INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.53' (ECDSA) to the list of known hosts. 2018/04/25 19:39:22 fuzzer started 2018/04/25 19:39:23 dialing manager at 10.128.0.26:38541 syzkaller login: [ 51.389527] can: request_module (can-proto-0) failed. [ 51.400844] can: request_module (can-proto-0) failed. 2018/04/25 19:39:30 kcov=true, comps=false 2018/04/25 19:39:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000039000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000009fc8)={0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000021000)}, 0x0) 2018/04/25 19:39:33 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = socket$unix(0x1, 0x5, 0x0) r3 = getuid() getgroups(0x1, &(0x7f0000001580)=[0xffffffffffffffff]) getresuid(&(0x7f0000001900)=0x0, &(0x7f0000001940), &(0x7f0000001980)) getgroups(0x1, &(0x7f00000019c0)=[0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a00)={0x0, 0x0}, &(0x7f0000001a40)=0xc) lstat(&(0x7f0000001a80)='./file0\x00', &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001bc0)={0x0, 0x0, 0x0}, &(0x7f0000001c00)=0xc) fstat(r0, &(0x7f0000002300)) getgid() getuid() getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004b40)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000004c40)=0xe8) fstat(r0, &(0x7f0000004c80)) sendmmsg$unix(r2, &(0x7f0000004d40)=[{&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000140)='ls', 0x2}], 0x1, &(0x7f0000000280)}, {&(0x7f0000001500)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f00000015c0)=[@rights={0x34, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x10, 0x1, 0x1, [r0]}, @cred={0x18, 0x1, 0x2, r1, r3, r4}], 0x5c, 0x4}, {&(0x7f0000001640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000018c0)=[{&(0x7f00000016c0)}], 0x1, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="1c0000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="18000000010000000200000007d7522490f0dd488387646401f24b83ee36c8a5e13d5dab1216cc9b9a98f25e304ddf06970b626c6996343349da61882c9789d00ac35772fcf01573d5ac3df8", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="180000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="180000000100000002000000", @ANYRES32=r9, @ANYRES32=r10], 0xa0, 0x810}, {&(0x7f0000001cc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001e40)=[{&(0x7f0000001d40)="35d220df3dcd6a96e35632e257b0a52a78b8e91fdc9749e3b8f88c579ba3103ef7b6eff0db2f4d40355999cfc68ab0523e992fa9544f3fee2d392817a47ed52fbe92c680a6b23394c2d7f09ad602fb7d48b214d58ea14f7ca8e9106c4ff5031838e50b435b6792e7f3f14a736bb35f44bd4bb24c9ffbd3d248b712f03c5c47c987ce1cfd0bfb09bbeeda48891662ddbff1799f95079c0c525cd8e41be655315fb1899a7abf411e66ef5baf21d815d2a35676c7d2eda2c4caade6c9ad9ea0225c34ba5081bb12b10905cf6194df13f5324eb8f2c8d675f264270cf2dbd0c3df952568c4c9842d96c3ce38abbd24a6905e", 0xf0}], 0x1, 0x0, 0x0, 0x80}], 0x4, 0x20004884) r11 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400, 0xb2) ioctl$sock_proto_private(r11, 0x89e1, &(0x7f00000002c0)="cfa1296ecbb2af7705618ed79b36b7213dd73a35022feeedd39ef5648783fc910b323c1f462992079bb482fb42b2443ca33baf7797c49aafbd3a27db2a20e79de106c37114c5211d5038f82db7e601d428901c2c502b9474965f9ec7ec9e76d8b4ff54009f6e1ccf2ff4542f5a8b56b25ba946950200c6014fe22186fae32e6997ff7149fdd123f17fdd3557be0a9e02006c713c64e67eeacf24c3aa41381be4d63056ad2f765969c05cd26f7b0ddc1563d0e05f03d07d3cb713bdf408f222707688923afbeec5a32724371ce678a5d5dbdf1dbe51be7e3418c4cb63dd2c1875b2be") ptrace$setregset(0x4205, r1, 0x202, &(0x7f00000000c0)={&(0x7f0000000040), 0xfffffffffffffdb8}) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000300)) ptrace$getregs(0xe, r1, 0xe00, &(0x7f0000000000)=""/188) modify_ldt$read(0x0, &(0x7f0000000180)=""/24, 0x18) 2018/04/25 19:39:33 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 2018/04/25 19:39:33 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @result}], 0x30) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/25 19:39:33 executing program 3: r0 = memfd_create(&(0x7f0000000000)='--vboxnet0.\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000951000)='/dev/snd/seq\x00', 0x0, 0x200008000020002) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000100), &(0x7f0000000140)=0x18) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000fbef74)={0x0, 0x0, 0x0, "71756575650000005d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3ffffffffffffff00"}) write$sndseq(r0, &(0x7f0000040000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick=0xa48b, {}, {0x5ad}, @queue}], 0x60) 2018/04/25 19:39:33 executing program 4: r0 = socket$packet(0x11, 0x1000000000000003, 0x300) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x8906, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/25 19:39:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$getregs(0x8, r1, 0x8000, &(0x7f0000000280)=""/229) 2018/04/25 19:39:33 executing program 6: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregs(0xf, r1, 0x8000, &(0x7f0000000280)=""/229) [ 56.419301] IPVS: ftp: loaded support on port[0] = 21 [ 56.523183] IPVS: ftp: loaded support on port[0] = 21 [ 56.569591] IPVS: ftp: loaded support on port[0] = 21 [ 56.624787] IPVS: ftp: loaded support on port[0] = 21 [ 56.721197] IPVS: ftp: loaded support on port[0] = 21 [ 56.849708] IPVS: ftp: loaded support on port[0] = 21 [ 56.967305] IPVS: ftp: loaded support on port[0] = 21 [ 57.084834] IPVS: ftp: loaded support on port[0] = 21 [ 58.550129] ip (4711) used greatest stack depth: 53944 bytes left [ 59.464088] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.470606] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.493511] device bridge_slave_0 entered promiscuous mode [ 59.606600] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.613202] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.656197] device bridge_slave_0 entered promiscuous mode [ 59.733810] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.740286] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.759927] device bridge_slave_1 entered promiscuous mode [ 59.818497] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.825101] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.848867] device bridge_slave_0 entered promiscuous mode [ 59.877872] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.884355] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.909611] device bridge_slave_1 entered promiscuous mode [ 60.006411] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.022092] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.028566] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.077235] device bridge_slave_0 entered promiscuous mode [ 60.129251] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.136719] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.143243] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.171441] device