INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.35' (ECDSA) to the list of known hosts. 2018/04/20 18:38:51 fuzzer started 2018/04/20 18:38:51 dialing manager at 10.128.0.26:40315 2018/04/20 18:38:57 kcov=true, comps=false 2018/04/20 18:39:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000028fc8)={&(0x7f0000007ff4)={0x10}, 0xc, &(0x7f0000015ff0)={&(0x7f0000023000)={0x14}, 0x14}, 0x1}, 0x0) 2018/04/20 18:39:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @broadcast=0xffffffff}}}}, &(0x7f0000000000)=0xb0) 2018/04/20 18:39:00 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000740)='/exe\x00\x00\x00\x00\x00\x00') ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x1000}) 2018/04/20 18:39:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/20 18:39:00 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/20 18:39:00 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg(r0, &(0x7f0000000a40)={&(0x7f00000002c0)=@in6={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000340)="193afd2c601eca916d878588b5", 0xd}], 0x1, &(0x7f0000000440)}, 0x8001) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180)=[{&(0x7f00000012c0)="75cd09a79e09d4814091ecb0eae3e8b1f8be00426c70ec738ae78cb588143292279003043419fa2986b33021848f80f8e4e10baa95d2b36df2b01a5a4799de8da08cf29840bf25e36e395cff64b8a38f9f7e6891600d97d67d5d9217e062f29993c9b940c6ed3e6dbaac5bb139744f5003d57c10c3a5afeca6f58a0da3467f018e9e6c5467aa4bdf32015a1412e4bd9b42aeafa4169a842e2eb257f9532e36449e8dc8d7a17f4324faf5f208799f45c8b2ba642d75380a2b7c8092e7f1037b00f8f0ffef505cab761150d81f278a5ec0fa89c8a1225376332aad3f1b2346a257552cf7be1d6b0e4885d5e8a4d281db88f542079e7f8e29b1755589a7a1bd32ee54da410bebd9efae3253d027a06e502659350bd3c725623600cfe1240986d34d4aa38472f134df5c70ca5772507553a8c19a83e3a8bb706e0af134079a2ee3a3ae846bb3a7aceac5cbf0b04ec3e61952c8ac4d94413d05da57bc663be9a91eab74da9237887454e6868519be898141a7d2c6f2d3689de7249c1be92c203560ee19f4f594110683fa77826808bcd2ef299dbed826cbf8d21b4ac3ce9dd8bc7edb6149bea4a1b463a634fa34b160d2c163322de54b58f271b3f0529387034011984b41cac30b7d05c4c47e15a9ccef0be4a14f122ceec987337e26a5e1ec4cb2fc97dd9f9901037c9cbe7ce16ade5b1ed2af8d95ffc9b2a6cc56edce43fe7f6c37c75fbccb33fc83cdbb0e1b120e13287f9b62ad54fe46923ca2233cde5b0616449c91726c38d748fc61a6be899d70df2b510a01332a56240de560ebae8fe3af1b4891202da55ed8508ae81caf12ba94ad024d2a6d4a2edc22064c8ece8db6588f20d153eb9d15bf456c436c501fd25a1669741cfea774e8dfcd133ba2d3bc146838d6ca27ed63c76dd7cd3c6ebca12e44cf259e8a67c57476aa91ddafa19b5f8fb68f5719e6f1dc4155a7c232557c4b1e5acada1eb1388be003c7121513526b552dec6eab38965f2b5f4b04cdfb5291156dc7518e68bb6aabb94f8cb8f04bf09a820da479d73aa8ba34d83ab8c6a9e7f4aa4781b6338531aa4e1676359814a0bd5f7765367e0dd7a1c148f647e244481ef22c8d32043e27ff4d4df50d158a14206f9a51fdb1a9bda48c7a426468b9c611ce653395bfaf0b72a9a1c2e2cf40c7345848c81f9e389eaae2ce05bd306b6ba45e4f2fa0bbce104da61490be6d45a9e987445916463add0f75d6742f3ddddcb2c52ba51a11ff4cbf154d6776d7f31fa5baeee70e3287d159a925858b172764d503bcba73e25dd2d15f0bd4d69c9f45dcc83bd84637518a40665be0a196bbed273c03249956ebcb33febbe3acdc7427bff9ec016293061e11651d869c9755f93e1b1fbfd74920bbfc46497825025c40ab0a625c6294ecb5e12e2257488adf758d595b347072a955f37d037613744585493d68eb226a972b66a583c7d6075a78d2eb45c3bd29f0c0c7f355cff988f4dd9360bdef99af0903ec7e62f7c2fc216eb57081c73fc739dc3bca325c2fb01bb65eee6dfe34983b4bc9ee8b0ba03dee1277c2ed4792d14404f497b012043d9da333041b1b639c3f9ccb5bc2279ed195c4454b3499575cd9767f33b2b4d035542179433797def259fcae66d3d605e7b61e71afbb2111645795b7ba94d4156ec643ac6623e95fd2bbae5dba7cbbe791314c472af3a823751373918df52a6d57ef4a0ef98fefc1af163037766a0c027f378a903416eba9d77be5ec24a0bf5959abbe3115e646ac3b108d92ca83b735c731a010d0a8edc328096360730cd1f9e4ea6f2b1db0741a614eebaa9a4035cc8fc063df1418869c5bf6772f2db898db2973afa5be59f0fc54891b2013f722cb4b1a0a4a5bb14b57541ab5bd3c0a1be80dedbbf1c314fb9f796ff4111305ea22d8980f60a5702432b9cae69ae064c1a3b5ddab72ee2824c69fa9e6c63d8ef8f54985bc955f924d1fa1c33fe91951cf3c28e5b534df9c324a001a7e03fa75161d8afc65efde76cd568dfdcca64f28b6a645aeeb76", 0x5a0}], 0x1}, 0x8000) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x4, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f00009f0ffc), 0x4) 2018/04/20 18:39:00 executing program 6: r0 = socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$rds(r0, &(0x7f000051b000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f00001c3000)={&(0x7f0000014000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000004000), 0x0, &(0x7f000000f000)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000012f46)=""/186, 0xba}, &(0x7f0000006000)=[{&(0x7f0000013f97)=""/122, 0x7a}], 0x1}}], 0x48}, 0x0) 2018/04/20 18:39:00 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000002ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f000000b000)={&(0x7f0000014000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000f47fb0)=[{&(0x7f0000061000)=""/212, 0xd4}], 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="480000000000000014010000010000000000000000000000", @ANYBLOB="ba00000000000000a9d3460ff5f3876f60a78998f1ce9e200e1304a4b598689af7c4fcec7353e23476a38af82bc59ed39acfaf06170f77d843761a5fd6701acc443b0906c69398c5ece8cf5c4bb845cf529a09db2d9cdc49670356e3fc22c46e323f3af25332d2d39eb5c435662cba477a30f32cab6e7d7f84ba3057f4fbb3071a51460c54f0d991fa4b66ae0c954cdd1768fd18d7e7bb7b9a9d7e554f621621d86caeaf7173d39b315befa7ab6f28b03ecc19168f30d7ef89cc948f285e519c569b4ce62fc8701c7755bab7", @ANYBLOB="010000000000000000000000000000000000000000000000"], 