INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.24' (ECDSA) to the list of known hosts. 2018/04/19 13:02:22 fuzzer started 2018/04/19 13:02:22 dialing manager at 10.128.0.26:37327 2018/04/19 13:02:29 kcov=true, comps=false 2018/04/19 13:02:32 executing program 0: 2018/04/19 13:02:32 executing program 1: 2018/04/19 13:02:32 executing program 7: 2018/04/19 13:02:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x407, 0x0, &(0x7f0000000d00)) 2018/04/19 13:02:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x19, 0x1000, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000000007", &(0x7f0000004800)=""/4096}, 0x28) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0xa2}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000200)) 2018/04/19 13:02:32 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg$kcm(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000180)}, 0x40) 2018/04/19 13:02:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x0, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={r0, &(0x7f00000004c0)="a3261c57c276e441238fea1c11", &(0x7f0000000500)="cd8249bf39d6176ef7346799ac198e6cf9e7fe02418812a394d9c874384d4ba7bd9d3b261f1a018d54c20e688a5dc8a23babc41d618eab351779e75823b114888aec7e01f2990bf771d3e605ac", 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000dc0)={r0, &(0x7f0000000c80)="a207348dba911f25859e1420a6885c8872172d0d651325cc74e9ff4bed3a7660db0e5a8b68fc5e183c90f3bf40fc07a0252df20cab376afe14fa36d288502ea826052788163a201682b42922b9bc09fc2cf2b48ac97fef8b5dacbcb82bf3d1414c70bf48393eb99e949f8db6caa213d4933bffed8e3179754f082895c15db7380aabda5d9827f0d7f3da2e10a1f2389b", &(0x7f0000000d40)=""/87}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r1, &(0x7f0000000280), &(0x7f0000000a40)=""/196}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000140), &(0x7f0000000240)=""/5}, 0x18) gettid() perf_event_open(&(0x7f0000000b40)={0x5, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x20, 0x104, 0x2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x4, 0x5, 0x7092a46d, 0x7, 0x100000001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7afbfa33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdec5, 0x5, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000c00)=0xffffffff, 0x4) 2018/04/19 13:02:32 executing program 6: syzkaller login: [ 44.028163] ip (3739) used greatest stack depth: 54672 bytes left [ 45.371014] ip (3869) used greatest stack depth: 54200 bytes left [ 45.917129] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.923628] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.965953] device bridge_slave_0 entered promiscuous mode [ 46.007502] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.013984] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.037949] device bridge_slave_0 entered promiscuous mode [ 46.054850] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.061358] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.083552] device bridge_slave_0 entered promiscuous mode [ 46.127963] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.134483] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.163131] device bridge_slave_0 entered promiscuous mode [ 46.177565] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.184133] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.194054] device bridge_slave_0 entered promiscuous mode [ 46.206728] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.213180] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.223565] device bridge_slave_0 entered promiscuous mode [ 46.239006] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.245502] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.259653] device bridge_slave_1 entered promiscuous mode [ 46.266705] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.273237] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.291970] device bridge_slave_0 entered promiscuous mode [ 46.306197] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.312677] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.334227] device bridge_slave_1 entered promiscuous mode [ 46.351237] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.357720] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.368134] device bridge_slave_0 entered promiscuous mode [ 46.377338] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.383807] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.394566] device bridge_slave_1 entered promiscuous mode [ 46.404921] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.414595] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.421167] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.446216] device bridge_slave_1 entered promiscuous mode [ 46.452795] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.459296] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.487630] device bridge_slave_1 entered promiscuous mode [ 46.511022] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.517535] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.540958] device bridge_slave_1 entered promiscuous mode [ 46.547411] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.553926] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.564768] device bridge_slave_1 entered promiscuous mode [ 46.582690] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.589226] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.610256] device bridge_slave_1 entered promiscuous mode [ 46.619753] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.629307] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.639741] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.649607] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.670508] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.688521] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.758996] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.802123] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.817762] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 