bridge_slave_1 entered promiscuous mode [ 60.213176] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.271058] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.277641] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.332268] device bridge_slave_0 entered promiscuous mode [ 60.361311] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.367801] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.388224] device bridge_slave_1 entered promiscuous mode [ 60.396245] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.436234] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.518623] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.525172] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.585883] device bridge_slave_1 entered promiscuous mode [ 60.623202] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.637742] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.644282] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.668676] device bridge_slave_0 entered promiscuous mode [ 60.706396] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.712854] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.730260] device bridge_slave_0 entered promiscuous mode [ 60.786732] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.801402] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.811514] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.839168] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.845672] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.881163] device bridge_slave_1 entered promiscuous mode [ 60.915878] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.927134] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.933615] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.977193] device bridge_slave_1 entered promiscuous mode [ 61.000566] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.007104] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.027279] device bridge_slave_0 entered promiscuous mode [ 61.057388] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.086254] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.099508] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.141843] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.154866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.266853] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.273348] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.292218] device bridge_slave_1 entered promiscuous mode [ 61.346273] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.354414] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.370444] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.378787] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.394827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.431823] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.506326] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.588612] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.607466] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.614475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.632505] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.640617] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.649341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.700972] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.741796] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.844136] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.880825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.887808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.926732] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.942980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.981133] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.125558] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.140217] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.147690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.163577] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.191384] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.198836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.233124] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.274258] team0: Port device team_slave_0 added [ 62.297161] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.305201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.362882] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.371097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.379184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.407660] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.464972] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.509504] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.542605] team0: Port device team_slave_1 added [ 62.562481] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.572730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.612008] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.620642] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.628085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.648300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.689538] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.704340] team0: Port device team_slave_0 added [ 62.751398] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.793325] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.819572] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.828125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.855498] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.890139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.920806] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.934690] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.961096] team0: Port device team_slave_1 added [ 62.974847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.990525] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.000269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.058362] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.083651] team0: Port device team_slave_0 added [ 63.102781] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.120196] team0: Port device team_slave_0 added [ 63.134987] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.142554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.158283] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.201725] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.208916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.258564] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.288782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.308578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.321587] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.335154] team0: Port device team_slave_1 added [ 