0xfc}, 0x0) syzkaller login: [ 42.752709] ip (3745) used greatest stack depth: 54672 bytes left [ 43.443891] ip (3809) used greatest stack depth: 54656 bytes left [ 43.605805] ip (3821) used greatest stack depth: 54408 bytes left [ 44.238584] ip (3887) used greatest stack depth: 53976 bytes left [ 44.650696] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.657270] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.682735] device bridge_slave_0 entered promiscuous mode [ 44.807989] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.814514] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.866932] device bridge_slave_0 entered promiscuous mode [ 44.882230] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.888778] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.916442] device bridge_slave_0 entered promiscuous mode [ 44.932880] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.939381] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.947710] device bridge_slave_0 entered promiscuous mode [ 44.956341] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.962881] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.977236] device bridge_slave_1 entered promiscuous mode [ 44.986828] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.993341] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.016969] device bridge_slave_0 entered promiscuous mode [ 45.029841] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.036346] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.046335] device bridge_slave_0 entered promiscuous mode [ 45.065862] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.072369] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.083016] device bridge_slave_0 entered promiscuous mode [ 45.102014] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.108534] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.138999] device bridge_slave_1 entered promiscuous mode [ 45.152775] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.159264] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.188665] device bridge_slave_1 entered promiscuous mode [ 45.195354] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.201829] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.213850] device bridge_slave_1 entered promiscuous mode [ 45.227736] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.237689] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.245267] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.251737] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.291601] device bridge_slave_1 entered promiscuous mode [ 45.312552] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.319123] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.356969] device bridge_slave_0 entered promiscuous mode [ 45.372276] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.378762] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.389380] device bridge_slave_1 entered promiscuous mode [ 45.403998] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.413624] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.423764] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.431901] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.441103] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.447663] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.501939] device bridge_slave_1 entered promiscuous mode [ 45.528692] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.563951] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.570546] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.609252] device bridge_slave_1 entered promiscuous mode [ 45.618637] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.626866] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.636532] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.685745] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.731816] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.809012] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.832962] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.918090] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.028254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.446361] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.479954] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.591670] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.602329] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.632490] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.698761] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.729734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.791145] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.822230] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.829779] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.916589] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.978320] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.008139] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.078838] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.176475] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.324841] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.674784] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.691731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.807434] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.835564] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.917237] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.929843] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.948460] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.955838] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.988363] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.071661] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.117381] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.126589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.143374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.170576] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.186315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.205838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.223533] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.231331] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.242527] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.252625] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.264103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.281617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.314397] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.321636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.365362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.399456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.408262] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.415862] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.427360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.450928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.476703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.492965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.510628] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.519009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.536289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.550365] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.560093] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.570694] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.578700] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.587878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.613968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.628405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.652311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.682832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.697558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.726222] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.740603] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.747773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.760109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.799393] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.806793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.815985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.844114] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.868859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.895934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.936016] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.946874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.975892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.012265] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.019438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.037764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.246480] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.254347] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.267754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.796848] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.803640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.810567] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.817080] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.841591] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.860229] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.897462] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.903962] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.910825] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.917327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.968930] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.985731] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.992266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.999197] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.005686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.052935] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.167484] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.174001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.180895] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.187395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.247954] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.269699] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.276198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.283082] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.289667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.346589] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.355318] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.361829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.368660] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.375158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.385246] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.416767] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.424103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.430978] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.437446] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.526970] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.612113] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.618619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.625477] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.631928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.707921] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.872358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.893335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.912926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.929668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.943009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.950579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.958257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.208222] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.338750] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.542896] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.791269] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.903575] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.993180] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.007977] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.060772] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.067212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.079194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.127404] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.133758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.147830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.308449] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.321503] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.328085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.338723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.589450] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.597707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.611682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.649305] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.656325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.691346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.826195] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.832523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.846651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.917654] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.925363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.936666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.143988] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.150339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.160674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/20 18:39:27 executing program 3: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) sched_setattr(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) [ 67.099294] capability: warning: `syz-executor3' uses 32-bit capabilities (legacy support in use) [ 67.198332] rdma_op 00000000c379b8ca conn xmit_rdma (null) 2018/04/20 18:39:28 executing program 0: mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/20 18:39:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00002a6ff7)='vegas\x00', 0x6) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000280)="b3", 0x1, 0x20020007, &(0x7f0000e97fcf)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) 2018/04/20 18:39:28 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000000000000000000101008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time={0x0, 0x989680}}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/20 18:39:28 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000000c0)={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 2018/04/20 18:39:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x3fffa, 0x0) fcntl$setstatus(r0, 0x4, 0x0) write$binfmt_misc(r0, &(0x7f0000001540)=ANY=[@ANYBLOB="73797a3170ff0f7c61d42470bc8d84d9baa99f5433e6d86193a534685f2b6f8599bdba579bc87e4e44c6033a22a9da2382a79164e628ae5f407b2005e8571e1f62eb7523e378e7acde30905d655394664b68a1c7f1663883f971b50261f4477c3f83c33a02127be1cdda3a3a21275a01d89dfbb067a424d3d15cfd8b38946ed86b7da71fee8b4c9b9e37d32c6667d055c3cdce8d830f8cd7d6ba19af45fddbc295157a33c1ebcaec326bb1b956b21cc465f90efa0aeee643197ecd09026e7026c1f5b1066731dedcb59a14ff26b791aab3ec465f0ebfb15ed7ddd41154b7891fedc995598dfa9633ef1ea454b2b506aad7773d0fcce2cbf57eeae12e36e76c0f0f17f3ba642985551dfc793ac348646c1f803f6e112ac79a17fcf3cad4e8ce5720ddf98012d108a198992b5e7acd055cb0a98eb8d3b03cd85e69075181aae0a70ebb168c9cd622b423f89e4a9a2b0bcf422a196cffff80020beb85e8d741f1fa5edabf1861a64c69eebbe88c4b20b2afba64f869820f69456fe74a2264ee9fcc7b53ce6e0b8bf97c82898dfe4bb71e07ee0bc31915054de770c624b11f07ad4e1efb0f6486acc5b753da022ca5cc1075e2baec0f460fdfe046903dfb37b21ff4857d537cc53b191af3220d8066f38f5b2b04205f6d3853c91f6e74b5c7f900719626de909f2eee7276021b1d73da45e57891e7755bd400ed40ca8535ee8187bf50"], 