46.841347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.857961] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.875922] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.932642] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 46.986393] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.013892] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.732665] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.791100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.843815] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.864988] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.873643] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.891341] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.943751] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 47.957110] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.986990] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.025075] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.044735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.058199] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.074447] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.087797] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.143152] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.216963] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.939568] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.011769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.038785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.069820] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.092763] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.102868] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.138967] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.186508] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.248366] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.259644] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.273871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.282775] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.293291] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.308449] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.327971] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.417776] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.429331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.446815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.495174] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.504763] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.518309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.529441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.550230] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.564425] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.571790] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.578960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.606084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.640626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.657756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.673576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.682517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.692873] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.708136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.715298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.726485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.734563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.743763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.752865] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.761165] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.769271] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.776715] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.784564] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.832664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.863607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.885125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.900772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.915244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.923082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.930841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.941259] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.951411] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.973015] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 49.983272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 49.997610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.017660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.043910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.066627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.085823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.108436] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.116653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.124795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.159602] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.168697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.180910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.994865] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.001380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.008287] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.014746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.044176] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.052417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.068599] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.075135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.081987] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.088454] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.099692] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.296693] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.303194] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.310078] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.316530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.351288] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.358401] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.364859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.371679] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.378127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.386173] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.412767] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.419246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.426165] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.432616] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.498357] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.507640] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.514205] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.521092] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.527564] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.577170] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.598267] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.604750] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.611576] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.618019] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.722965] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.734920] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.741387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.748526] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.754954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.772681] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.088263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.103224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.135330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.150411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.165673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.173164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.181248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.388197] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.668132] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.772327] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.906201] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 61.972827] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.049445] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.082923] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.169569] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.175863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.191167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.302147] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.417302] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.425572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.437716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.620971] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.627490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.638705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.711890] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.718173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.729671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.770261] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.778140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.814695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.837822] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.849462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.875497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.955361] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.961640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.973799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.120986] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.127346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.140615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/19 13:02:59 executing program 6: 2018/04/19 13:02:59 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x8, 0x1, 0x0, &(0x7f0000000080)) 2018/04/19 13:02:59 executing program 0: 2018/04/19 13:02:59 executing program 2: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0)="c0", 0x1, 0xfffffffffffffffb) keyctl$update(0x2, r0, &(0x7f0000000200)='>', 0x1) 2018/04/19 13:02:59 executing program 6: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)="5500000018007fbdb72d23b294a26a930a0600fec0a8431491000000040008001a000500fec000001900a30700000000000000dc1338d54400009b84136ef75afbf6aa1c11cca583de448daa7227c43ab822000006", 0x55}], 0x1, &(0x7f0000000200)}, 0x0) 2018/04/19 13:02:59 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x1d, 0x0, 0x0, &(0x7f0000000080)) 2018/04/19 13:02:59 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x400000a0}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x59616d61, 0x0, 0x0, &(0x7f0000000080)) 2018/04/19 13:02:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000002c0)) 2018/04/19 13:02:59 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) 2018/04/19 13:02:59 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) [ 68.892093] netlink: 25 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/19 13:02:59 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000080)) 2018/04/19 13:03:00 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000bd7000)={&(0x7f0000648eac)=ANY=[@ANYBLOB="54010000100017070000000000000000ff02000000000000000000000000000100000000000000000000ffffac14ffaa00000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000330000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000c3999d7e5d4d8cb21c0004000000000000000000fe840000000000000000000000000000480001006d64350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3}, 0x1}, 0x0) 2018/04/19 13:03:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x4000000000000005, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4)=[@in6={0xa, 