63.348720] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.357807] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.378376] team0: Port device team_slave_0 added [ 63.399219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.427263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.480814] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.491506] team0: Port device team_slave_1 added [ 63.512916] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.521618] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.535572] team0: Port device team_slave_0 added [ 63.560013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.572848] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.618095] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.635115] team0: Port device team_slave_1 added [ 63.643094] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.651249] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.661610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.676389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.712193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.727300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.748839] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.759153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.770385] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.788367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.809815] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.831437] team0: Port device team_slave_0 added [ 63.850575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.863372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.891971] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.903108] team0: Port device team_slave_1 added [ 63.916669] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.929634] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.940890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.956904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.970648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.990128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.008808] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.018199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.031921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.066243] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.080642] team0: Port device team_slave_0 added [ 64.087756] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.101875] team0: Port device team_slave_1 added [ 64.113412] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.122420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.137158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.174827] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.182428] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.189777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.215461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.241410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.265962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.284432] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.292447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.305599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.334250] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.343410] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.351766] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.368544] team0: Port device team_slave_1 added [ 64.385935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.399588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.414413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.423636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.439414] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.450927] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.464572] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.479675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.509487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.534634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.556102] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.576757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.592093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.620434] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.628770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.640553] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.658632] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.667957] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.675144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.688282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.709690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.726162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.766661] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.774782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.793200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.816816] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.825207] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.837788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.855201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.880391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.896158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.934381] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.946387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.965510] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.050578] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.059852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.077235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.096774] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.117791] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.129959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.179330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.209566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.238241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.362604] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.371736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.385399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.478369] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.484873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.491747] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.498224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.516405] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.640175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.939207] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.945688] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.952576] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.959070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