497e553bfd4791c73c192b5a4e2e0119b64ae066d81306a396ed41ae82c7de9306d46c8d3a7e12178d2b0a81a457080fd4b989015be9a98f763c9897ba6fa43e41cb595022a814aedd14ce410c579f0c8bbeefe4545aadfe6e9b8543bea49564e3fa9d8fc843bd413a41b254ec32a620771c085c69", 0xc6}, {&(0x7f0000000100)="5352adf680536dfa9b176ad10e8f03de291b4940e7c7d790dab05e742145fc9dfd6de42e87885ee4eab419a04ea9ef897fb759e7853e818378823bddc3b431a0ccba64a6b47c68ed84b4f0dbd6bc42a9ca9555299689e32f11647020dcfce1539170d34105543cb03c0bc0daada401463b837383c635c9851580094b93e713f406e38707a2d156eab951fd9334e5ecb8feeb", 0x92}, {&(0x7f00000001c0)="a20cdf89b7372fa8530e4fb89081366e9aa37582c09d6987cf9e59ddedbc0ff6386842bc2f94631b9b5e5bc1cc39c2c84da2986a8bc8879d32bab4bc495466bbc67016bf2c14ceea781d031b4fff67a548dae9e6a571f48da7e8c3ba169f06ec88ce4ea5b80c98be6b47a408836f9ccc25693b", 0x73}, {&(0x7f0000000240)="a7f884deb631a0b0723d52233afce046ef9f156f9af2e913a9cea0dd2f3f382f802e56d142223831d7939ca523658e371b5cf7bc0601886c5549761e5937ebbcd9a49b71f3a566f292d09135bdf5110e3c03f63cfa6afa2dc4b8f533d7e3eb59f9824b030ba4ad067459f90da8ea146130d82050d8475cd39fe8a4c8ce59debae5ef2927aeae1ccf73dc1919c3970b4f981b206a442c88", 0x97}, {&(0x7f0000000440)="b4eb90fc115a89324f408ea4f1a0216212f14c723b376b79b02320ea2d9fe792e581e182b72282595a210a6d2b7e3a58928e27e731074b494d51f5a0688b9753efc47e2f033109aa6a09e8bfafcb58682bc2f377dc039df0515a66bbef675104e0b56f50ade2ab8c7926f8e95abc96ae791d707d724a4f5130f9e0c85fc016ec0bd40d92de3a221149f03817aea1c7277710ad34ce4bc3ee7012aa2cef20a6cc5dd65b4ab9c97231b8", 0xa9}, {&(0x7f0000000500)="ffc342c2ad089d6351ff5763d8e100040f85f9b8a08850e5a2b89028790d118640d9931677059fbd0b67be9bb86da491ffa9a11beba2e1826c8cd4c87ad126ca4061c7132d876ee24a52d160f5c2b2dd594f7ad63319909581b01cbf4073f2dcadeef61d67d34a74742b23bef9532b3c70f78210f4a31846882378422c535ec7223068225b16acb7aa08cca38ba5ed091d613161c26035607dd1eb5848dd8237e258677688c791d15eb8ba683852bd1737783f4c8fd6c66568f99ca1077820", 0xbf}, {&(0x7f00000005c0)="98dd2460fb191db10cdc770fa8158553aa26f55876c7bf09e7fd13d7ee63b49484a9147da7d14524520b4ff0fcc20d3b33fda12ecdc0eb971b74bcb87b18fb6ee706c0adb8e5a4a9ef71d60bef2333640846b15f7a2e079ecc97ff5b5dc0b736b0366bf6f3ac8ae183ff80c88f7cac782aec3ce518e2cefc44973eca0e3fe7b338da79ae884804e7fac4ef25728d2ccbc8cd1c5ca4a6c819350eaa059134a583bf410ca6c54e4e8a92bf58c337afed46a81bbbd65d0721575f851c41455636e1", 0xc0}, {&(0x7f0000000680)="f76aeeb1c0309c84a91b4da4360e7e04080bffdf7a1089c2b292b5cc9cb73930a43edb7af8f8882083746847c6636a6b112a73578de2b841ecb778e16109d799a15f812339a1a06516512a980b275f807009e2dc9cd5d48e36d131b282b0d1e57f88e79daef11033466128e4041d201cfc0342260148555bb5b9fae481bd078c66ccf0c037c79ab8650e13e2d3ebd6380aa0632835518c9bfd4f31e80d8d209ff42b7cebab79e91be830553d8816f6c72277ca003e691ca511c9b9c7935a1af114b4f5c5179d470885afdcb96bd7d3dfa6d684e393bdb16cf5a810328df00d8b7b25fa07f7c87198e68c0696432b7d78e295f7aaf1061bbb3865d5bdf0c6", 0xfe}, {&(0x7f0000000780)="93c0751a138915fb3e8ae6d656e08339ea9a4c701d4d0565ff7a4217e497d592328f7ae229cce1eab875459325ec311064bece71fca9144761f66745f4b45988d3e475e8ccb906773b3fe2b552598ce88e4577c8ac5c19e3916aaff1bb3b8f82dc86b59a87a4a2771adcbf3ad0e4e233a7e0bd481a80dc697b23e35fc65d8497a4c3951384b902be930876111bf9fc531b3d92562931643cbfdd2e0da26cc8fa9905ba81d9422e03aaa564b73bb8b416f86bf23cf49377fcf2d69309d20d", 0xbe}], 0x9, 0x0) epoll_create1(0x80000) 2018/04/26 08:26:41 executing program 7 (fault-call:0 fault-nth:3): syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) [ 99.438211] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040f5e1 [ 99.438226] RDX: 0000000000000000 RSI: 00000000d0065b12 RDI: 00007fac4606e850 [ 99.438252] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 99.490385] R10: 0000000020000040 R11: 0000000000000293 R12: 0000000000000013 [ 99.497691] R13: 000000000000068f R14: 00000000006fce08 R15: 0000000000000000 [ 99.601841] device team0 entered promiscuous mode [ 99.606944] device team_slave_0 entered promiscuous mode [ 99.612692] device team_slave_1 entered promiscuous mode [ 99.729857] device team0 left promiscuous mode [ 99.734610] device team_slave_0 left promiscuous mode [ 99.740156] device team_slave_1 left promiscuous mode 2018/04/26 08:26:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:42 executing program 6 (fault-call:0 fault-nth:1): syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:42 executing program 5: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ptrace$setregs(0xf, r1, 0x6c7, &(0x7f00000002c0)="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") bind$vsock_dgram(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 2018/04/26 08:26:42 executing program 4: syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x20000) 2018/04/26 08:26:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:42 executing program 7: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b0e) getsockname$ax25(r0, &(0x7f0000000000), &(0x7f0000000080)=0x10) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f00000000c0)="e44e2fdeee7a95aeb74521ba7468459655bc5662fc4945f40c7a39eab5c106740c4f017c54f894e27b380cb02fb58eb2b2a68325560e183e3c53b474e5fd080b4fd5c7db7c7d8eb637e0839a499c04aba06a9e5192a9b6871f764e3b829401f038bc1e6cec05fcb62e2fb2daaaf2c90a94f23f36dd889ea717f55515c84618cb14fa48bfe99129499d1f6f44", 0x8c) 2018/04/26 08:26:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r1, &(0x7f0000adf000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) read(r1, &(0x7f000083b000)=""/1, 0x1) sendmsg$alg(r1, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) [ 