0x4e23}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00009b1ffc)=0xfffffffffffffff9, 0x4) sendto$inet6(r0, &(0x7f00000007fa)="97", 0x1, 0x0, &(0x7f00006f9000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/19 13:03:00 executing program 6: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)="5500000018007fbdb72d23b294a26a930a0600fec0a8431491000000040008001a000500fec000001900a30700000000000000dc1338d54400009b84136ef75afbf6aa1c11cca583de448daa7227c43ab822000006", 0x55}], 0x1, &(0x7f0000000200)}, 0x0) 2018/04/19 13:03:00 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) listen(r0, 0x84be) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00003fefe7), &(0x7f0000000080)=0x3ad8) 2018/04/19 13:03:00 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fstatfs(r0, &(0x7f0000000600)=""/235) 2018/04/19 13:03:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x402, 0x0, &(0x7f0000000d00)) 2018/04/19 13:03:00 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x39}, 0xffffffffffffff75) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) 2018/04/19 13:03:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000012ff8)='./file0\x00', 0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000080)=""/133, 0xfffffffffffffd07, 0x0) read(r2, &(0x7f0000d48000)=""/1, 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x2000000003f) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x14) [ 69.192104] netlink: 25 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/19 13:03:00 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0xf, 0x730000, &(0x7f0000000d00)) 2018/04/19 13:03:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x402, 0x0, &(0x7f0000000d00)) 2018/04/19 13:03:00 executing program 7: r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/04/19 13:03:00 executing program 1: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)="8c", 0x1, 0xfffffffffffffffd) 2018/04/19 13:03:00 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x39}, 0xffffffffffffff75) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) 2018/04/19 13:03:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000100)={0x2, 'lo\x00'}, 0x18) 2018/04/19 13:03:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x4000000000000005, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4)=[@in6={0xa, 0x4e23}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00009b1ffc)=0xfffffffffffffff9, 0x4) sendto$inet6(r0, &(0x7f00000007fa)="97", 0x1, 0x0, &(0x7f00006f9000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/19 13:03:00 executing program 1: r0 = socket$inet6_sctp(0xa, 0x4000000000000005, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4)=[@in6={0xa, 0x4e23}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00009b1ffc)=0xfffffffffffffff9, 0x4) sendto$inet6(r0, &(0x7f00000007fa)="97", 0x1, 0x0, &(0x7f00006f9000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/19 13:03:00 executing program 7: exit(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) mincore(&(0x7f0000245000/0x2000)=nil, 0x2000, &(0x7f0000000080)=""/88) 2018/04/19 13:03:02 executing program 3: exit(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) mincore(&(0x7f0000245000/0x2000)=nil, 0x2000, &(0x7f0000000080)=""/88) 2018/04/19 13:03:02 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009c}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x705000, 0x0, 0x0, &(0x7f0000000080)) 2018/04/19 13:03:02 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xb}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x706000, 0x3, 0x0, &(0x7f00000002c0)) 2018/04/19 13:03:02 executing program 1: mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x3, 0x8972, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x1) 2018/04/19 13:03:02 executing program 7: exit(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) mincore(&(0x7f0000245000/0x2000)=nil, 0x2000, &(0x7f0000000080)=""/88) 2018/04/19 13:03:02 executing program 2: request_key(&(0x7f000000a5c0)='user\x00', &(0x7f000000a600)={0x73, 0x79, 0x7a}, &(0x7f000000a640)='uservmnet1eth1system\x00', 0xfffffffffffffffe) 2018/04/19 13:03:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000012ff8)='./file0\x00', 0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000080)=""/133, 0xfffffffffffffd07, 0x0) read(r2, &(0x7f0000d48000)=""/1, 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x2000000003f) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x14) 2018/04/19 13:03:02 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x69}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000480)) 2018/04/19 13:03:02 executing program 2: request_key(&(0x7f000000a5c0)='user\x00', &(0x7f000000a600)={0x73, 0x79, 0x7a}, &(0x7f000000a640)='uservmnet1eth1system\x00', 0xfffffffffffffffe) 2018/04/19 13:03:02 executing program 1: mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x3, 0x8972, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x1) 2018/04/19 13:03:02 executing program 5: mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x3, 0x8972, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x1) 2018/04/19 13:03:02 executing program 0: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='attr/prev\x00') getpgid(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000dedff1)='maps\x00') sendfile(r1, r2, &(0x7f00000000c0)=0x2000000, 0x5d8b) 2018/04/19 13:03:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0xa6}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x730000, 0x0, 0x0, &(0x7f0000000200)) 2018/04/19 13:03:02 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000480)={@random="b100485caa2a", @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x0, 0x0, 0x0, @multicast1=0xe0000003}}}}}, &(0x7f00000004c0)) 2018/04/19 13:03:02 executing program 2: request_key(&(0x7f000000a5c0)='user\x00', &(0x7f000000a600)={0x73, 0x79, 0x7a}, &(0x7f000000a640)='uservmnet1eth1system\x00', 0xfffffffffffffffe) 2018/04/19 13:03:02 executing program 6: r0 