.992744] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.018249] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.024692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.031547] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.037993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.058385] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.276877] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.283354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.290266] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.296724] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.364981] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.515182] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.521680] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.528580] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.535063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.605209] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.622228] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.628701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.635574] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.642064] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.650648] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.680545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.697527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.715467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.739803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.752808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.765001] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.771520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.778868] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.785293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.793470] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.854200] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.860682] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.867529] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.873976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.957172] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.706465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.733541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 75.348235] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.031153] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.243846] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.301953] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.338536] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.523143] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.548343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.716272] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.905535] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.999220] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.047775] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.054528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.071850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.098516] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.113583] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.370386] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.459841] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.509991] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.725700] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.733901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.747586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.873542] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.925460] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.931852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.943493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.980155] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.005980] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.028264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.048825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.238217] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.244616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.252889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.294486] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.307676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.335007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.370211] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.378371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.394378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.704323] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.814153] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.875158] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.895763] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.924520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.938651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.074110] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.148899] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.174417] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.648954] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/25 19:40:03 executing program 4: r0 = socket$packet(0x11, 0x1000000000000003, 0x300) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x8906, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/25 19:40:03 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @result}], 0x30) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/25 19:40:03 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000359fd5)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 2018/04/25 19:40:03 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = socket$unix(0x1, 0x5, 0x0) r3 = getuid() getgroups(0x1, &(0x7f0000001580)=[0xffffffffffffffff]) getresuid(&(0x7f0000001900)=0x0, &(0x7f0000001940), &(0x7f0000001980)) getgroups(0x1, &(0x7f00000019c0)=[0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a00)={0x0, 0x0}, &(0x7f0000001a40)=0xc) lstat(&(0x7f0000001a80)='./file0\x00', &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001bc0)={0x0, 0x0, 0x0}, &(0x7f0000001c00)=0xc) fstat(r0, &(0x7f0000002300)) getgid() getuid() getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004b40)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000004c40)=0xe8) fstat(r0, &(0x7f0000004c80)) sendmmsg$unix(r2, &(0x7f0000004d40)=[{&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000140)='ls', 0x2}], 0x1, &(0x7f0000000280)}, {&(0x7f0000001500)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f00000015c0)=[@rights={0x34, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x10, 0x1, 0x1, [r0]}, @cred={0x18, 0x1, 0x2, r1, r3, r4}], 0x5c, 