0x201) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f"], 0x1) sendfile(r0, r0, 0x0, 0x4e) 2018/04/20 18:39:28 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/20 18:39:28 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @broadcast=0xffffffff}}}}, &(0x7f0000000000)=0xb0) 2018/04/20 18:39:28 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg(r0, &(0x7f0000000a40)={&(0x7f00000002c0)=@in6={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000340)="193afd2c601eca916d878588b5", 0xd}], 0x1, &(0x7f0000000440)}, 0x8001) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180)=[{&(0x7f00000012c0)="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", 0x5a0}], 0x1}, 0x8000) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x4, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f00009f0ffc), 0x4) 2018/04/20 18:39:28 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, 0x10) [ 68.433457] rpcbind: RPC call returned error 22 [ 68.442869] rpcbind: RPC call returned error 22 2018/04/20 18:39:28 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={"d208d7f6300000ae000000880000e710", 0x101}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={"d208d7f6300000ae000000880000e710", 0x101}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'bcsh0\x00', 0x400}) 2018/04/20 18:39:28 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300)="1004000000100000cc000000490b0000ec0300ed00000000000000000000000000200000002000fa6f90fd0000000000e95dbe5a0000ffff53ef01471d28c30001000000e95dbe5a00000000000000000100000000000000848d000080", 0x5d, 0x400}], 0x0, &(0x7f00000002c0)) 2018/04/20 18:39:28 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000014000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1, &(0x7f0000001780)=""/254, 0xfe}, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r2, &(0x7f0000001b00)=[{{&(0x7f0000000180)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0x10}], 0x204}}], 0x2, 0x0) [ 68.644825] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 68.652390] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 68.688263] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 68.695834] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 68.776804] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 68.784441] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 68.814325] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 68.821944] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 2018/04/20 18:39:29 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg(r0, &(0x7f0000000a40)={&(0x7f00000002c0)=@in6={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000340)="193afd2c601eca916d878588b5", 0xd}], 0x1, &(0x7f0000000440)}, 0x8001) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180)=[{&(0x7f00000012c0)="75cd09a79e09d4814091ecb0eae3e8b1f8be00426c70ec738ae78cb588143292279003043419fa2986b33021848f80f8e4e10baa95d2b36df2b01a5a4799de8da08cf29840bf25e36e395cff64b8a38f9f7e6891600d97d67d5d9217e062f29993c9b940c6ed3e6dbaac5bb139744f5003d57c10c3a5afeca6f58a0da3467f018e9e6c5467aa4bdf32015a1412e4bd9b42aeafa4169a842e2eb257f9532e36449e8dc8d7a17f4324faf5f208799f45c8b2ba642d75380a2b7c8092e7f1037b00f8f0ffef505cab761150d81f278a5ec0fa89c8a1225376332aad3f1b2346a257552cf7be1d6b0e4885d5e8a4d281db88f542079e7f8e29b1755589a7a1bd32ee54da410bebd9efae3253d027a06e502659350bd3c725623600cfe1240986d34d4aa38472f134df5c70ca5772507553a8c19a83e3a8bb706e0af134079a2ee3a3ae846bb3a7aceac5cbf0b04ec3e61952c8ac4d94413d05da57bc663be9a91eab74da9237887454e6868519be898141a7d2c6f2d3689de7249c1be92c203560ee19f4f594110683fa77826808bcd2ef299dbed826cbf8d21b4ac3ce9dd8bc7edb6149bea4a1b463a634fa34b160d2c163322de54b58f271b3f0529387034011984b41cac30b7d05c4c47e15a9ccef0be4a14f122ceec987337e26a5e1ec4cb2fc97dd9f9901037c9cbe7ce16ade5b1ed2af8d95ffc9b2a6cc56edce43fe7f6c37c75fbccb33fc83cdbb0e1b120e13287f9b62ad54fe46923ca2233cde5b0616449c91726c38d748fc61a6be899d70df2b510a01332a56240de560ebae8fe3af1b4891202da55ed8508ae81caf12ba94ad024d2a6d4a2edc22064c8ece8db6588f20d153eb9d15bf456c436c501fd25a1669741cfea774e8dfcd133ba2d3bc146838d6ca27ed63c76dd7cd3c6ebca12e44cf259e8a67c57476aa91ddafa19b5f8fb68f5719e6f1dc4155a7c232557c4b1e5acada1eb1388be003c7121513526b552dec6eab38965f2b5f4b04cdfb5291156dc7518e68bb6aabb94f8cb8f04bf09a820da479d73aa8ba34d83ab8c6a9e7f4aa4781b6338531aa4e1676359814a0bd5f7765367e0dd7a1c148f647e244481ef22c8d32043e27ff4d4df50d158a14206f9a51fdb1a9bda48c7a426468b9c611ce653395bfaf0b72a9a1c2e2cf40c7345848c81f9e389eaae2ce05bd306b6ba45e4f2fa0bbce104da61490be6d45a9e987445916463add0f75d6742f3ddddcb2c52ba51a11ff4cbf154d6776d7f31fa5baeee70e3287d159a925858b172764d503bcba73e25dd2d15f0bd4d69c9f45dcc83bd84637518a40665be0a196bbed273c03249956ebcb33febbe3acdc7427bff9ec016293061e11651d869c9755f93e1b1fbfd74920bbfc46497825025c40ab0a625c6294ecb5e12e2257488adf758d595b347072a955f37d037613744585493d68eb226a972b66a583c7d6075a78d2eb45c3bd29f0c0c7f355cff988f4dd9360bdef99af0903ec7e62f7c2fc216eb57081c73fc739dc3bca325c2fb01bb65eee6dfe34983b4bc9ee8b0ba03dee1277c2ed4792d14404f497b012043d9da333041b1b639c3f9ccb5bc2279ed195c4454b3499575cd9767f33b2b4d035542179433797def259fcae66d3d605e7b61e71afbb2111645795b7ba94d4156ec643ac6623e95fd2bbae5dba7cbbe791314c472af3a823751373918df52a6d57ef4a0ef98fefc1af163037766a0c027f378a903416eba9d77be5ec24a0bf5959abbe3115e646ac3b108d92ca83b735c731a010d0a8edc328096360730cd1f9e4ea6f2b1db0741a614eebaa9a4035cc8fc063df1418869c5bf6772f2db898db2973afa5be59f0fc54891b2013f722cb4b1a0a4a5bb14b57541ab5bd3c0a1be80dedbbf1c314fb9f796ff4111305ea22d8980f60a5702432b9cae69ae064c1a3b5ddab72ee2824c69fa9e6c63d8ef8f54985bc955f924d1fa1c33fe91951cf3c28e5b534df9c324a001a7e03fa75161d8afc65efde76cd568dfdcca64f28b6a645aeeb76", 