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)="03", 0x1, 0xfffffffffffffffc) keyctl$update(0x2, r0, &(0x7f0000000280)="e1", 0x1) 2018/04/19 13:03:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec), 0x14) 2018/04/19 13:03:03 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x17}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x2, 0x0, &(0x7f00000002c0)) 2018/04/19 13:03:03 executing program 7: exit(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) mincore(&(0x7f0000245000/0x2000)=nil, 0x2000, &(0x7f0000000080)=""/88) 2018/04/19 13:03:03 executing program 3: exit(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) mincore(&(0x7f0000245000/0x2000)=nil, 0x2000, &(0x7f0000000080)=""/88) 2018/04/19 13:03:03 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) syz_emit_ethernet(0x2e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14, 0x14}, @remote={0xac, 0x223, 0x14, 0xbb}, {[@timestamp={0xffffff89, 0x4}]}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f0000000000)) 2018/04/19 13:03:03 executing program 6: r0 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)="03", 0x1, 0xfffffffffffffffc) keyctl$update(0x2, r0, &(0x7f0000000280)="e1", 0x1) 2018/04/19 13:03:03 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000480)={@random="b100485caa2a", @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x0, 0x0, 0x0, @multicast1=0xe0000003}}}}}, &(0x7f00000004c0)) 2018/04/19 13:03:03 executing program 2: request_key(&(0x7f000000a5c0)='user\x00', &(0x7f000000a600)={0x73, 0x79, 0x7a}, &(0x7f000000a640)='uservmnet1eth1system\x00', 0xfffffffffffffffe) 2018/04/19 13:03:03 executing program 1: process_vm_readv(0x0, &(0x7f0000000540)=[{&(0x7f0000000500)=""/56, 0x38}], 0x1, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/255, 0xff}], 0x1, 0x0) 2018/04/19 13:03:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x6, 0x705000, &(0x7f0000000d00)) 2018/04/19 13:03:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x14) 2018/04/19 13:03:03 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000005000)={&(0x7f0000000fe0)={0x2, 0x6, 0x5, 0x0, 0x2, 0x0, 0x4}, 0x10}, 0x1}, 0x0) 2018/04/19 13:03:03 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, 0x1c) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) 2018/04/19 13:03:03 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000002ac0)=[{0xc}], 0xc}}], 0x1, 0x0) 2018/04/19 13:03:03 executing program 2: signalfd(0xffffffffffffffff, &(0x7f0000000100), 0xfffffffffffffe81) 2018/04/19 13:03:03 executing program 1: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000080)=""/133, 0xfffffffffffffd07, 0x0) read(r2, &(0x7f0000d48000)=""/1, 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x2000000003f) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x14) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000000)) faccessat(0xffffffffffffffff, &(0x7f0000017ff8)='./file0\x00', 0x0, 0x0) 2018/04/19 13:03:03 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x8, 0x0, &(0x7f0000000d00)) 2018/04/19 13:03:03 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x29, 0x0, 0x0, &(0x7f0000000080)) 2018/04/19 13:03:05 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xa}, 0xfffffffffffffdcf) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000002c0)) 2018/04/19 13:03:05 executing program 4: syz_emit_ethernet(0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe8000000000400000000000000000aa4e204e20", @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], &(0x7f00000002c0)) 2018/04/19 13:03:05 executing program 2: mkdir(&(0x7f0000fb3000)='./file0\x00', 0x0) mount(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='mqueue\x00', 0x0, &(0x7f0000e2ef53)) umount2(&(0x7f0000000040)='./file0\x00', 0x4) unshare(0x40000000) umount2(&(0x7f0000000000)='./file0\x00', 0xc) 2018/04/19 13:03:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000340)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x2000000000008, {0x2}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000040)=""/8, 0x2af, 0x0) 2018/04/19 13:03:05 executing program 6: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={"776c616e3000001d0684000021000899", &(0x7f0000000000)=@ethtool_stats={0x34}}) 2018/04/19 13:03:05 executing program 7: exit(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) mincore(&(0x7f0000245000/0x2000)=nil, 0x2000, &(0x7f0000000080)=""/88) 2018/04/19 13:03:05 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r0) 2018/04/19 13:03:05 executing program 3: exit(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) mincore(&(0x7f0000245000/0x2000)=nil, 0x2000, &(0x7f0000000080)=""/88) 2018/04/19 13:03:05 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x5451, &(0x7f0000001100)) 2018/04/19 13:03:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000340)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x2000000000008, {0x2}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000040)=""/8, 0x2af, 0x0) 2018/04/19 13:03:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x48}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0xb, 0x0, &(0x7f0000000d00)) 2018/04/19 13:03:05 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xe}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000002c0)) 2018/04/19 13:03:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000340)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x2000000000008, {0x2}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000040)=""/8, 0x2af, 0x0) 2018/04/19 13:03:05 executing program 2: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000005000)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000001040)) read(r0, &(0x7f0000000000)=""/4096, 0x1000) 2018/04/19 13:03:05 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x11}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x31, 0x0, 0x0, &(0x7f0000001300)) 2018/04/19 13:03:06 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x14}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000d00)) 2018/04/19 13:03:06 