INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.41' (ECDSA) to the list of known hosts. 2018/04/20 03:16:05 fuzzer started 2018/04/20 03:16:05 dialing manager at 10.128.0.26:41811 2018/04/20 03:16:12 kcov=true, comps=false 2018/04/20 03:16:14 executing program 0: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x3e, &(0x7f0000000200)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000140)) 2018/04/20 03:16:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000c26000)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='highspeed\x00', 0xa) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x800000020000000, &(0x7f0000000080)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff}, 0x14) sendto$inet(r0, &(0x7f0000000180)="ae", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2018/04/20 03:16:14 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001f00)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0xfffffffffffffe49) 2018/04/20 03:16:14 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) 2018/04/20 03:16:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c74f45b5a8c9ca04795f1d17187657200410000090000000000000000000000000000000000091390831a9e81a1e42297e28da2f13f268d796153efda41a27b1afb714a2bcd5e733de80cc0743ea9967f698ba0a75206a0edb8b9e7f82e16b72b4ebd2f2926a71208d48d5c70e4b14678e70d02d24b1bade98aee46fbc7bed10d45601dfc19fa23645d9884df41b0b73e05514bf241c0badcb084e319d28c93eefa256007e512c73ee58df686b47d443b1ef0184620e6e6607cbf0c16194946c254e681443bc29c6f177b6bc42785ddba24"], &(0x7f0000000340)=0x1) 2018/04/20 03:16:14 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/20 03:16:14 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@fragment, 0x8) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=""/240, &(0x7f0000000000)=0xf0) 2018/04/20 03:16:14 executing program 3: setrlimit(0x7, &(0x7f0000000000)) inotify_init1(0x0) syzkaller login: [ 44.105176] ip (3702) used greatest stack depth: 54688 bytes left [ 44.253179] ip (3717) used greatest stack depth: 54672 bytes left [ 44.624491] ip (3753) used greatest stack depth: 54408 bytes left [ 45.471841] ip (3840) used greatest stack depth: 54200 bytes left [ 45.632972] ip (3852) used greatest stack depth: 53960 bytes left [ 45.873058] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.879559] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.919366] device bridge_slave_0 entered promiscuous mode [ 45.976459] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.982945] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.014939] device bridge_slave_0 entered promiscuous mode [ 46.055118] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.061585] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.093909] device bridge_slave_0 entered promiscuous mode [ 46.114312] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.120756] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.145267] device bridge_slave_1 entered promiscuous mode [ 46.156421] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.162859] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.210173] device bridge_slave_0 entered promiscuous mode [ 46.225663] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.232121] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.247630] device bridge_slave_0 entered promiscuous mode [ 46.257015] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.263546] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.274762] device bridge_slave_0 entered promiscuous mode [ 46.288231] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.294697] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.312867] device bridge_slave_0 entered promiscuous mode [ 46.330106] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.336540] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.355909] device bridge_slave_0 entered promiscuous mode [ 46.369633] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.376123] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.387654] device bridge_slave_1 entered promiscuous mode [ 46.394175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.401730] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.408206] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.428463] device bridge_slave_1 entered promiscuous mode [ 46.449499] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.456084] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.481614] device bridge_slave_1 entered promiscuous mode [ 46.491684] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.498142] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.516964] device bridge_slave_1 entered promiscuous mode [ 46.528711] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.535170] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.554927] device bridge_slave_1 entered promiscuous mode [ 46.561633] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.568132] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.584742] device bridge_slave_1 entered promiscuous mode [ 46.594339] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.603740] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.613236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.620525] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.627052] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.681675] device bridge_slave_1 entered promiscuous mode [ 46.691005] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.715655] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.739168] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.753878] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.791322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.811473] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.887819] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.902065] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.922631] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.979608] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.019991] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.096662] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.624787] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.686901] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.804680] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.818678] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.910167] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.932377] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.941066] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.948669] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.964484] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.058405] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.089749] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.138766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.156373] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.164664] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.210227] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.309166] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.771908] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 