0x4}, {&(0x7f0000001640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000018c0)=[{&(0x7f00000016c0)}], 0x1, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="1c0000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="18000000010000000200000007d7522490f0dd488387646401f24b83ee36c8a5e13d5dab1216cc9b9a98f25e304ddf06970b626c6996343349da61882c9789d00ac35772fcf01573d5ac3df8", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="180000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="180000000100000002000000", @ANYRES32=r9, @ANYRES32=r10], 0xa0, 0x810}, {&(0x7f0000001cc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001e40)=[{&(0x7f0000001d40)="35d220df3dcd6a96e35632e257b0a52a78b8e91fdc9749e3b8f88c579ba3103ef7b6eff0db2f4d40355999cfc68ab0523e992fa9544f3fee2d392817a47ed52fbe92c680a6b23394c2d7f09ad602fb7d48b214d58ea14f7ca8e9106c4ff5031838e50b435b6792e7f3f14a736bb35f44bd4bb24c9ffbd3d248b712f03c5c47c987ce1cfd0bfb09bbeeda48891662ddbff1799f95079c0c525cd8e41be655315fb1899a7abf411e66ef5baf21d815d2a35676c7d2eda2c4caade6c9ad9ea0225c34ba5081bb12b10905cf6194df13f5324eb8f2c8d675f264270cf2dbd0c3df952568c4c9842d96c3ce38abbd24a6905e", 0xf0}], 0x1, 0x0, 0x0, 0x80}], 0x4, 0x20004884) r11 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x400, 0xb2) ioctl$sock_proto_private(r11, 0x89e1, &(0x7f00000002c0)="cfa1296ecbb2af7705618ed79b36b7213dd73a35022feeedd39ef5648783fc910b323c1f462992079bb482fb42b2443ca33baf7797c49aafbd3a27db2a20e79de106c37114c5211d5038f82db7e601d428901c2c502b9474965f9ec7ec9e76d8b4ff54009f6e1ccf2ff4542f5a8b56b25ba946950200c6014fe22186fae32e6997ff7149fdd123f17fdd3557be0a9e02006c713c64e67eeacf24c3aa41381be4d63056ad2f765969c05cd26f7b0ddc1563d0e05f03d07d3cb713bdf408f222707688923afbeec5a32724371ce678a5d5dbdf1dbe51be7e3418c4cb63dd2c1875b2be") ptrace$setregset(0x4205, r1, 0x202, &(0x7f00000000c0)={&(0x7f0000000040), 0xfffffffffffffdb8}) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000300)) ptrace$getregs(0xe, r1, 0xe00, &(0x7f0000000000)=""/188) modify_ldt$read(0x0, &(0x7f0000000180)=""/24, 0x18) 2018/04/25 19:40:03 executing program 5: 2018/04/25 19:40:03 executing program 6: 2018/04/25 19:40:03 executing program 7: 2018/04/25 19:40:03 executing program 0: 2018/04/25 19:40:03 executing program 7: 2018/04/25 19:40:03 executing program 6: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000240)={0x0, 0x6}, 0xc) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) ftruncate(r2, 0x7fff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002040)=""/4096, 0x1000}], 0x1, &(0x7f00000006c0)=""/28, 0x1c}}, {{&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @mcast1}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000780)=""/193, 0xc1}, {&(0x7f0000000880)=""/42, 0x2a}], 0x2, &(0x7f0000000900)=""/82, 0x52}, 0x100}], 0x2, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa4, r4, 0x4, 0x70bd26, 0x25dfdbfb, {0xa}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xc4f}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2=0xe0000002}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1e398f6e}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0xa4}, 0x1, 0x0, 0x0, 0x48000}, 0x4001) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6c6f0000ffffff9f0000ddff00"}) sendmsg$FOU_CMD_ADD(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="00000000e4a33a11402dec1d5b3a3b4e030d3d7ed66734"], 0x1}, 0x1}, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000200)=0x2, 0x4) 2018/04/25 19:40:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f00000001c0)=@in6={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80}}, 0x80, &(0x7f0000002500)=[{&(0x7f0000001380)="753a95722b905d4f8f1fc9ed5c94c8df6222955c", 0x14}, {&(0x7f0000002700)="b779268fcea1eaa99f38f47cec7f34ac04a8bd537f8f8536c72da77115824629fb511b4e6156c00a74353a3956e30b66de8138eac68b0901dfe0c0a9c64d59630c142193f827ca9f36ed73701303e4e140b42f54335df4c3d753f1350bff2660a217ff8c0f203f8df877481cf867c34438719072a3cd2ddde90c3cd309f716bec54040eff873b18c08", 0x89}], 0x2, &(0x7f0000000240)=ANY=[], 0x0, 0x4000}, 0x4}], 0x1, 0x800) 2018/04/25 19:40:03 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e3061a03bdb0c91905124a66770653cb47dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91deb9c1c7f063e676e83c740e2d647534a10458505d003c10e34239844c5b6e8d17") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') sendfile(r1, r0, &(0x7f0000000100)=0xf, 0x200) 2018/04/25 19:40:03 executing program 0: 2018/04/25 19:40:03 executing program 4: r0 = socket$packet(0x11, 0x1000000000000003, 0x300) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x8906, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/25 19:40:03 executing program 1: 2018/04/25 19:40:04 executing program 7: 2018/04/25 19:40:04 executing program 5: 2018/04/25 19:40:04 executing program 0: 2018/04/25 19:40:04 executing program 3: 2018/04/25 19:40:04 executing program 1: 2018/04/25 19:40:04 executing program 4: r0 = socket$packet(0x11, 0x1000000000000003, 0x300) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x8906, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/25 19:40:04 executing program 6: 2018/04/25 19:40:04 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @result}], 0x30) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/25 19:40:04 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fanotify_init(0x0, 0x0) dup3(r0, r1, 0x0) 2018/04/25 19:40:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='ns\x00') perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000f2b000)=""/4096, 0x1000) 2018/04/25 19:40:04 executing program 1: 2018/04/25 19:40:04 executing program 3: 2018/04/25 19:40:04 executing program 0: 2018/04/25 19:40:04 executing program 6: 2018/04/25 19:40:04 executing program 4: sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x8906, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/25 19:40:04 executing program 1: 2018/04/25 19:40:04 executing program 3: 2018/04/25 19:40:04 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x1000011, r1, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000001500)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) 2018/04/25 19:40:04 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @broadcast=0xffffffff}}}}, &(0x7f0000000000)=0xb0) 2018/04/25 19:40:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f00007e6000), 0x4) 2018/04/25 19:40:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)={'nouuid,'}) 2018/04/25 19:40:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x1000011, r1, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000001500)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) 2018/04/25 19:40:05 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x8906, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/25 19:40:05 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfff, 0x1, 0x0, 0x7, 0x0, 0x8, 0x101, 