100.065982] FAULT_INJECTION: forcing a failure. [ 100.065982] name failslab, interval 1, probability 0, space 0, times 0 [ 100.077400] CPU: 1 PID: 7433 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 100.084267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.093650] Call Trace: [ 100.096289] dump_stack+0x185/0x1d0 [ 100.099965] should_fail+0x87b/0xab0 [ 100.103728] should_failslab+0x279/0x2a0 [ 100.107892] kmem_cache_alloc+0x136/0xb90 [ 100.112120] ? get_empty_filp+0x1f1/0x870 [ 100.116340] ? __msan_poison_alloca+0x15c/0x1d0 [ 100.121056] get_empty_filp+0x1f1/0x870 [ 100.125067] ? do_filp_open+0x261/0x640 [ 100.129077] path_openat+0x156/0x6610 [ 100.132912] ? kmsan_set_origin_inline+0x6b/0x120 [ 100.137821] ? kmsan_set_origin_inline+0x6b/0x120 [ 100.142742] ? __msan_poison_alloca+0x15c/0x1d0 [ 100.147447] ? __alloc_fd+0x480/0xb90 [ 100.151316] ? expand_files+0x5b/0xde0 [ 100.155276] ? __msan_poison_alloca+0x15c/0x1d0 [ 100.159985] ? do_sys_open+0x624/0x960 [ 100.163952] ? do_filp_open+0x69/0x640 [ 100.167880] do_filp_open+0x261/0x640 [ 100.171848] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 100.177368] ? __alloc_fd+0x9f0/0xb90 [ 100.181270] do_sys_open+0x624/0x960 [ 100.185051] SYSC_open+0xab/0xc0 [ 100.188500] SyS_open+0x54/0x80 [ 100.191869] do_syscall_64+0x309/0x430 [ 100.195814] ? do_sys_open+0x960/0x960 [ 100.199751] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 100.204968] RIP: 0033:0x40f5e1 [ 100.208180] RSP: 002b:00007fac4606e7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 2018/04/26 08:26:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r1, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt(r1, 0x20000100000114, 0xa, &(0x7f00003cbffc)="02000000", 0x4) read(r1, &(0x7f000083b000)=""/1, 0x1) sendmsg$alg(r1, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 2018/04/26 08:26:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) [ 100.215942] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040f5e1 [ 100.223241] RDX: 0000000000000000 RSI: 00000000d0065b12 RDI: 00007fac4606e850 [ 100.230639] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 100.238116] R10: 0000000020000040 R11: 0000000000000293 R12: 0000000000000013 [ 100.245423] R13: 000000000000068f R14: 00000000006fce08 R15: 0000000000000001 [ 100.256393] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 2018/04/26 08:26:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:42 executing program 7: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x20480) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000080)=""/190) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000140)={0x0, 0xfffffffffffffffa}) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:42 executing program 4: syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/26 08:26:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:42 executing program 6 (fault-call:0 fault-nth:2): syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) [ 100.497981] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 2018/04/26 08:26:42 executing program 7: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='0\x00') setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000080)=0x4, 0x4) 2018/04/26 08:26:42 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) r1 = getpid() sendmsg$netlink(r0, &(0x7f00000015c0)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x18000600}, 0xc, &(0x7f0000001540)=[{&(0x7f0000000100)={0x1424, 0x41, 0x51c, 0x70bd26, 0x25dfdbfb, "", [@generic="895507749eae08addd3d10a97158780b43dbe962209523a0fdd76fcb51062778b991ca9d6a1371a90375fa46de4896a33069f3c396f86d068bf5406b201ae265c25d8b1c2058e1d2c276e6053a5d781bbe9ceb03aac4ec851cecc99d5958c63dcd2456c19aa65985c08e9fb4fdfb046d2d91a655c5d4ab08754d390ca9c5d3e9c36ac0a4695e7b5b5a85578eab92f0c9be204deada81854c1df74f58df3e7bda87ec64fee651739e52af30ef12b0fe34d862ff564fe2506b60a12da34680c79c11ff2bf252dc1b40d6e4669deb7747f5a1ff0a9714978c28c4", @generic="4ea1", @nested={0x190, 0x8f, [@typed={0x4, 0x61}, @typed={0x14, 0xe, @ipv6=@dev={0xfe, 0x80, [], 0x12}}, @generic="5c5e8a825fdeb6e88b4ad44fce4800c850af87e4c2a03fb0cbc6d286669617f64ec47ccf65e5e156a24d8a2b1edb270b0dc8af6cd86aed96ba66d48a851bfab963d3bd488c251c1e6c27d65f9b7c7ef4d9f6b188cdf3a3621c887bdede9810767418507110437e4e1be7d87e3ef31fe7402296b31db9df9297b79c5453e5e03d3be4658e941f56daac7b6fdb9870b57ab93405fe5fa547c5d0eab984a0", @typed={0x8, 0x20, @u32=0x6}, @generic="0a028683af6192bbe5b46cbc6efd1fae087d7a8fb9af00230ed6c6bb705d1cd9335cc566cdd1bdb27cbdba0ef27440306d918fd7e3e9467c6d2c09ef7c5993e37ba76cf2f45be42f2790ef9a7a29dc61973ec548b1540c633ffdfa4f39c6a29f3932be778f4f163c5a5cb7ef7fbf6b718abe618c10d8783614f626bb0d075d61de36097a4faab544f64c7b8d994c8d7596078e131b982e495d56beeaabbeae9ea12519c1c3d5d4194665af7226e1c58468485abc0582670900d8367f4c7ea810027f96e8e63f6a569888fd1019b9"]}, @nested={0x1a8, 0x58, [@typed={0xc, 0x28, @u64=0x2}, @typed={0x8, 0x1b, @pid=r1}, @typed={0x98, 0x58, @binary="7d7126d5e069aab566fc4d6113fb305ccc2890c31423635f8dc052e2fd62c3c3f45a11f2c8c9c658c6f7f899307c14c67a548fb74abe5b7c50a3457cda5bdc4ec2b6b9af87263cc984f848b3f5537b40e55719fa1b23e36d952e5b695299d179beb2029f6776559b8d2bdc0ef97a2c187fbb7a09a2de2c3a8e8450fdb7fa16d302fdb283a7d612261aebeb8d111e2c4d31fb46d4"}, @generic="e3140960bf77fb15445e53b628963fe158a2a45edbc89cf440794b2cc375204e5734f8fc4e3bbcfa3194cd6811aa6c8c672aaa408802461e050ea71975e4ac630fcf3c7adfa05da3e470c617f3045d91f3d84a3657a4ae5ae4d2afbd14d4a93aef91a68d184edb3b2837443c600c2212463c551bdc806d2cb37215829d49f9b91bc5aa7b9b7dfad3ae9abf47770336b9167c469fe579b4fe1817d93b4e2ead2e54ece54ed246acecf05fea090a707ec35adbf5eb0b4dc41461ef7baa59bce23573d919e7ec22b8794a4be7dd9caa7db59f52499a17d74fb880813c2d9158167779aa63f1977e5696064cdc80e0d6749bdfb74b3e5ef02c"]}, @generic="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"]}, 