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x40b, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)=""/194, 0xc2}, {&(0x7f0000000500)=""/180, 0xb4}], 0x2) 2018/04/19 13:03:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000340)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x2000000000008, {0x2}, 'syzkaller0\x00'}) pread64(r0, &(0x7f0000000040)=""/8, 0x2af, 0x0) 2018/04/19 13:03:06 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000001000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000f46000)={0x1, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x90) 2018/04/19 13:03:06 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xe}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000002c0)) 2018/04/19 13:03:06 executing program 1: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}}}, {{@in6=@loopback={0x0, 0x1}}, 0x0, @in6}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 2018/04/19 13:03:06 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) 2018/04/19 13:03:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/04/19 13:03:06 executing program 2: socketpair$inet(0x1e, 0x802, 0x0, &(0x7f0000000000)={0x0}) recvmsg(r0, &(0x7f00000073c0)={&(0x7f0000007180)=@hci, 0x80, &(0x7f0000007300)=[{&(0x7f0000007280)=""/103, 0x67}], 0x1, &(0x7f0000007340)=""/111, 0x6f}, 0x0) 2018/04/19 13:03:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='personality\x00') write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) 2018/04/19 13:03:06 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f00008d1000), 0x3ef, 0x4c080, &(0x7f00005fa000)={0xa, 0x4e22}, 0x1c) 2018/04/19 13:03:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) pread64(r0, &(0x7f0000000040)=""/8, 0x2af, 0x0) 2018/04/19 13:03:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x44) 2018/04/19 13:03:06 executing program 6: r0 = socket$inet(0x2, 0x80003, 0x9) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/04/19 13:03:06 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000f7db7f)="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", 0x40b, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)=""/194, 0xc2}, {&(0x7f0000000500)=""/180, 0xb4}], 0x2) 2018/04/19 13:03:06 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x59616d61, 0x80007, 0x0, &(0x7f0000000180)) 2018/04/19 13:03:06 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x20000, 0x0) 2018/04/19 13:03:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e21, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f0000000140)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="90000000000000000000000000000000e49575c07b7de54fe97e883a806da3af1d4b8159126a91064be3a0f77175a2ca4aadec0b9d34c51dc55a9129ea4b1ce3d710c4a221e5350cd154595715f3833fcf9b546a099a9cf45163f0a5bd3a6b4865b386d449e12dc07e43bab5e04f45a2e15d0858f60331b61f76c321f7953c423524d657fc2b574d2e494648330000f80000000000000000010000ffff0000e0"], 0xa0}}], 0x2, 0x0) 2018/04/19 13:03:06 executing program 7: r0 = socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2000004, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000040)={0x0, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'wlc\x00'}, 0x2c) 2018/04/19 13:03:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) pread64(r0, &(0x7f0000000040)=""/8, 0x2af, 0x0) 2018/04/19 13:03:06 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x423, &(0x7f000018f000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1=0xe0000001}, @dccp={{0x0, 0x4e21, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) 2018/04/19 13:03:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg(r0, &(0x7f0000000340)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000000300)}, 0x60) 2018/04/19 13:03:06 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/04/19 13:03:06 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r1, &(0x7f0000004140)=[{{&(0x7f0000002640)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx2\x00'}, 0x80, &(0x7f0000003d00), 0x0, &(0x7f0000003dc0)=[{0x10}], 0x10, 0x4050}, 0x80}], 0x1, 0x8041) 2018/04/19 13:03:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}, {{0x2}}], 0x30) 2018/04/19 13:03:06 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2}, {0x2, 0x0, @multicast1=0xe0000001}, {0x2}, 0x2a4, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)}) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x0, {0x2}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @broadcast=0xffffffff}, 0xab852ebbe6fbd72e, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)='syz_tun\x00'}) 2018/04/19 13:03:06 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) r1 = getpid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=r1) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) 2018/04/19 13:03:07 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec), 0x14) 2018/04/19 13:03:07 executing program 3: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x4000) 2018/04/19 13:03:07 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2}, {0x2, 0x0, @multicast1=0xe0000001}, {0x2}, 0x2a4, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)}) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x0, {0x2}, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @broadcast=0xffffffff}, 0xab852ebbe6fbd72e, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)='syz_tun\x00'}) 2018/04/19 13:03:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) r1 = getpid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=r1) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) 2018/04/19 13:03:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) r1 = getpid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000580)=r1) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) 2018/04/19 13:03:07 executing program 1: syz_mount_image$f2fs(&(0x7f00000002c0)='f2fs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000001600)) 2018/04/19 13:03:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) pread64(r0, &(0x7f0000000040)=""/8, 0x2af, 0x0) 