0x0, 0xfffffffffffff26d, 0x0, 0x4, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4, 0x13d6, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x68f, 0x4, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x3, 0x20, 0x81, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2018/04/25 19:40:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f000001bc78)=@raw={"05000000020002000000000000000000180000000303efffffff00", 0x9, 0x3, 0xffffffffffffff22, 0x0, 0xffffffff, 0xffffffff, 0x120, 0xffffffff, 0x258, 0xffffffff, 0xffffffff, 0x258, 0xffffffff, 0x3, &(0x7f000002cfd0), {[{{@uncond, 0x0, 0xa8, 0x52}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x4, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x2e) 2018/04/25 19:40:05 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vhan0\x00', 0x400}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x2000000000102}) 2018/04/25 19:40:05 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @result}], 0x30) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/25 19:40:05 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x1000011, r1, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000300), 0x0, 0x55c3}], 0x0, &(0x7f0000001500)=ANY=[]) read$eventfd(r0, &(0x7f0000000200), 0xfffffe08) 2018/04/25 19:40:05 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000046000)="1f0000000104ff00fdde45c807110000f305f0f00800018001fd00dcffdf00", 0x1f) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000a6b000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) 2018/04/25 19:40:05 executing program 4: r0 = socket$packet(0x11, 0x1000000000000003, 0x300) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x8906, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/25 19:40:05 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000f14000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_setup(0x7, &(0x7f0000a8aff8)=0x0) io_submit(r1, 0x1, &(0x7f0000b52fd8)=[&(0x7f0000587000)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f000096f000)="060063efff7f00009d", 0x9}]) 2018/04/25 19:40:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000d93ff1)='statm\x00') preadv(r0, &(0x7f0000b5cff8)=[{&(0x7f00006f0000)=""/154, 0x9a}], 0x1, 0x0) [ 87.471342] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 87.574863] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 87.677722] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 87.707315] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 2018/04/25 19:40:06 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/04/25 19:40:06 executing program 7: r0 = socket(0x1f, 0x2000000000000005, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x6, 0x4, &(0x7f00000000c0), 0xfffffffffffffd16) 2018/04/25 19:40:06 executing program 4: r0 = socket$packet(0x11, 0x1000000000000003, 0x300) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/25 19:40:06 executing program 5: r0 = eventfd2(0x2, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/108, 0x6c}], 0x1) 2018/04/25 19:40:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@multicast2=0xe0000002, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x0, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x9}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, 0x1c) 2018/04/25 19:40:06 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000780)='./file0/file0\x00', 0x3fffa, 0x0) write$vnet(r0, &(0x7f0000000680)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000000580)=""/248}}, 0x68) 2018/04/25 19:40:06 executing program 3: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200010000500010005000000001c08108f13", 0x12, 0x400}], 0x0, 0x0) syz_fuse_mount(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x840021) 2018/04/25 19:40:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @result}], 0x30) 2018/04/25 19:40:06 executing program 4: r0 = socket$packet(0x11, 0x1000000000000003, 0x300) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/25 19:40:06 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'rdma', 0x20}, {0x0, 'cpu', 0x20}]}, 0xb) 2018/04/25 19:40:06 executing program 0: r0 = open(&(0x7f0000ae8ff8)='./file0\x00', 0x14104a, 0x0) write(r0, &(0x7f0000000280)="e4", 0x1) sendfile(r0, r0, &(0x7f00009bcffe), 0x2000000000004c35) creat(&(0x7f0000000040)='./file0\x00', 0x0) 2018/04/25 19:40:06 executing program 3: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00\x00X', 0x8, r2) r4 = add_key$user(&(0x7f0000fc0ffb)='user\x00', &(0x7f0000752ffb)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00003eb000)="b3", 0x1, r2) keyctl$update(0x2, r4, &(0x7f0000000480)="df02754677212dfc3e2acc26fdc3ffa64813da494137e175e9f2780ac5e2a09f43a1fcebf272a5a135de92bf4a9033933824f6e6aa023895113293535d1c0066d20e0f275188b4b4c187e18774fc2227cbb60fc6697f5337726164c8fbe1181e6d50986cd98a5c44ac0ec375deb27eafcf7d06438f252510d87bd91d03e7dc2faed85adcd88ca30e75b1e143a72d94defa187e48b89efbbbcc9b9a9a307353df7a21affce4e9149eb122cbc356cb681365afd979e97b57b596e901864a68679f", 0xc0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crc32c-generic\x00'}}) 2018/04/25 19:40:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f00005a6ff0)={&(0x7f0000451ccc)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in6}, {@in=@loopback=0x7f000001, 0x0, 0x6c}, @in6=@loopback={0x0, 0x1}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/04/25 19:40:07 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000000040)="000000037970652700000004000000070000204500000000", 0x18, 0x0) 2018/04/25 19:40:07 executing program 4: r0 = socket$packet(0x11, 0x1000000000000003, 0x300) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/25 19:40:07 executing program 5: r0 = eventfd2(0x2, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/108, 0x6c}], 0x1) 2018/04/25 19:40:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) 2018/04/25 19:40:07 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000040)) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)='affs\x00', 0x3500a5, &(0x7f0000000ac0)) lstat(&(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)) 2018/04/25 19:40:07 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @result}], 0x30) 2018/04/25 19:40:07 executing program 6: r0 = socket(0x1f, 0x5, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000040)=0x7, 0x1) 2018/04/25 19:40:07 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000079fee)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) write$evdev(r0, &(0x7f0000057fa0)=[{{0x100000}, 0x0, 0x100000001}, {}], 0x30) 2018/04/25 19:40:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x2000000000000005, 0x2) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f}, 0xa) listen(r0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x9) accept4(r0, &(0x7f00000000c0)=@nfc_llcp, &(0x7f0000000140)=0x80, 0x0) 2018/04/25 