0x1424}], 0x1, &(0x7f0000001580)=[@rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}], 0x30, 0x4}, 0x1) recvmsg(r0, &(0x7f0000001a00)={&(0x7f0000001640)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001980)=[{&(0x7f00000016c0)=""/2, 0x2}, {&(0x7f0000001700)=""/16, 0x10}, {&(0x7f0000001740)=""/11, 0xb}, {&(0x7f0000001780)=""/153, 0x99}, {&(0x7f0000001840)=""/235, 0xeb}, {&(0x7f0000001940)=""/22, 0x16}], 0x6, 0x0, 0x0, 0x10000}, 0x100) accept4$packet(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000080)=0x14, 0x80000) syz_open_dev$evdev(&(0x7f0000001600)='/dev/input/event#\x00', 0x9, 0x4400) 2018/04/26 08:26:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb", 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) [ 100.649783] FAULT_INJECTION: forcing a failure. [ 100.649783] name failslab, interval 1, probability 0, space 0, times 0 [ 100.663651] CPU: 0 PID: 7468 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 100.670532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.680178] Call Trace: [ 100.682822] dump_stack+0x185/0x1d0 [ 100.686507] should_fail+0x87b/0xab0 [ 100.690279] should_failslab+0x279/0x2a0 [ 100.694392] __kmalloc+0xc2/0x350 [ 100.697889] ? mousedev_open+0xa7/0x950 [ 100.701909] mousedev_open+0xa7/0x950 [ 100.705770] ? __msan_poison_alloca+0x15c/0x1d0 [ 100.710480] ? do_dentry_open+0xcc6/0x1430 [ 100.714763] ? kobject_get+0x28/0x1b0 [ 100.718616] ? mousedev_poll+0x2b0/0x2b0 [ 100.722720] chrdev_open+0xc20/0xd90 [ 100.726494] ? cd_forget+0x330/0x330 [ 100.730254] do_dentry_open+0xcc6/0x1430 [ 100.734423] vfs_open+0x1b7/0x2e0 [ 100.737929] path_openat+0x481d/0x6610 [ 100.741917] ? __msan_poison_alloca+0x15c/0x1d0 [ 100.742683] kernel msg: ebtables bug: please report to author: Wrong len argument [ 100.746629] ? __alloc_fd+0x480/0xb90 [ 100.746680] ? do_sys_open+0x624/0x960 [ 100.746720] do_filp_open+0x261/0x640 [ 100.746831] do_sys_open+0x624/0x960 [ 100.746882] SYSC_open+0xab/0xc0 [ 100.746956] SyS_open+0x54/0x80 [ 100.776459] do_syscall_64+0x309/0x430 [ 100.780420] ? do_sys_open+0x960/0x960 [ 100.784360] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 100.789583] RIP: 0033:0x40f5e1 [ 100.792793] RSP: 002b:00007fac4606e7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 2018/04/26 08:26:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) [ 100.800558] RAX: ffffffffffffffda RBX: cccccccccccccccd RCX: 000000000040f5e1 [ 100.807858] RDX: 0000000000000000 RSI: 00000000d0065b12 RDI: 00007fac4606e850 [ 100.815163] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 100.822468] R10: 0000000020000040 R11: 0000000000000293 R12: 0000000000000013 [ 100.829773] R13: 000000000000068f R14: 00000000006fce08 R15: 0000000000000002 [ 100.852198] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/04/26 08:26:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 2018/04/26 08:26:43 executing program 7: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000aed000), &(0x7f00002dc000), &(0x7f000045e000), &(0x7f0000000080)="9d54dea863f50dadf7cd8449904869e072c5654048a681d238c3dcee3346822cd84ac6702eaf261d2c2a3cfe189dad67c5fa50774deba690d91f17423ce5cebbefbf41bf830585ef0dfb44af2b8788edca829f0a914f64") clone(0x0, &(0x7f0000000000), &(0x7f0000000200), &(0x7f0000000100), &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101000) 2018/04/26 08:26:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb", 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000adf000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) read(r1, &(0x7f000083b000)=""/1, 0x1) sendmsg$alg(r1, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 2018/04/26 08:26:43 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140), &(0x7f0000000040)=0x4) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x80) 2018/04/26 08:26:43 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x100002, 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x20200000000000) write$evdev(r0, &(0x7f0000000000), 0x1ae) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in=@rand_addr, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000040)=0xe8) bind$can_raw(r1, &(0x7f0000000080)={0x1d, r2}, 0x10) 2018/04/26 08:26:43 executing program 6 (fault-call:0 fault-nth:3): syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) [ 101.164819] kernel msg: ebtables bug: please report to author: Wrong len argument [ 101.176000] device team0 entered promiscuous mode [ 101.181110] device team_slave_0 entered promiscuous mode [ 101.186906] device team_slave_1 entered promiscuous mode 2018/04/26 08:26:43 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0xe0, 0x40000) fallocate(r0, 0x1, 0x2, 0x8001) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={0x4}, &(0x7f0000000080), &(0x7f0000000100)={r1, r2+10000000}, 0x8) 2018/04/26 08:26:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb", 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:43 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) recvmmsg(r0, &(0x7f0000003400)=[{{&(0x7f0000000080)=@ethernet={0x0, @local}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/121, 