0x5a0}], 0x1}, 0x8000) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x4, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f00009f0ffc), 0x4) 2018/04/20 18:39:29 executing program 0: mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/20 18:39:29 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/20 18:39:29 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000010, 0x1000000000803, 0x0) sendmsg$nl_route(r0, &(0x7f00009cc000)={&(0x7f00002e5000)={0x10}, 0xc, &(0x7f0000b2b000)={&(0x7f0000efb000)=@newneigh={0x30, 0x1c, 0x301, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0xb}, [@NDA_DST_IPV6={0x14, 0x1, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}]}, 0x30}, 0x1}, 0x0) 2018/04/20 18:39:29 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000014000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1, &(0x7f0000001780)=""/254, 0xfe}, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r2, &(0x7f0000001b00)=[{{&(0x7f0000000180)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0x10}], 0x204}}], 0x2, 0x0) 2018/04/20 18:39:29 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'bond_slave\x00', 0xfffffffffffffffc}) 2018/04/20 18:39:29 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000000000000000000101008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time={0x0, 0x989680}}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/20 18:39:29 executing program 2: mkdir(&(0x7f000043eff8)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@known='security.capability\x00', &(0x7f0000000400)=""/200, 0xc8) [ 69.407885] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 69.415420] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 69.438166] syz-executor1 uses obsolete (PF_INET,SOCK_PACKET) 2018/04/20 18:39:29 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000000000000000000101008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time={0x0, 0x989680}}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 69.471128] rpcbind: RPC call returned error 22 [ 69.487875] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 69.495515] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 2018/04/20 18:39:29 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/20 18:39:29 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000000000000000000101008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time={0x0, 0x989680}}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/20 18:39:29 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg(r0, &(0x7f0000000a40)={&(0x7f00000002c0)=@in6={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000340)="193afd2c601eca916d878588b5", 0xd}], 0x1, &(0x7f0000000440)}, 0x8001) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180)=[{&(0x7f00000012c0)="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", 0x5a0}], 0x1}, 0x8000) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x4, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f00009f0ffc), 0x4) [ 69.549378] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 69.556918] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 2018/04/20 18:39:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x5411, &(0x7f0000000200)={'ip6_vti0\x00'}) 2018/04/20 18:39:29 executing program 1: r0 = socket$netlink(0xa, 0x5, 0x0) r1 = dup2(r0, r0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x12, &(0x7f0000000180), 0x4) 2018/04/20 18:39:29 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000014000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1, &(0x7f0000001780)=""/254, 0xfe}, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r2, &(0x7f0000001b00)=[{{&(0x7f0000000180)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0x10}], 0x204}}], 0x2, 0x0) 2018/04/20 18:39:29 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/20 18:39:29 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/20 18:39:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000140)=""/8, &(0x7f00000000c0)=0x8) [ 69.826397] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 69.833996] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 69.880367] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 69.887989] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 69.935252] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 69.942828] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 2018/04/20 18:39:30 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2275, &(0x7f0000000180)) 2018/04/20 18:39:30 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg(r0, &(0x7f0000000a40)={&(0x7f00000002c0)=@in6={0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000340)="193afd2c601eca916d878588b5", 0xd}], 0x1, &(0x7f0000000440)}, 0x8001) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180)=[{&(0x7f00000012c0)="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", 