19:40:07 executing program 4: r0 = socket$packet(0x11, 0x1000000000000003, 0x300) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x8906, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/25 19:40:07 executing program 6: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000040)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x4, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x38}, 0x1}, 0x0) 2018/04/25 19:40:07 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x0, 0x2}, 0x20) 2018/04/25 19:40:07 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(authencesn(crc32c,fpu(pcbc(aes-aesni))))\x00'}, 0x58) 2018/04/25 19:40:07 executing program 1: io_setup(0xec26, &(0x7f0000000080)=0x0) io_submit(r0, 0x0, &(0x7f00000000c0)) 2018/04/25 19:40:07 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) write(r0, &(0x7f00007b3f7e)='q', 0x1) close(r0) 2018/04/25 19:40:07 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "cde0ed5f120000006a25be99541c24eff31658d4abaddef20e60c60e32950058244cd19ab5957cf48b090b461ffac42011a0a23bf29978b9fcb16162bf9370e1", "0d94be6b815da2bbc8f30f098721dfe4b1832cd48406109271de15e091c00872"}) 2018/04/25 19:40:07 executing program 6: prctl$setmm(0x23, 0xf, &(0x7f00003e9000/0x1000)=nil) 2018/04/25 19:40:07 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x2000000000000003, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) close(r0) 2018/04/25 19:40:08 executing program 7: r0 = socket(0x1f, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000040)=@ethtool_ts_info={0x27}}) 2018/04/25 19:40:08 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @result}], 0x30) 2018/04/25 19:40:08 executing program 5: nanosleep(&(0x7f0000000040)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000457000/0x2000)=nil, 0x7ffffffff000, 0x0, 0x0, 0x0) 2018/04/25 19:40:08 executing program 0: sync_file_range(0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0) 2018/04/25 19:40:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000043c0)=[{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000005c0)="ec4147314c33f945d8e55ef81f96cd2b63", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000003340)=[{{&(0x7f00000000c0)=@sco, 0x80, &(0x7f0000000800), 0x0, &(0x7f0000000140)=""/94, 0x5e}}, {{&(0x7f0000002f40)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003200)=[{&(0x7f0000003100)=""/226, 0xe2}], 0x1, &(0x7f0000000440)=""/239, 0xef}}], 0x2, 0x0, 0x0) 2018/04/25 19:40:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x5dc9, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="eb58906d6b66732e66617400020120000200808000f8000020004000000000000000000001", 0x25}], 0x0, &(0x7f0000000040)=ANY=[]) open(&(0x7f00000001c0)='./file0/file0\x00', 0x3fffe, 0x0) 2018/04/25 19:40:08 executing program 6: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="4244d6e42a80d6d2d187f8fff1d4a40520e6754e367c0b", 0x17, 0x400}], 0x0, &(0x7f0000011700)) 2018/04/25 19:40:08 executing program 1: socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffb) 2018/04/25 19:40:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x5, &(0x7f00000000c0)=""/29, 0x1d) 2018/04/25 19:40:08 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000007ff7)='/dev/sg#\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{r0}], 0x1, &(0x7f0000000200), &(0x7f0000000240), 0x8) 2018/04/25 19:40:08 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079", 0x18) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000024c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendmmsg(r1, &(0x7f000000ed00)=[{{&(0x7f00000008c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000ac0)="1679a43eb6e93f632ef1d3241014d5bd54a15b8e7dc409ca96c9346cd6236228", 0x20}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000540)={&(0x7f0000000180)=@pppol2tp, 0x80, &(0x7f0000000480)=[{&(0x7f0000000300)=""/58, 0x3a}], 0x1, &(0x7f0000000500)=""/37, 0x25}, 0x0) 2018/04/25 19:40:08 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$can_raw(r1, &(0x7f0000477000)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000240)={&(0x7f00000001c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "b5a419fb5df128c83ad9430362a22a5abf1e4123efccc641602c2da3630b58d04766c58b254ff2a965ccb226c8c7355c33306c99adaa0aa59006f8dc9b01b737"}, 0xff89}, 0x1}, 0x0) readv(r1, &(0x7f0000001700)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1) 2018/04/25 19:40:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x401, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200077008f8", 0x16}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x3fffa, 0x0) pwritev(r0, &(0x7f0000002640)=[{&(0x7f0000000400)='!', 0x1}], 0x1, 0x0) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x0) clone(0x0, &(0x7f0000000c40), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000280)) pwritev(r0, &(0x7f0000001f80)=[{&(0x7f0000001e80)="c0", 0x1}], 0x1, 0x0) readahead(r0, 0x0, 0x0) 2018/04/25 19:40:08 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1f, 0x2000000000000003, 0x1) io_setup(0x40, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000880)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)="899212a3", 0x4}]) 2018/04/25 19:40:08 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_mr_vif\x00') read(r0, &(0x7f0000000140)=""/208, 0xd0) 2018/04/25 19:40:08 executing program 4: perf_event_open(&(0x7f0000b5a000)={0x4000000002, 0x70, 0x1e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000380)=@updpolicy={0xb8, 0x1d, 0x11, 0x0, 0x0, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}}, 0xb8}, 0x1}, 0x0) [ 91.054597] netlink: 168 bytes leftover after parsing attributes in process `syz-executor4'. 2018/04/25 19:40:09 executing program 0: io_setup(0x2, &(0x7f0000000080)) io_setup(0xff, &(0x7f0000000140)) io_setup(0x8, &(0x7f0000000180)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f00000001c0)) io_setup(0x100000001, &(0x7f0000000200)) [ 91.108791] netlink: 168 bytes leftover after parsing attributes in process `syz-executor4'. [ 91.367210] mmap: syz-executor5 (7033) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/25 19:40:09 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000440)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000180)=@getsa={0x118, 0x12, 0x301, 0x0, 0x0, {@in=@multicast1=0xe0000001}, [@etimer_thresh={0x8, 0xc}, @policy={0xac, 0x7, {{@in6=@dev={0xfe, 0x80}, @in6=@mcast1={0xff, 0x1, [], 0x1}}}}, @lastused={0xc, 0xf}, @extra_flags={0x8, 0x18}, @address_filter={0x28, 0x1a, {@in6, @in=@dev={0xac, 0x14, 0x14}}}]}, 0x118}, 0x1}, 0x0) 2018/04/25 19:40:09 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) syz_fuse_mount(&(0x7f00000006c0)="2e2f66696c65302fe52e6c6530ff00", 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 2018/04/25 19:40:09 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000001380)='cpuset.memory_spread_slab\x00', 