0x79}], 0x1, 0x0, 0x0, 0x98b4}, 0x3}, {{&(0x7f0000000180)=@pppol2tpin6, 0x80, &(0x7f0000000300)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, &(0x7f0000000340)=""/109, 0x6d, 0x7}, 0x9}, {{&(0x7f00000003c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000440)=""/244, 0xf4}], 0x1, &(0x7f0000000580)=""/4096, 0x1000, 0x1}, 0x23c8}, {{&(0x7f0000001580), 0x80, &(0x7f00000017c0)=[{&(0x7f0000001600)=""/82, 0x52}, {&(0x7f0000001680)=""/114, 0x72}, {&(0x7f0000001700)=""/113, 0x71}, {&(0x7f0000001780)}], 0x4, &(0x7f0000001800)=""/4096, 0x1000, 0x7}, 0x300000000000000}, {{0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000002800)}], 0x1, &(0x7f0000002880)=""/249, 0xf9, 0x16253b19}, 0x4}, {{0x0, 0x0, &(0x7f0000002c00)=[{&(0x7f0000002980)=""/179, 0xb3}, {&(0x7f0000002a40)=""/27, 0x1b}, {&(0x7f0000002a80)=""/146, 0x92}, {&(0x7f0000002b40)=""/157, 0x9d}], 0x4, &(0x7f0000002c40)=""/61, 0x3d, 0x3}, 0x1f}, {{&(0x7f0000002c80)=@pppol2tpv3in6, 0x80, &(0x7f0000002e00)=[{&(0x7f0000002d00)=""/230, 0xe6}], 0x1, &(0x7f0000002e40)=""/148, 0x94, 0x1}, 0x8}, {{&(0x7f0000002f00)=@hci={0x0, 0x0}, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002f80)=""/62, 0x3e}], 0x1, &(0x7f0000003000)=""/56, 0x38, 0xffffffff}, 0xffff}, {{&(0x7f0000003040)=@in6={0x0, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000003340)=[{&(0x7f00000030c0)=""/30, 0x1e}, {&(0x7f0000003100)=""/94, 0x5e}, {&(0x7f0000003180)=""/77, 0x4d}, {&(0x7f0000003200)=""/8, 0x8}, {&(0x7f0000003240)=""/38, 0x26}, {&(0x7f0000003280)=""/161, 0xa1}], 0x6, &(0x7f00000033c0)=""/61, 0x3d, 0xb5}, 0x7000}], 0x9, 0x1, 0x0) connect$can_bcm(r0, &(0x7f0000003640)={0x1d, r1}, 0x10) r2 = syz_open_dev$vcsa(&(0x7f0000001780)='/dev/vcsa#\x00', 0x80, 0x2080) sendmsg$can_raw(r2, &(0x7f0000003740)={&(0x7f0000002800)={0x1d, r1}, 0x10, &(0x7f0000003700)={&(0x7f0000003680)=@canfd={{0x0, 0x800, 0xffffffff}, 0x11, 0x1, 0x0, 0x0, "a84c24a7547c621b32a4b8a9d080600238b02b6b51183628e5ca8f3a1eebdaf499bb004c8174247ee64b0528854f1931008ebae24f89155f72f1fddff6adf4be"}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x4000) 2018/04/26 08:26:43 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f000014a000)='/dev/usbmon#\x00', 0x0, 0x0) unshare(0x12000101) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x6, 0x800, 0xfffffffffffffffb, 0x2, 0x7ff, 0xd36f}, 0x3}, 0xa) ioctl$sock_netrom_SIOCADDRT(r0, 0x80089203, &(0x7f0000e46ffc)) [ 101.424558] device team0 left promiscuous mode [ 101.429431] device team_slave_0 left promiscuous mode [ 101.434937] device team_slave_1 left promiscuous mode 2018/04/26 08:26:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200", 0x18) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:43 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 2018/04/26 08:26:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:43 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x20, 0x800) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000240)={0x0, 0x7}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r1, 0x8}, 0x8) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r3 = accept4(r2, &(0x7f0000000080)=@in6={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000100)=0x80, 0x80000) dup2(r3, r2) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x20000000400) [ 101.610878] FAULT_INJECTION: forcing a failure. [ 101.610878] name failslab, interval 1, probability 0, space 0, times 0 [ 101.622519] CPU: 1 PID: 7539 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 101.629387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.638772] Call Trace: [ 101.641411] dump_stack+0x185/0x1d0 [ 101.645086] should_fail+0x87b/0xab0 [ 101.648896] should_failslab+0x279/0x2a0 [ 101.653016] __kmalloc+0xc2/0x350 [ 101.656565] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 101.662004] ? packet_setsockopt+0x2ad9/0x5a90 [ 101.666680] packet_setsockopt+0x2ad9/0x5a90 [ 101.671180] ? __fget_light+0x56/0x710 [ 101.675113] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 101.680523] ? security_socket_setsockopt+0x5b/0x200 [ 101.685723] ? packet_ioctl+0x420/0x420 [ 101.689830] SYSC_setsockopt+0x4b8/0x570 [ 101.694013] SyS_setsockopt+0x76/0xa0 [ 101.697908] do_syscall_64+0x309/0x430 [ 101.701852] ? SYSC_recv+0xe0/0xe0 [ 101.705438] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 101.710658] RIP: 0033:0x455389 [ 101.713871] RSP: 002b:00007f439492bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 101.721641] RAX: ffffffffffffffda RBX: 00007f439492c6d4 RCX: 0000000000455389 [ 101.729032] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000013 [ 101.741652] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 101.748997] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000014 [ 101.756304] R13: 00000000000005f5 R14: 00000000006fbf98 R15: 0000000000000000 2018/04/26 08:26:43 executing program 7: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40800, 0x0) r1 = semget(0x3, 0x1, 0x400) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f00000000c0)=""/222) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000080)=0x607, 0x4) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:43 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00007f2000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x2, 0x0, 0x0, 0x800000}}) r1 = dup(r0) ioctl$VT_WAITACTIVE(r1, 0x5607) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x200) 2018/04/26 08:26:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200", 