48.974562] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 48.987319] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.056190] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.070067] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.138659] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.163537] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.177992] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.211697] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.220431] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.230069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.242741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.286879] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.300137] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.307353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.340529] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.384789] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.400772] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.414303] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.428210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.446891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.481994] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.489651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.522789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.557162] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.565180] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.572277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.584681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.597485] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.612574] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.619745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.635608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.660716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.689836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.711990] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.719813] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.726950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.739306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.754318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.762678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.773343] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.787305] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.797126] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.813178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.842976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.878766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.909075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.934126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.948667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.963263] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.974414] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.985178] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.992980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.003830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.019907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.044343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.059591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.068273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.077932] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.085761] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.094573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.116226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.133522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.151088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.956433] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.962930] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.969782] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.976251] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.039974] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.046527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.067110] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.073563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.080384] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.086821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.140901] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.165941] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.172421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.179315] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.185772] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.247934] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.261277] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.267729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.274555] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.280987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.349915] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.365591] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.372100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.378926] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.385364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.432166] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.439250] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.445715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.452553] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.458993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.480925] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.488539] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.494964] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.501744] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.508201] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.515948] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.531380] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.537829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.544687] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.551132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.634938] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.087156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.109815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.144150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.180335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.202661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.218774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.226811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.222878] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.261193] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.458644] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.515080] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.539049] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.702873] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.954136] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.960407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.967985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.025709] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.033935] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.040178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.048795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.101738] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.268123] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.274400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.290636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.322968] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.329216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.348733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.389119] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.395430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.409136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.595798] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.602311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.611971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.847985] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.854274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.866577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.977513] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.983800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.995939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/20 03:16:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="9421e5271f45907f567d604a09fe27abfa55e2aebecfe4a0aeda13b3d2418870405797686467855ad166a77fa809f72ab92d438b38975596f98c0c03126989f5a4a3fe4878335988dfb98b11d880cc928c21fccdcf2086d98e2ac4ab265ff234ba0a86ee14bbb2bf4cc210f6ca6a5d3d18d3110ac82704ac8a979bebe6ea1a803cb5a21babf0a28c6741f5493a7189c764564aa039257ce92830f1a25bb6fb553231195be0ff72269d4b8503dbb0bc6c23f0341aa626735a002006f6c2b036efa5d1e087ee6181ffb3", 0xc9}], 0x1}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000cc0)=[{{&(0x7f0000000040)=@l2={0x1f}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000440)='m', 0x1}], 0x1, 0x0, 0x0, 0x20000080}}, {{&(0x7f00000009c0)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(authenc(sha512-avx,chacha20))\x00'}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000bc0)="e016a239bdc733171f3344933b8d5e43c028de543216e4ea3f6ebc6e6fbc48707f8f3d73de2a9fd20c46933faf6abbb4c6353b19b0218433e2e39496b29ee470dd98ae8e1d9f512e3fbd157c0bfa4002174efa5e65d9ced370da7f4eb03a60fd", 0x60}], 0x1, &(0x7f00000011c0)}}], 0x2, 0x0) 2018/04/20 03:16:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000f8ff4)={@multicast2=0xe0000002, @loopback=0x7f000001, @broadcast=0xffffffff}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001, @broadcast=0xffffffff}, 0xc) 2018/04/20 03:16:41 executing program 7: 2018/04/20 03:16:41 executing program 2: 2018/04/20 03:16:41 executing program 3: 2018/04/20 03:16:41 executing program 6: 2018/04/20 03:16:41 executing program 1: 2018/04/20 03:16:41 executing program 5: r0 = socket(0x11, 0x803, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @multicast2=0xe0000002}, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x0, {0x2, 0x0, @multicast1=0xe0000001}}) 2018/04/20 03:16:41 executing program 4: 2018/04/20 03:16:41 executing program 6: 2018/04/20 03:16:41 executing program 2: 2018/04/20 03:16:41 executing program 4: 2018/04/20 03:16:41 executing program 3: 2018/04/20 03:16:41 executing program 7: 2018/04/20 03:16:41 executing program 1: 2018/04/20 03:16:41 executing program 5: 2018/04/20 03:16:41 executing program 0: 2018/04/20 03:16:41 executing program 2: 2018/04/20 03:16:41 executing program 6: 2018/04/20 03:16:41 executing program 4: 2018/04/20 03:16:41 executing program 1: 2018/04/20 03:16:41 executing program 3: 2018/04/20 03:16:41 executing program 5: 2018/04/20 03:16:41 executing program 7: 2018/04/20 03:16:41 executing program 6: 2018/04/20 03:16:41 executing program 0: 2018/04/20 03:16:41 executing program 2: 2018/04/20 03:16:42 executing program 5: 2018/04/20 03:16:42 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f00006a6fc8)={&(0x7f0000218000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000f1dfc0), 0x0, &(0x7f0000000080)}, 0x0) 2018/04/20 03:16:42 executing program 4: 2018/04/20 03:16:42 executing program 1: 2018/04/20 03:16:42 executing program 0: 2018/04/20 03:16:42 executing program 3: 2018/04/20 03:16:42 executing program 7: 2018/04/20 03:16:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000008106b1a777527c099810398cd53572f35bbed06af38a96e6ef05b81732465c122a8b8bb3d2ddd55c0b327b1d573d3340c132b19efe979aeb0fdae45b9a0efc00bf7c69f95c", @ANYBLOB="0108000000000000000010000000"], 0x2}, 0x1}, 0x0) readv(r0, &(0x7f0000000640)=[{&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/107, 0x10}], 0x58) sendmsg$nl_generic(r0, &(0x7f00000003c0)={&(0x7f0000000800)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000001000)={0x14, 0x42, 0x2ff}, 0x14}, 0x1}, 0x0) 2018/04/20 03:16:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0x100000012) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={"d202b999cf8500015d750088f301e710", 