0x5a0}], 0x1}, 0x8000) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f00009f0ffc), 0x4) 2018/04/20 18:39:30 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/20 18:39:30 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='..', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(r1, &(0x7f00000010c0)=""/4096, 0x1000) 2018/04/20 18:39:30 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000000000000000000101008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time={0x0, 0x989680}}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/20 18:39:30 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000014000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1, &(0x7f0000001780)=""/254, 0xfe}, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x3}, 0x10) sendmmsg(r2, &(0x7f0000001b00)=[{{&(0x7f0000000180)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0x10}], 0x204}}], 0x2, 0x0) 2018/04/20 18:39:30 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000000000000000000101008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time={0x0, 0x989680}}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/20 18:39:30 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000c03000)=[@in={0x2}], 0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0), &(0x7f0000000000)=0x8) [ 70.732844] ================================================================== [ 70.740288] BUG: KMSAN: uninit-value in raw6_local_deliver+0x259/0x1ac0 [ 70.747053] CPU: 1 PID: 5904 Comm: syz-executor4 Not tainted 4.16.0+ #84 [ 70.753896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.763257] Call Trace: [ 70.765845] [ 70.768008] dump_stack+0x185/0x1d0 [ 70.771642] ? raw6_local_deliver+0x259/0x1ac0 [ 70.776226] kmsan_report+0x142/0x240 [ 70.780035] __msan_warning_32+0x6c/0xb0 [ 70.784099] ? ip6_input_finish+0x55c/0x2110 [ 70.788504] raw6_local_deliver+0x259/0x1ac0 [ 70.792922] ip6_input_finish+0x55c/0x2110 [ 70.797161] ? ip6table_filter_hook+0xb5/0xe0 [ 70.801659] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 70.807032] ip6_mc_input+0x697/0x740 [ 70.810841] ? ip6_input+0x320/0x320 [ 70.814566] ? ip6_input_finish+0x2110/0x2110 [ 70.819060] ipv6_rcv+0x20ec/0x26d0 [ 70.822686] ? local_bh_enable+0x40/0x40 [ 70.826764] __netif_receive_skb_core+0x47cf/0x4a80 [ 70.831781] ? try_to_wake_up+0x1ab2/0x20a0 [ 70.836108] ? kmsan_internal_memset_shadow_inline+0xc0/0xd0 [ 70.841910] ? ip6_rcv_finish+0x4d0/0x4d0 [ 70.846058] process_backlog+0x62d/0xe20 [ 70.850128] ? rps_trigger_softirq+0x2f0/0x2f0 [ 70.854716] net_rx_action+0x7c1/0x1a70 [ 70.858703] ? net_tx_action+0xab0/0xab0 [ 70.862772] __do_softirq+0x56d/0x93d [ 70.866582] do_softirq_own_stack+0x2a/0x40 [ 70.870897] [ 70.873134] do_softirq+0xb6/0xf0 [ 70.876590] dev_loopback_xmit+0x8b0/0x900 2018/04/20 18:39:30 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, 0x10) 2018/04/20 18:39:30 executing program 6: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r0, &(0x7f0000000100)=ANY=[], 0x1023c) [ 70.880833] ip6_finish_output2+0x5e6/0x1f20 [ 70.885245] ? validate_xmit_skb+0x1320/0x1320 [ 70.889828] ? ip6_fragment+0x327b/0x5150 [ 70.893981] ip6_fragment+0x32e6/0x5150 [ 70.897954] ? ip6_make_skb+0x1100/0x1100 [ 70.902137] ip6_finish_output+0x96c/0xc00 [ 70.906381] ip6_output+0x597/0x6c0 [ 70.910007] ? ip6_output+0x6c0/0x6c0 [ 70.913810] ? ac6_seq_show+0x200/0x200 [ 70.917785] ip6_local_out+0x573/0x640 [ 70.921678] ? __ip6_local_out+0x4f0/0x4f0 [ 70.925949] ip6_send_skb+0xfa/0x380 [ 70.929668] udp_v6_send_skb+0x116a/0x1880 2018/04/20 18:39:30 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, 0x10) [ 70.933925] udp_v6_push_pending_frames+0x248/0x340 [ 70.938950] udp_lib_setsockopt+0x4c9/0xad0 [ 70.943277] ? udp_v6_send_skb+0x1880/0x1880 [ 70.947698] udpv6_setsockopt+0x1aa/0x1c0 [ 70.951854] ? udpv6_destroy_sock+0x260/0x260 [ 70.956354] sock_common_setsockopt+0x136/0x170 [ 70.961027] ? sock_common_recvmsg+0x270/0x270 [ 70.965614] SYSC_setsockopt+0x4b8/0x570 [ 70.969685] SyS_setsockopt+0x76/0xa0 [ 70.973492] do_syscall_64+0x309/0x430 [ 70.977380] ? SYSC_recv+0xe0/0xe0 2018/04/20 18:39:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000f43ffc)=0xfffffffffffffffb, 0x4) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000840)={@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x0, 0x4}) [ 70.980922] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 70.986107] RIP: 0033:0x455379 [ 70.989293] RSP: 002b:00007fa0a6894c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 70.997002] RAX: ffffffffffffffda RBX: 00007fa0a68956d4 RCX: 0000000000455379 [ 71.004268] RDX: 0000000000000001 RSI: 0000000000000011 RDI: 0000000000000013 [ 71.011537] RBP: 000000000072bea0 R08: 0000000000000004 R09: 0000000000000000 [ 71.018807] R10: 00000000209f0ffc R11: 0000000000000246 R12: 00000000ffffffff [ 71.026075] R13: 000000000000056c R14: 00000000006fb2c0 R15: 0000000000000000 [ 71.033345] [ 71.034966] Uninit was stored to memory at: [ 71.039294] kmsan_internal_chain_origin+0x12b/0x210 [ 71.044396] kmsan_memcpy_origins+0x11d/0x170 [ 71.048889] kmsan_memmove_origins+0x9/0x10 [ 71.053210] __msan_memmove+0xda/0x130 [ 71.057095] ipv6_frag_rcv+0x5055/0x6970 [ 71.061154] ip6_input_finish+0xa62/0x2110 [ 71.065388] ip6_mc_input+0x697/0x740 [ 