0x18) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000adf000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) read(r1, &(0x7f000083b000)=""/1, 0x1) sendmsg$alg(r1, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 2018/04/26 08:26:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:44 executing program 4: r0 = socket$inet(0x2, 0x80007, 0x9) fdatasync(r0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) dup2(r1, r1) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000000)=0x100000000, 0x4) 2018/04/26 08:26:44 executing program 2 (fault-call:3 fault-nth:1): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) [ 102.084577] device team0 entered promiscuous mode [ 102.089706] device team_slave_0 entered promiscuous mode [ 102.095310] FAULT_INJECTION: forcing a failure. [ 102.095310] name failslab, interval 1, probability 0, space 0, times 0 [ 102.106833] CPU: 1 PID: 7567 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 102.113712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.123099] Call Trace: [ 102.125745] dump_stack+0x185/0x1d0 [ 102.129436] should_fail+0x87b/0xab0 [ 102.133209] should_failslab+0x279/0x2a0 [ 102.137332] kmem_cache_alloc_node+0x151/0xc70 [ 102.141968] ? __alloc_skb+0x203/0x9f0 [ 102.145955] ? if_nlmsg_size+0x834/0xd60 [ 102.150070] ? if_nlmsg_size+0xb65/0xd60 [ 102.154185] __alloc_skb+0x203/0x9f0 [ 102.157968] rtmsg_ifinfo_build_skb+0x153/0x400 [ 102.162714] rtmsg_ifinfo+0x112/0x260 [ 102.166587] __dev_notify_flags+0x141/0x7f0 [ 102.171013] __dev_set_promiscuity+0x2ae/0xb40 [ 102.175681] dev_set_promiscuity+0xaa/0x1a0 [ 102.180103] team_change_rx_flags+0x1bd/0x380 [ 102.184680] ? team_select_queue+0x210/0x210 [ 102.189149] __dev_set_promiscuity+0xa41/0xb40 [ 102.193888] dev_set_promiscuity+0xaa/0x1a0 [ 102.198276] packet_setsockopt+0x41a6/0x5a90 [ 102.202737] ? __fget_light+0x56/0x710 [ 102.206693] ? packet_ioctl+0x420/0x420 [ 102.210714] SYSC_setsockopt+0x4b8/0x570 [ 102.214883] SyS_setsockopt+0x76/0xa0 [ 102.218782] do_syscall_64+0x309/0x430 [ 102.222727] ? SYSC_recv+0xe0/0xe0 [ 102.226327] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 102.231551] RIP: 0033:0x455389 [ 102.234762] RSP: 002b:00007f439492bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 102.242494] RAX: ffffffffffffffda RBX: 00007f439492c6d4 RCX: 0000000000455389 [ 102.249867] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000013 [ 102.257156] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 102.264428] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000014 [ 102.271712] R13: 00000000000005f5 R14: 00000000006fbf98 R15: 0000000000000001 [ 102.279286] device team_slave_1 entered promiscuous mode [ 102.334283] device team0 left promiscuous mode [ 102.339074] device team_slave_0 left promiscuous mode [ 102.344638] device team_slave_1 left promiscuous mode 2018/04/26 08:26:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000adf000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) read(r1, &(0x7f000083b000)=""/1, 0x1) sendmsg$alg(r1, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 2018/04/26 08:26:45 executing program 2 (fault-call:3 fault-nth:2): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 2018/04/26 08:26:45 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0x6, 0x0, 0xf5, 0x5b, 0x7, 0xffffffffffffff2b, 0x7ff, 0x9, 0x1000, 0x81}) 2018/04/26 08:26:45 executing program 7: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101300, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000080)=0xa, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x7, 0x1, 0x7ff, 0x0, 0x6}, 0x14) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000000c0)=0x4, 0x4) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) 2018/04/26 08:26:45 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000002600)={0x0, 0x0}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) recvmmsg(r0, &(0x7f00000024c0)=[{{&(0x7f0000000040)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/144, 0x90}], 0x1, 0x0, 0x0, 0xc97}, 0x2}, {{&(0x7f00000001c0)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000240)=""/136, 0x88}, {&(0x7f0000000300)=""/149, 0x95}, {&(0x7f00000003c0)=""/122, 0x7a}, {&(0x7f0000000440)=""/137, 0x89}, {&(0x7f0000000500)=""/196, 0xc4}], 0x5, &(0x7f0000000680)=""/206, 0xce, 0x370}}, {{&(0x7f0000000780)=@pppoe={0x0, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000800)=""/219, 0xdb}, {&(0x7f0000000900)=""/177, 0xb1}, {&(0x7f00000009c0)=""/237, 0xed}], 0x3, &(0x7f0000000b00)=""/121, 0x79, 0x8}, 0x5}, {{&(0x7f0000000b80)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000002180)=[{&(0x7f0000000c00)=""/255, 0xff}, {&(0x7f0000000d00)=""/158, 0x9e}, {&(0x7f0000000dc0)=""/242, 0xf2}, {&(0x7f0000000ec0)=""/60, 0x3c}, {&(0x7f0000000f00)=""/4096, 0x1000}, {&(0x7f0000001f00)=""/197, 0xc5}, {&(0x7f0000002000)=""/109, 0x6d}, {&(0x7f0000002080)=""/245, 0xf5}], 0x8, &(0x7f0000002200)=""/61, 0x3d, 0x5}, 0xc92}, {{&(0x7f0000002240)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002440)=[{&(0x7f00000022c0)=""/155, 0x9b}, {&(0x7f0000002380)=""/184, 0xb8}], 0x2, &(0x7f0000002480)=""/20, 0x14, 0x400}, 0x9}], 0x5, 0x102, &(0x7f0000002640)={r1, r2+30000000}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000004d00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000004dc0)={&(0x7f0000004cc0)={0x10}, 0xc, &(0x7f0000004d80)={&(0x7f0000004d40)={0x34, r5, 0x202, 0x70bd2b, 