0x103}) 2018/04/20 03:16:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) fcntl$getflags(r0, 0x1) write(0xffffffffffffffff, &(0x7f0000a6b000), 0x0) 2018/04/20 03:16:42 executing program 1: 2018/04/20 03:16:42 executing program 7: 2018/04/20 03:16:42 executing program 3: 2018/04/20 03:16:42 executing program 4: 2018/04/20 03:16:42 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030efee)='/dev/loop-control\x00', 0x0, 0x0) msgrcv(0x0, &(0x7f0000000080)={0x0, ""/219}, 0xe3, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 2018/04/20 03:16:42 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000300)=0x400002, 0xfffffffffffffefd) 2018/04/20 03:16:42 executing program 7: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x2}, 0x1c) 2018/04/20 03:16:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@fragment, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f000042d000)=@routing={0x0, 0x2, 0x2, 0x80000001, 0x0, [@mcast1={0xff, 0x1, [], 0x1}]}, 0x18) 2018/04/20 03:16:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv6_delroute={0x1c, 0x19, 0x9, 0x0, 0x0, {0xa, 0xa0}}, 0x1c}, 0x1}, 0x0) 2018/04/20 03:16:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000000000000010007000000", @ANYBLOB="ffffff000a000200aaaaaaaaaaaa0000"], 0x2}, 0x1}, 0x0) 2018/04/20 03:16:43 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="1020f5f20100070009000000030000000c0000000900000002000000010000000000000000480000000000000d00000022000000020000000200000002000000020000001a000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)) 2018/04/20 03:16:43 executing program 2: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000687000)=0x5c802861, 0x4) bind$inet6(r0, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/20 03:16:43 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080), &(0x7f0000000140)=0x4) 2018/04/20 03:16:43 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000800)=0x1) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f000001cfb0)={0x0, 0x6, 0x0, 0x0, 0xf}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 2018/04/20 03:16:43 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000058000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000e5ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000026655d38ea0ca5a999a1a6c9ba57b9e54856a28675ab9e06e4"], 0x1) 2018/04/20 03:16:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x6, [], 0x1}}, 0x1c) sendmsg(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000005000), 0x0, &(0x7f0000000c00)}, 0x0) 2018/04/20 03:16:43 executing program 7: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000a6b000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) dup3(r0, r1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, r2, 0x100, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x48014) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 70.152734] netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/20 03:16:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f00002dfff4)={0x10}, 0xc, &(0x7f0000fd1000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000a0afd0400000000000000020000003f"], 0x14}, 0x1}, 0x0) 2018/04/20 03:16:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6970365f6d725f76696600f2ca6ee7867b3285340bf385c109364ccb7207702c829df780a8bc28e5c5fb182b4dd9b37968") readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000540)=""/107, 0x6b}], 0x1) 2018/04/20 03:16:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x800000000000003, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f00000001c0)="2700000014000707030e0000120f0a0011000000f6070000ff000000078a001f05080029007500", 0x27) 2018/04/20 03:16:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00007fbffd)='H', 0x1) sendfile(r1, r1, &(0x7f000079a000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x200000011, r1, 0x0) fchdir(r0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 2018/04/20 03:16:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000215ff0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x3a) write$binfmt_elf32(r0, &(0x7f0000001f00)=ANY=[], 0x0) sendto$inet(r0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) 2018/04/20 03:16:43 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080), &(0x7f0000000140)=0x4) 2018/04/20 03:16:43 executing program 7: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000a6b000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) dup3(r0, r1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, r2, 0x100, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x48014) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/20 03:16:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff00000002000000000300050000000000020000000000000000"], 0x59}, 0x1}, 0x0) 2018/04/20 03:16:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000040, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 70.599381] netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/20 03:16:43 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4000, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/20 03:16:43 executing program 5: mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=@random={'osx.', 'cgroup.procs\x00'}, &(0x7f0000000280)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000a6b000)="1f0000001104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(0xffffffffffffffff, &(0x7f0000000100)="1f0000000104fffffd3b54", 0xb) 2018/04/20 03:16:43 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080), &(0x7f0000000140)=0x4) 2018/04/20 03:16:43 executing program 3: semtimedop(0x0, &(0x7f0000000080)=[{}, {}], 0x2, &(0x7f00000000c0)={0x0, 0x1c9c380}) 2018/04/20 03:16:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000040, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/04/20 03:16:43 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f000033c000)=ANY=[@ANYBLOB="020d000010000000000000000000000003000600000000000200f53c31ebf8c70000000000000000030005000000000002000000000000000000000000000000080012000200000004010000000000001000001d00004100000000000000000000ffffe000000100000000000000000000000000000000000000000000000000"], 0x80}, 0x1}, 0x0) 2018/04/20 03:16:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000080)) 2018/04/20 03:16:43 executing program 0: clone(0x200, &(0x7f0000000140), &(0x7f00000000c0), &(0x7f0000000040), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000280), &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f00000e0000)='stack\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f00008ad000)=""/178, 