2018/04/19 13:03:07 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x1}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x730000, 0x40000000, &(0x7f00000002c0)) 2018/04/19 13:03:07 executing program 7: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x68042, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000db6ffc)=0x20102, 0x4) fallocate(r1, 0x0, 0x0, 0x9) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) connect(r0, &(0x7f0000000040)=@nl=@unspec, 0xc) sendfile(r0, r1, &(0x7f0000af5000), 0x10001) [ 76.577616] ================================================================== [ 76.585061] BUG: KMSAN: uninit-value in csum_partial+0x78e/0x850 [ 76.591208] CPU: 1 PID: 6180 Comm: syz-executor7 Not tainted 4.16.0+ #84 [ 76.598043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.607396] Call Trace: [ 76.609990] dump_stack+0x185/0x1d0 [ 76.613629] ? csum_partial+0x78e/0x850 [ 76.617598] kmsan_report+0x142/0x240 [ 76.621404] __msan_warning_32+0x6c/0xb0 [ 76.625477] csum_partial+0x78e/0x850 [ 76.629288] ip_append_page+0xd3d/0x1f80 [ 76.633349] ? local_bh_enable+0x36/0x40 [ 76.637423] udp_sendpage+0x2d6/0x960 [ 76.641232] ? __local_bh_enable_ip+0x3b/0x140 [ 76.645822] ? udplite_getfrag+0x100/0x100 [ 76.650056] inet_sendpage+0x4ea/0x8c0 [ 76.653954] ? inet_sendmsg+0x740/0x740 [ 76.657933] sock_sendpage+0x1de/0x2c0 [ 76.661825] pipe_to_sendpage+0x31b/0x430 [ 76.665970] ? sock_fasync+0x2b0/0x2b0 [ 76.669857] ? propagate_umount+0x3a30/0x3a30 [ 76.674347] __splice_from_pipe+0x49a/0xf30 [ 76.678668] ? generic_splice_sendpage+0x2a0/0x2a0 [ 76.683594] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 76.688953] generic_splice_sendpage+0x1c6/0x2a0 [ 76.693708] ? iter_file_splice_write+0x1710/0x1710 [ 76.698716] ? iter_file_splice_write+0x1710/0x1710 [ 76.703727] direct_splice_actor+0x19b/0x200 [ 76.708143] splice_direct_to_actor+0x764/0x1040 [ 76.712893] ? do_splice_direct+0x540/0x540 [ 76.717211] ? security_file_permission+0x28f/0x4b0 [ 76.722227] ? rw_verify_area+0x35e/0x580 [ 76.726375] do_splice_direct+0x335/0x540 [ 76.730522] do_sendfile+0x1067/0x1e40 [ 76.734429] SYSC_sendfile64+0x1b3/0x300 [ 76.739276] SyS_sendfile64+0x64/0x90 [ 76.743072] do_syscall_64+0x309/0x430 [ 76.746955] ? SYSC_sendfile+0x320/0x320 [ 76.751019] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 76.756200] RIP: 0033:0x455329 [ 76.759379] RSP: 002b:00007f8fe65a0c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 76.767078] RAX: ffffffffffffffda RBX: 00007f8fe65a16d4 RCX: 0000000000455329 [ 76.774342] RDX: 0000000020af5000 RSI: 0000000000000015 RDI: 0000000000000014 [ 76.781603] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 76.788864] R10: 0000000000010001 R11: 0000000000000246 R12: 00000000ffffffff [ 76.796132] R13: 00000000000004cf R14: 00000000006fa408 R15: 0000000000000000 [ 76.803397] [ 76.805011] Uninit was created at: [ 76.808548] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 76.813555] kmsan_alloc_page+0x82/0xe0 [ 76.817525] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 76.822271] alloc_pages_vma+0xcc8/0x1800 [ 76.826415] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 76.831422] shmem_getpage_gfp+0x35db/0x5770 [ 76.835823] shmem_fallocate+0xde2/0x1610 [ 76.839963] vfs_fallocate+0x9dc/0xde0 [ 76.843843] SYSC_fallocate+0x119/0x1d0 [ 76.847807] SyS_fallocate+0x64/0x90 [ 76.851509] do_syscall_64+0x309/0x430 [ 76.855391] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 76.860567] ================================================================== [ 76.867910] Disabling lock debugging due to kernel taint [ 76.873348] Kernel panic - not syncing: panic_on_warn set ... [ 76.873348] [ 76.880707] CPU: 1 PID: 6180 Comm: syz-executor7 Tainted: G B 4.16.0+ #84 [ 76.888839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.898184] Call Trace: [ 76.900770] dump_stack+0x185/0x1d0 [ 76.904827] panic+0x39d/0x940 [ 76.908035] ? csum_partial+0x78e/0x850 [ 76.912000] kmsan_report+0x238/0x240 [ 76.915795] __msan_warning_32+0x6c/0xb0 [ 76.919851] csum_partial+0x78e/0x850 [ 76.923653] ip_append_page+0xd3d/0x1f80 [ 76.927716] ? local_bh_enable+0x36/0x40 [ 76.931781] udp_sendpage+0x2d6/0x960 [ 76.935579] ? __local_bh_enable_ip+0x3b/0x140 [ 76.940169] ? udplite_getfrag+0x100/0x100 [ 76.944399] inet_sendpage+0x4ea/0x8c0 [ 76.948288] ? inet_sendmsg+0x740/0x740 [ 76.952255] sock_sendpage+0x1de/0x2c0 [ 76.956146] pipe_to_sendpage+0x31b/0x430 [ 76.960286] ? sock_fasync+0x2b0/0x2b0 [ 76.964171] ? propagate_umount+0x3a30/0x3a30 [ 76.968662] __splice_from_pipe+0x49a/0xf30 [ 76.972983] ? generic_splice_sendpage+0x2a0/0x2a0 [ 76.977911] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 76.983273] generic_splice_sendpage+0x1c6/0x2a0 [ 76.988031] ? iter_file_splice_write+0x1710/0x1710 [ 76.993041] ? iter_file_splice_write+0x1710/0x1710 [ 76.998059] direct_splice_actor+0x19b/0x200 [ 77.002490] splice_direct_to_actor+0x764/0x1040 [ 77.007243] ? do_splice_direct+0x540/0x540 [ 77.011561] ? security_file_permission+0x28f/0x4b0 [ 77.016574] ? rw_verify_area+0x35e/0x580 [ 77.020721] do_splice_direct+0x335/0x540 [ 77.024868] do_sendfile+0x1067/0x1e40 [ 77.028762] SYSC_sendfile64+0x1b3/0x300 [ 77.032823] SyS_sendfile64+0x64/0x90 [ 77.036617] do_syscall_64+0x309/0x430 [ 77.040513] ? SYSC_sendfile+0x320/0x320 [ 77.044582] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 77.049768] RIP: 0033:0x455329 [ 77.052955] RSP: 002b:00007f8fe65a0c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 77.060667] RAX: ffffffffffffffda RBX: 00007f8fe65a16d4 RCX: 0000000000455329 [ 77.067931] RDX: 0000000020af5000 RSI: 0000000000000015 RDI: 0000000000000014 [ 77.075185] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 77.082448] R10: 0000000000010001 R11: 0000000000000246 R12: 00000000ffffffff [ 77.089699] R13: 00000000000004cf R14: 00000000006fa408 R15: 0000000000000000 [ 77.097502] Dumping ftrace buffer: [ 77.101030] (ftrace buffer empty) [ 77.104716] Kernel Offset: disabled [ 77.108318] Rebooting in 86400 seconds..