0x25dfdbfb, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x2f52cdbba6aaab6b) sendto(r4, &(0x7f0000004b80)="b54026a54ce96d3ba8df4223f127ac41ebcbb6a5df4fe56ffe112cb8299ece53c1a694f246b37906c433b93dbc59607a5789e88f0d1b4c9f3ac192dfa82b7ec468fecb25516e0907f561b047fdf081b45017f215d779a94ddcab8aadb6d6ea57793afc9f295dda3a5417e75996fab7597053b61367895873e7e11d220f5d28bca55fd52db261c3b65fdd4cb9bce3027700a2", 0x92, 0x10, &(0x7f0000004c40)=@nfc={0x27, 0x1, 0x1, 0x5}, 0x80) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000002680)={r3, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x11}}, 0x10) r6 = socket$unix(0x1, 0x8, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000004b40)={0x2, &(0x7f0000003a00)=""/135, &(0x7f0000004b00)=[{0xfff, 0x1000, 0xffff, &(0x7f0000003ac0)=""/4096}, {0x3, 0x2c, 0x7, &(0x7f0000004ac0)=""/44}]}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f00000026c0)=@assoc_value={0x0}, &(0x7f0000002700)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000002800)={r7, 0xffffffffffffffa0, &(0x7f0000002740)=[@in6={0xa, 0x4e22, 0x5, @loopback={0x0, 0x1}, 0x2}, @in6={0xa, 0x4e22, 0x7f, @empty, 0x3f}, @in6={0xa, 0x4e24, 0x7, @mcast1={0xff, 0x1, [], 0x1}, 0x20}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e22, 0x15be, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x200}, @in={0x2, 0x4e22, @rand_addr=0x6}, @in6={0xa, 0x4e21, 0xb43, @empty, 0x6}]}, &(0x7f0000002840)=0x10) listen(r6, 0xb) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002880)={{0x7f, 0x45, 0x4c, 0x46, 0x570, 0x8, 0x2, 0x10000, 0x4, 0x0, 0x7, 0x4, 0x183, 0x40, 0x94, 0x101, 0x80000001, 0x38, 0x1, 0x6, 0x0, 0x9}, [{0x3, 0xf1c, 0x200, 0x2, 0x3, 0x5, 0x6, 0x1}], "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", [[]]}, 0x1178) 2018/04/26 08:26:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200", 0x18) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:45 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x2000, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x20000, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f00000000c0)=0x1000) [ 103.153673] kernel msg: ebtables bug: please report to author: bad policy [ 103.154220] device team0 entered promiscuous mode [ 103.165911] device team_slave_0 entered promiscuous mode [ 103.171493] FAULT_INJECTION: forcing a failure. [ 103.171493] name failslab, interval 1, probability 0, space 0, times 0 [ 103.182860] CPU: 0 PID: 7596 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 103.189732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.199117] Call Trace: [ 103.201761] dump_stack+0x185/0x1d0 [ 103.205432] should_fail+0x87b/0xab0 [ 103.209204] should_failslab+0x279/0x2a0 [ 103.213379] __kmalloc_node_track_caller+0x243/0x11c0 [ 103.218639] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 103.224048] ? rtmsg_ifinfo_build_skb+0x153/0x400 [ 103.228949] __alloc_skb+0x2cf/0x9f0 [ 103.232711] ? rtmsg_ifinfo_build_skb+0x153/0x400 [ 103.237606] rtmsg_ifinfo_build_skb+0x153/0x400 [ 103.242337] rtmsg_ifinfo+0x112/0x260 [ 103.246192] __dev_notify_flags+0x141/0x7f0 [ 103.250564] __dev_set_promiscuity+0x2ae/0xb40 [ 103.255204] dev_set_promiscuity+0xaa/0x1a0 [ 103.259622] team_change_rx_flags+0x1bd/0x380 [ 103.264173] ? team_select_queue+0x210/0x210 [ 103.268629] __dev_set_promiscuity+0xa41/0xb40 [ 103.273334] dev_set_promiscuity+0xaa/0x1a0 [ 103.277760] packet_setsockopt+0x41a6/0x5a90 [ 103.282289] ? __fget_light+0x56/0x710 [ 103.286283] ? packet_ioctl+0x420/0x420 [ 103.290338] SYSC_setsockopt+0x4b8/0x570 [ 103.294518] SyS_setsockopt+0x76/0xa0 [ 103.298432] do_syscall_64+0x309/0x430 2018/04/26 08:26:45 executing program 6: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b0075bd0065b12) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x4, 0x7ff, 0xf, 0x9, 0x0, 0x70bd29, 0x25dfdbfc, [@sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e24, @rand_addr=0x2}, @in6={0xa, 0x4e22, 0xffffffffffff0001, @loopback={0x0, 0x1}, 0x7}}]}, 0x48}, 0x1}, 0x40004) socket$key(0xf, 0x3, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) 2018/04/26 08:26:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad", 0x1c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) [ 103.302380] ? SYSC_recv+0xe0/0xe0 [ 103.305971] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 103.311186] RIP: 0033:0x455389 [ 103.314394] RSP: 002b:00007f439492bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 103.322151] RAX: ffffffffffffffda RBX: 00007f439492c6d4 RCX: 0000000000455389 [ 103.329455] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000013 [ 103.336756] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 103.344061] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000014 [ 103.351361] R13: 00000000000005f5 R14: 00000000006fbf98 R15: 0000000000000002 [ 103.358900] device team_slave_1 entered promiscuous mode 2018/04/26 08:26:45 executing program 7: r0 = memfd_create(&(0x7f0000000180)='eth1.