0xb2}], 0x1) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x26102, 0x0) 2018/04/20 03:16:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x71, "b77bc1889d64c4d84a60dedcaec76e0a1e70ed22289c5d3f359740768f625267dbc9d0378bd2b4a50fb429ae724563bbec46306fdc1d669f0234c9a056faa9ef3c4b5c6a6761db5e9b4f3ca801fd4be8659ee7203df11ad3bb260518c83a8f0fd6e93e299de64938eac11204aed7506f24"}, &(0x7f0000000000)=0x79) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000500)}], 0x1, &(0x7f0000000000), 0x2d3}}], 0x2, 0x0) 2018/04/20 03:16:44 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000035d000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002004e207f0000010000000000001000030005000000000002004e20000300000000003a00000000080012000200010000ff2f00000002036404ef06a8939042c7000000003f00000040000200000000070000020000000000200102000000000000000000ffffe0000001"], 0x83}, 0x1}, 0x0) 2018/04/20 03:16:44 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1, &(0x7f0000000080)) 2018/04/20 03:16:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000040, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/04/20 03:16:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETSW(r0, 0x5402, &(0x7f0000590000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00001aa000)=[{&(0x7f00006aaf01)=""/255, 0xff}], 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) close(r0) 2018/04/20 03:16:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000000800)="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", 0x5c1, 0x4048004, &(0x7f0000001140)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/20 03:16:44 executing program 6: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080), &(0x7f0000000140)=0x4) 2018/04/20 03:16:44 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x100000000000001b, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) 2018/04/20 03:16:44 executing program 3: [ 71.863577] ================================================================== [ 71.870983] BUG: KMSAN: uninit-value in update_stack_state+0x673/0xa40 [ 71.877633] CPU: 1 PID: 5955 Comm: syz-executor0 Not tainted 4.16.0+ #84 [ 71.884448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.893777] Call Trace: [ 71.896347] dump_stack+0x185/0x1d0 [ 71.899960] ? update_stack_state+0x673/0xa40 [ 71.904435] kmsan_report+0x142/0x240 [ 71.908214] __msan_warning_32+0x6c/0xb0 [ 71.912265] update_stack_state+0x673/0xa40 [ 71.916580] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 71.922017] ? is_console_locked+0x14/0x50 [ 71.926240] ? kernel_text_address+0x248/0x3a0 [ 71.930800] ? kmsan_report+0x4c/0x240 [ 71.934671] unwind_next_frame+0x618/0xe50 [ 71.938910] __save_stack_trace+0x6d9/0xa80 [ 71.943221] ? __schedule+0x674/0x730 [ 71.947016] ? __msan_poison_alloca+0x15c/0x1d0 [ 71.951675] ? save_stack_trace_tsk+0x58/0x2f0 [ 71.956240] save_stack_trace_tsk+0x258/0x2f0 [ 71.960713] proc_pid_stack+0x26a/0x470 [ 71.964677] proc_single_show+0x1af/0x300 [ 71.968827] ? proc_pid_wchan+0x250/0x250 [ 71.972971] ? proc_single_open+0x90/0x90 [ 71.977104] seq_read+0xc7d/0x2260 [ 71.980638] do_iter_read+0x880/0xd70 [ 71.984428] ? seq_open+0x360/0x360 [ 71.988041] do_readv+0x295/0x5f0 [ 71.991485] ? syscall_return_slowpath+0xe9/0x700 [ 71.996316] SYSC_readv+0x9b/0xb0 [ 71.999753] SyS_readv+0x56/0x80 [ 72.003099] do_syscall_64+0x309/0x430 [ 72.006971] ? vfs_readv+0x260/0x260 [ 72.010670] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 72.015841] RIP: 0033:0x455379 [ 72.019016] RSP: 002b:00007f8b27b42c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 72.026715] RAX: ffffffffffffffda RBX: 00007f8b27b436d4 RCX: 0000000000455379 [ 72.033963] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000013 [ 72.041212] RBP: 000000000072bf58 R08: 0000000000000000 R09: 0000000000000000 [ 72.048461] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 72.055709] R13: 0000000000000495 R14: 00000000006f9e98 R15: 0000000000000001 [ 72.062960] [ 72.064567] Local variable description: ----invalid_mask@new_slab [ 72.070779] Variable was created at: [ 72.074477] new_slab+0x96/0x1bb0 [ 72.077911] ___slab_alloc+0x1512/0x1f60 [ 72.081949] ================================================================== [ 72.089291] Disabling lock debugging due to kernel taint [ 72.094725] Kernel panic - not syncing: panic_on_warn set ... [ 72.094725] [ 72.102074] CPU: 1 PID: 5955 Comm: syz-executor0 Tainted: G B 4.16.0+ #84 [ 72.110190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.119524] Call Trace: [ 72.122098] dump_stack+0x185/0x1d0 [ 72.125706] panic+0x39d/0x940 [ 72.128902] ? update_stack_state+0x673/0xa40 [ 72.133376] kmsan_report+0x238/0x240 [ 72.137159] __msan_warning_32+0x6c/0xb0 [ 72.141207] update_stack_state+0x673/0xa40 [ 72.145512] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 72.150943] ? is_console_locked+0x14/0x50 [ 72.155163] ? kernel_text_address+0x248/0x3a0 [ 72.159811] ? kmsan_report+0x4c/0x240 [ 72.163684] unwind_next_frame+0x618/0xe50 [ 72.167907] __save_stack_trace+0x6d9/0xa80 [ 72.172216] ? __schedule+0x674/0x730 [ 72.175999] ? __msan_poison_alloca+0x15c/0x1d0 [ 72.180659] ? save_stack_trace_tsk+0x58/0x2f0 [ 72.185227] save_stack_trace_tsk+0x258/0x2f0 [ 72.189707] proc_pid_stack+0x26a/0x470 [ 72.193666] proc_single_show+0x1af/0x300 [ 72.197800] ? proc_pid_wchan+0x250/0x250 [ 72.201929] ? proc_single_open+0x90/0x90 [ 72.206059] seq_read+0xc7d/0x2260 [ 72.209591] do_iter_read+0x880/0xd70 [ 72.213379] ? seq_open+0x360/0x360 [ 72.216989] do_readv+0x295/0x5f0 [ 72.220431] ? syscall_return_slowpath+0xe9/0x700 [ 72.225257] SYSC_readv+0x9b/0xb0 [ 72.228696] SyS_readv+0x56/0x80 [ 72.232049] do_syscall_64+0x309/0x430 [ 72.235921] ? vfs_readv+0x260/0x260 [ 72.239620] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 72.244791] RIP: 0033:0x455379 [ 72.247965] RSP: 002b:00007f8b27b42c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 72.255652] RAX: ffffffffffffffda RBX: 00007f8b27b436d4 RCX: 0000000000455379 [ 72.262901] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000013 [ 72.270152] RBP: 000000000072bf58 R08: 0000000000000000 R09: 0000000000000000 [ 72.277402] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 72.284651] R13: 0000000000000495 R14: 00000000006f9e98 R15: 0000000000000001 [ 72.292355] Dumping ftrace buffer: [ 72.295878] (ftrace buffer empty) [ 72.299561] Kernel Offset: disabled [ 72.303160] Rebooting in 86400 seconds..