71.069187] ipv6_rcv+0x20ec/0x26d0 [ 71.072815] __netif_receive_skb_core+0x47cf/0x4a80 [ 71.077825] process_backlog+0x62d/0xe20 2018/04/20 18:39:31 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3}, 0x1c) listen(r0, 0x1008005) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000014000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1, &(0x7f0000001780)=""/254, 0xfe}, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg(r2, &(0x7f0000001b00)=[{{&(0x7f0000000180)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000680)=@sco={0x1f}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0x10}], 0x204}}], 0x2, 0x0) [ 71.081894] net_rx_action+0x7c1/0x1a70 [ 71.085869] __do_softirq+0x56d/0x93d [ 71.089653] Uninit was created at: [ 71.093193] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 71.098295] kmsan_kmalloc+0x94/0x100 [ 71.102095] kmsan_slab_alloc+0x11/0x20 [ 71.106067] __kmalloc_node_track_caller+0xaed/0x11c0 [ 71.111255] __alloc_skb+0x2cf/0x9f0 [ 71.114967] alloc_skb_with_frags+0x1d4/0xb20 [ 71.119462] sock_alloc_send_pskb+0xb56/0x1190 [ 71.124042] sock_alloc_send_skb+0xca/0xe0 [ 71.128275] __ip6_append_data+0x3387/0x4bb0 2018/04/20 18:39:31 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f0000421000), 0x8) r1 = dup(r0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000001080)=""/245, 0xf5}], 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000029000)) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000080)=""/4096, 0x6a8}], 0x1) signalfd4(r0, &(0x7f0000001180), 0x8, 0x0) [ 71.132680] ip6_append_data+0x40e/0x6b0 [ 71.136768] udpv6_sendmsg+0xfd5/0x45b0 [ 71.140758] inet_sendmsg+0x48d/0x740 [ 71.144560] ___sys_sendmsg+0xec0/0x1310 [ 71.148622] SYSC_sendmsg+0x2a3/0x3d0 [ 71.152426] SyS_sendmsg+0x54/0x80 [ 71.155972] do_syscall_64+0x309/0x430 [ 71.159860] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 71.165039] ================================================================== [ 71.172387] Disabling lock debugging due to kernel taint [ 71.177829] Kernel panic - not syncing: panic_on_warn set ... [ 71.177829] 2018/04/20 18:39:31 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14}}, 0x10) [ 71.185192] CPU: 1 PID: 5904 Comm: syz-executor4 Tainted: G B 4.16.0+ #84 [ 71.193326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.202675] Call Trace: [ 71.205258] [ 71.207414] dump_stack+0x185/0x1d0 [ 71.211048] panic+0x39d/0x940 [ 71.214261] ? raw6_local_deliver+0x259/0x1ac0 [ 71.218843] kmsan_report+0x238/0x240 [ 71.222648] __msan_warning_32+0x6c/0xb0 [ 71.226718] ? ip6_input_finish+0x55c/0x2110 [ 71.231124] raw6_local_deliver+0x259/0x1ac0 [ 71.235551] ip6_input_finish+0x55c/0x2110 [ 71.239797] ? ip6table_filter_hook+0xb5/0xe0 [ 71.244295] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 71.249664] ip6_mc_input+0x697/0x740 [ 71.253487] ? ip6_input+0x320/0x320 [ 71.257824] ? ip6_input_finish+0x2110/0x2110 [ 71.262322] ipv6_rcv+0x20ec/0x26d0 [ 71.265957] ? local_bh_enable+0x40/0x40 [ 71.270030] __netif_receive_skb_core+0x47cf/0x4a80 [ 71.275049] ? try_to_wake_up+0x1ab2/0x20a0 [ 71.279379] ? kmsan_internal_memset_shadow_inline+0xc0/0xd0 [ 71.285184] ? ip6_rcv_finish+0x4d0/0x4d0 [ 71.289334] process_backlog+0x62d/0xe20 [ 71.293413] ? rps_trigger_softirq+0x2f0/0x2f0 [ 71.297996] net_rx_action+0x7c1/0x1a70 [ 71.301978] ? net_tx_action+0xab0/0xab0 [ 71.306043] __do_softirq+0x56d/0x93d [ 71.309853] do_softirq_own_stack+0x2a/0x40 [ 71.314169] [ 71.316410] do_softirq+0xb6/0xf0 [ 71.319864] dev_loopback_xmit+0x8b0/0x900 [ 71.324105] ip6_finish_output2+0x5e6/0x1f20 [ 71.328520] ? validate_xmit_skb+0x1320/0x1320 [ 71.333106] ? ip6_fragment+0x327b/0x5150 [ 71.337265] ip6_fragment+0x32e6/0x5150 [ 71.341241] ? ip6_make_skb+0x1100/0x1100 [ 71.345411] ip6_finish_output+0x96c/0xc00 [ 71.349654] ip6_output+0x597/0x6c0 [ 71.353280] ? ip6_output+0x6c0/0x6c0 [ 71.357082] ? ac6_seq_show+0x200/0x200 [ 71.361056] ip6_local_out+0x573/0x640 [ 71.364946] ? __ip6_local_out+0x4f0/0x4f0 [ 71.369185] ip6_send_skb+0xfa/0x380 [ 71.372905] udp_v6_send_skb+0x116a/0x1880 [ 71.377149] udp_v6_push_pending_frames+0x248/0x340 2018/04/20 18:39:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x4009, 0x2}, 0x10}, 0x1}, 0x0) [ 71.382167] udp_lib_setsockopt+0x4c9/0xad0 [ 71.386487] ? udp_v6_send_skb+0x1880/0x1880 [ 71.390900] udpv6_setsockopt+0x1aa/0x1c0 [ 71.395056] ? udpv6_destroy_sock+0x260/0x260 [ 71.399553] sock_common_setsockopt+0x136/0x170 [ 71.404316] ? sock_common_recvmsg+0x270/0x270 [ 71.408897] SYSC_setsockopt+0x4b8/0x570 [ 71.413054] SyS_setsockopt+0x76/0xa0 [ 71.416854] do_syscall_64+0x309/0x430 [ 71.420743] ? SYSC_recv+0xe0/0xe0 [ 71.424289] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 71.429475] RIP: 0033:0x455379 [ 71.432667] RSP: 002b:00007fa0a6894c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 71.440381] RAX: ffffffffffffffda RBX: 00007fa0a68956d4 RCX: 0000000000455379 [ 71.447648] RDX: 0000000000000001 RSI: 0000000000000011 RDI: 0000000000000013 [ 71.454915] RBP: 000000000072bea0 R08: 0000000000000004 R09: 0000000000000000 [ 71.462181] R10: 00000000209f0ffc R11: 0000000000000246 R12: 00000000ffffffff [ 71.469442] R13: 000000000000056c R14: 00000000006fb2c0 R15: 0000000000000000 [ 71.477230] Dumping ftrace buffer: [ 71.480769] (ftrace buffer empty) [ 71.484453] Kernel Offset: disabled [ 71.488054] Rebooting in 86400 seconds..