\x00', 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000080)=0x81) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) getpeername$unix(r1, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) [ 103.417316] kernel msg: ebtables bug: please report to author: bad policy 2018/04/26 08:26:45 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000)={[0x34]}, 0x1) 2018/04/26 08:26:45 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x8000) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000000c0)=0x10000001d) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) signalfd(r1, &(0x7f0000000040)={0x6}, 0x8) 2018/04/26 08:26:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x11, 0x24, 0x88fb, 'ip6_vti0\x00', 'veth1\x00', 'eql\x00', 'gre0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0x0, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18, {{0x100, 0x9, 0x2, 0x1}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x2f8) [ 103.509240] device team0 left promiscuous mode [ 103.514079] device team_slave_0 left promiscuous mode [ 103.519562] device team_slave_1 left promiscuous mode 2018/04/26 08:26:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad", 0x1c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) [ 103.662177] kernel msg: ebtables bug: please report to author: bad policy 2018/04/26 08:26:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x230, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaacf2bb43c40b8080045000028000000df00069078ac14ffaae0000001000000005137007b64acf66ad5c0dfa079896cd47dca07f97c13dbe54d784fd7ea770a5ba4fc169a05e548532c8a0276b2f47bcb2db5269d4a9384c012165086fc9371f2811c659e826ed92151d0daaa650b501d9e2e4c43e3e844675c0d61034c41be08001c80eb67ceccb98e24ae243793920a6a0bc988e40d9dbdb0078a9957eec53388ab34f40ea186ad9a5ad6bce05d991d2f0d57d3dd8c25", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB='P\x00\x00\x00`\a\x00\x00'], 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x480) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[{0x0, 0x81}, {}, {0x7, 0xffff}, {0x3, 0x6}, {0x4, 0x2}, {0x2, 0x2}], 0x6) 2018/04/26 08:26:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r1, &(0x7f0000adf000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) read(r1, &(0x7f000083b000)=""/1, 0x1) sendmsg$alg(r1, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 2018/04/26 08:26:46 executing program 6: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x6) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) 2018/04/26 08:26:46 executing program 7: syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x400001) 2018/04/26 08:26:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000000)="1f00000010000900040000000000e7fb0300000408000200000004ad", 0x1c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) getpgrp(0xffffffffffffffff) 2018/04/26 08:26:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@broute={'broute\x00', 0x20, 0x2, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000000), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'gre0\x00', 'ip6tnl0\x00', 'bcsf0\x00', 'veth0_to_bridge\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xc0, 0x110}, [@common=@log={'log\x00', 0x28, {{0x0, "8b8c2c6712e3610d09278620d2608168e47d700a9d26668472ac6d927e5f"}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x5, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x2f8) 2018/04/26 08:26:46 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xa7b9075bd0065b12) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) ioctl$TIOCNXCL(r0, 0x540d) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[0x280, 0x1, 0x7fffffff, 0x3, 0x2, 0x2]}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000080)={0x80000001, 0x10000, 0x1}) 2018/04/26 08:26:46 executing program 2 (fault-call:3 fault-nth:3): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @random="2700c802a7b7"}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) [ 104.313904] kernel msg: ebtables bug: please report to author: Wrong len argument [ 104.319495] device team0 entered promiscuous mode [ 104.326678] device team_slave_0 entered promiscuous mode [ 104.332429] FAULT_INJECTION: forcing a failure. [ 104.332429] name failslab, interval 1, probability 0, space 0, times 0 [ 104.343833] CPU: 0 PID: 7650 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 104.350715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.360110] Call Trace: [ 104.362757] dump_stack+0x185/0x1d0 [ 104.366439] should_fail+0x87b/0xab0 [ 104.370218] should_failslab+0x279/0x2a0 [ 104.374336] __kmalloc_node_track_caller+0x243/0x11c0 [ 104.379574] ? netlink_trim+0x398/0x400 [ 104.383609] ? netlink_trim+0x398/0x400 [ 104.387652] pskb_expand_head+0x21d/0x1a70 [ 104.392029] netlink_trim+0x398/0x400 [ 104.395991] netlink_broadcast_filtered+0x1de/0x1e00 [ 104.401267] nlmsg_notify+0x1dd/0x3f0 [ 104.405196] rtmsg_ifinfo+0x1e9/0x260 [ 104.409060] __dev_notify_flags+0x141/0x7f0 [ 104.413444] __dev_set_promiscuity+0x2ae/0xb40 [ 104.418095] dev_set_promiscuity+0xaa/0x1a0 [ 104.422488] team_change_rx_flags+0x1bd/0x380 [ 104.427040] ? team_select_queue+0x210/0x210 [ 104.431511] __dev_set_promiscuity+0xa41/0xb40 [ 104.436227] dev_set_promiscuity+0xaa/0x1a0 [ 104.440761] packet_setsockopt+0x41a6/0x5a90 [ 104.445375] ? __fget_light+0x56/0x710 [ 104.449370] ? packet_ioctl+0x420/0x420 [ 104.453471] SYSC_setsockopt+0x4b8/0x570 [ 104.457665] SyS_setsockopt+0x76/0xa0 [ 104.461569] do_syscall_64+0x309/0x430 [ 104.465542] ? SYSC_recv+0xe0/0xe0 [ 104.469146] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 104.474370] RIP: 0033:0x455389 [ 104.477584] RSP: 002b:00007f439492bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 104.485336] RAX: ffffffffffffffda RBX: 00007f439492c6d4 RCX: 0000000000455389 [ 104.492642] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000013 [ 104.500039] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 104.507351] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000014 [ 104.514658] R13: 00000000000005f5 R14: 00000000006fbf98 R15: 0000000000000003 [ 104.523182] device team_slave_1 entered promiscuous mode [ 104.623612] device team0 left promiscuous mode [ 104.628325] device team_slave_0 left promiscuous mode [ 104.633803] device team_slave_1 left promiscuous mode [ 105.134813] ================================================================== [ 105.142221] BUG: KMSAN: uninit-value in flush_tlb_func_remote+0xed/0xf0 [ 105.148970] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.16.0+ #87 [ 105.155180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.164515] Call Trace: [ 105.167082] [ 105.169220] dump_stack+0x185/0x1d0 [ 105.172833] ? flush_tlb_func_remote+0xed/0xf0 [ 105.177399] kmsan_report+0x142/0x240 [ 105.181187] __msan_warning_32+0x6c/0xb0 [ 105.185236] flush_tlb_func_remote+0xed/0xf0 [ 105.189638] flush_smp_call_function_queue+0x2db/0x5f0 [ 105.194900] ? native_flush_tlb_others+0x4f0/0x4f0 [ 105.199817] ? flat_init_apic_ldr+0x160/0x160 [ 105.204386] generic_smp_call_function_single_interrupt+0x1f/0x30 [ 105.210605] smp_call_function_single_interrupt+0x22f/0x3d0 [ 105.216305] call_function_single_interrupt+0xf/0x20 [ 105.221388] [ 105.223608] RIP: 0010:kmsan_free_page+0x1de/0x2e0 [ 105.228434] RSP: 0018:ffff8801d96bfb30 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff04 [ 105.236125] RAX: 0000000000000246 RBX: ffffea0007fc3200 RCX: 0000000000006800 [ 105.243464] RDX: ffffffff8b313000 RSI: 0000000000000001 RDI: ffff88021fffade0 [ 105.250718] RBP: ffff8801d96bfb78 R08: 0000000000153c00 R09: 0000000000000000 [ 105.257969] R10: 0000000000000000 R11: 0000000000000004 R12: 0000000000000010 [ 105.265225] R13: ffff8801d9633b00 R14: 0000000000000004 R15: ffffea0007f6aa00 [ 105.272493] __free_pages_ok+0x270/0x16b0 [ 105.277080] ? kmsan_set_origin_inline+0x6b/0x120 [ 105.281907] ? __msan_poison_alloca+0x15c/0x1d0 [ 105.286585] __free_pages+0x109/0x240 [ 105.290380] put_task_stack+0x233/0x2f0 [ 105.294341] finish_task_switch+0x167/0x230 [ 105.298649] __schedule+0x68e/0x730 [ 105.302259] ? schedule_idle+0x6b/0xd0 [ 105.306133] schedule_idle+0x6b/0xd0 [ 105.309832] do_idle+0x762/0x790 [ 105.313187] cpu_startup_entry+0x45/0x50 [ 105.317230] ? setup_APIC_timer+0x220/0x220 [ 105.321536] start_secondary+0x39d/0x470 [ 105.325583] secondary_startup_64+0xa5/0xb0 [ 105.329884] [ 105.331490] Uninit was stored to memory at: [ 105.335795] kmsan_internal_chain_origin+0x12b/0x210 [ 105.340884] __msan_chain_origin+0x69/0xc0 [ 105.345104] flush_tlb_mm_range+0x338/0x420 [ 105.349407] tlb_flush_mmu_tlbonly+0x1ce/0x5f0 [ 105.353971] tlb_finish_mmu+0x202/0x5c0 [ 105.357930] ldt_arch_exit_mmap+0x130/0x160 [ 105.362233] exit_mmap+0x30f/0x950 [ 105.365753] __mmput+0x16c/0x610 [ 105.369100] mmput+0xab/0xf0 [ 105.372104] exit_mm+0x6ed/0x7a0 [ 105.375453] do_exit+0xc01/0x38d0 [ 105.378889] do_group_exit+0x1a0/0x360 [ 105.382760] get_signal+0x1320/0x1f20 [ 105.386544] do_signal+0xb8/0x1c80 [ 105.390071] prepare_exit_to_usermode+0x271/0x3a0 [ 105.394898] syscall_return_slowpath+0xe9/0x700 [ 105.399549] do_syscall_64+0x36d/0x430 [ 105.403419] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 105.408586] Local variable description: ----tlb.i@ldt_arch_exit_mmap [ 105.415053] Variable was created at: [ 105.418748] ldt_arch_exit_mmap+0x46/0x160 [ 105.422966] exit_mmap+0x30f/0x950 [ 105.426482] ================================================================== [ 105.433817] Disabling lock debugging due to kernel taint [ 105.440204] Kernel panic - not syncing: panic_on_warn set ... [ 105.440204] [ 105.447554] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G B 4.16.0+ #87 [ 105.455067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.464402] Call Trace: [ 105.466970] [ 105.469108] dump_stack+0x185/0x1d0 [ 105.472722] panic+0x39d/0x940 [ 105.475915] ? flush_tlb_func_remote+0xed/0xf0 [ 105.480481] kmsan_report+0x238/0x240 [ 105.484267] __msan_warning_32+0x6c/0xb0 [ 105.488315] flush_tlb_func_remote+0xed/0xf0 [ 105.492710] flush_smp_call_function_queue+0x2db/0x5f0 [ 105.497970] ? native_flush_tlb_others+0x4f0/0x4f0 [ 105.502898] ? flat_init_apic_ldr+0x160/0x160 [ 105.507378] generic_smp_call_function_single_interrupt+0x1f/0x30 [ 105.513597] smp_call_function_single_interrupt+0x22f/0x3d0 [ 105.519310] call_function_single_interrupt+0xf/0x20 [ 105.524393] [ 105.526619] RIP: 0010:kmsan_free_page+0x1de/0x2e0 [ 105.531442] RSP: 0018:ffff8801d96bfb30 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff04 [ 105.539134] RAX: 0000000000000246 RBX: ffffea0007fc3200 RCX: 0000000000006800 [ 105.546385] RDX: ffffffff8b313000 RSI: 0000000000000001 RDI: ffff88021fffade0 [ 105.553639] RBP: ffff8801d96bfb78 R08: 0000000000153c00 R09: 0000000000000000 [ 105.560891] R10: 0000000000000000 R11: 0000000000000004 R12: 0000000000000010 [ 105.568865] R13: ffff8801d9633b00 R14: 0000000000000004 R15: ffffea0007f6aa00 [ 105.576139] __free_pages_ok+0x270/0x16b0 [ 105.580273] ? kmsan_set_origin_inline+0x6b/0x120 [ 105.585100] ? __msan_poison_alloca+0x15c/0x1d0 [ 105.589757] __free_pages+0x109/0x240 [ 105.593543] put_task_stack+0x233/0x2f0 [ 105.597504] finish_task_switch+0x167/0x230 [ 105.601813] __schedule+0x68e/0x730 [ 105.605445] ? schedule_idle+0x6b/0xd0 [ 105.609318] schedule_idle+0x6b/0xd0 [ 105.613022] do_idle+0x762/0x790 [ 105.616383] cpu_startup_entry+0x45/0x50 [ 105.620429] ? setup_APIC_timer+0x220/0x220 [ 105.624734] start_secondary+0x39d/0x470 [ 105.628782] secondary_startup_64+0xa5/0xb0 [ 105.633559] Dumping ftrace buffer: [ 105.637080] (ftrace buffer empty) [ 105.640766] Kernel Offset: disabled [ 105.644370] Rebooting in 86400 seconds..