0x2, 0x0) dup3(r0, r2, 0x0) 2018/04/25 19:40:09 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0xc9) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/25 19:40:09 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @result}], 0x30) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/25 19:40:09 executing program 5: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f000000c000)='tmpfs\x00', 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0/control\x00', 0x0) rmdir(&(0x7f0000000000)='./file0/control\x00') 2018/04/25 19:40:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f74000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000e24000)="b70a75b0d5e383e5b3b60ced5c54db0a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x80000000) recvmsg(r1, &(0x7f0000350000)={&(0x7f0000a35000)=@generic, 0x80, &(0x7f0000e79fc0), 0x0, &(0x7f0000ea0000)}, 0x0) 2018/04/25 19:40:09 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) r1 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000080), 0x102000004) 2018/04/25 19:40:09 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000044ff6)='./control\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x11, 0x40000002, r0, &(0x7f0000000000)='./control\x00') 2018/04/25 19:40:10 executing program 6: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x142f, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x110, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000140)='./file0/file0\x00', 0x40003ffd, 0x0) ftruncate(r0, 0x9000) 2018/04/25 19:40:10 executing program 0: capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000200)) shmctl$SHM_UNLOCK(0x0, 0xc) 2018/04/25 19:40:10 executing program 3: r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0xc9) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/25 19:40:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='V', 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0x0, 0x0) [ 92.095958] capability: warning: `syz-executor0' uses 32-bit capabilities (legacy support in use) 2018/04/25 19:40:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079", 0x18) sendmmsg(r1, &(0x7f000000ed00)=[{{&(0x7f00000008c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000ac0)="1679a43eb6e93f632ef1d3241014d5bd54a15b8e7dc409ca96c9346cd6236228", 0x20}], 0x1}}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000540)={&(0x7f0000000180)=@pppol2tp, 0x80, &(0x7f0000000480)=[{&(0x7f0000000300)=""/58, 0x3a}], 0x1, &(0x7f0000000500)=""/37, 0x25}, 0x0) 2018/04/25 19:40:10 executing program 5: r0 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000080)) 2018/04/25 19:40:10 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x4000001, 0x1, &(0x7f00000001c0)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000540)=ANY=[]) open(&(0x7f0000000300)='./file0/fil.0\x00', 0x800000000002040, 0x0) unlink(&(0x7f00000002c0)='./file0/fil.0\x00') 2018/04/25 19:40:10 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0) 2018/04/25 19:40:10 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) r1 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000080), 0x102000004) 2018/04/25 19:40:10 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'bridge0\x00'}}, 0x1e) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ip6_vti0\x00'}}) 2018/04/25 19:40:10 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x4, &(0x7f0000000040)) socket$kcm(0x29, 0x2, 0x0) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x4012}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) dup3(r0, r1, 0x0) 2018/04/25 19:40:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8912, &(0x7f0000000900)={0x0, {0x2}, {0x2}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)='syz_tun\x00'}) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1000, 0x200) signalfd4(r1, &(0x7f00000002c0)={0x81}, 0x8, 0x800) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x60, "61bc953ca1c259977283a1e8872ec4b14bcb293aad7182746a5bdcd309bf7502968bb4ec9d4f0722c70869860c81be57200e874db1eb220de50705f4602e89e4a647dc0ec6c897865497632bd7971fb7eecf3b9037c18c5351f248eeb8a3a5e7"}, &(0x7f0000000080)=0x68) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={r2, 0xfad1, 0x1}, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000240), &(0x7f0000000280)=0x4) 2018/04/25 19:40:10 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, r0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/25 19:40:10 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0xc3) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100", 0x1b}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f", 0x1}], 0x1) 2018/04/25 19:40:10 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @result}], 0x30) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) [ 92.836985] ================================================================== [ 92.844413] BUG: KMSAN: uninit-value in memcmp+0x119/0x180 [ 92.850043] CPU: 1 PID: 5019 Comm: kworker/1:3 Not tainted 4.16.0+ #87 [ 92.856707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.866077] Workqueue: ipv6_addrconf addrconf_dad_work [ 92.871353] Call Trace: [ 92.873950] dump_stack+0x185/0x1d0 [ 92.877576] ? memcmp+0x119/0x180 [ 92.881031] kmsan_report+0x142/0x240 2018/04/25 19:40:10 executing program 3: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff9000/0x1000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x408000dffc) [ 92.884834] __msan_warning_32+0x6c/0xb0 [ 92.888894] memcmp+0x119/0x180 [ 92.892177] __dev_mc_add+0x1c2/0x8e0 [ 92.895980] ? ndisc_mc_map+0x59f/0x8c0 [ 92.899957] dev_mc_add+0x6d/0x80 [ 92.903414] igmp6_group_added+0x2db/0xa00 [ 92.907662] ipv6_dev_mc_inc+0xe9e/0x1130 [ 92.911828] addrconf_dad_work+0x462/0x2a20 [ 92.916253] ? ipv6_get_saddr_eval+0x1450/0x1450 [ 92.921029] process_one_work+0x12c6/0x1f60 [ 92.925371] worker_thread+0x113c/0x24f0 [ 92.929448] ? process_one_work+0x1f60/0x1f60 [ 92.933944] kthread+0x539/0x720 [ 92.937317] ? process_one_work+0x1f60/0x1f60 [ 92.941822] ? kthread_blkcg+0xf0/0xf0 [ 92.945712] ret_from_fork+0x35/0x40 [ 92.949419] [ 92.951039] Local variable description: ----buf@igmp6_group_added [ 92.957261] Variable was created at: [ 92.960976] igmp6_group_added+0x4a/0xa00 [ 92.965121] ipv6_dev_mc_inc+0xe9e/0x1130 [ 92.969261] ================================================================== [ 92.976616] Disabling lock debugging due to kernel taint 2018/04/25 19:40:11 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000001fff), &(0x7f0000b02000), &(0x7f00000aaffc), &(0x7f0000002886)) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000e, &(0x7f0000000000)) 2018/04/25 19:40:11 executing program 6: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00007d8ef8)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x20a) [ 92.982063] Kernel panic - not syncing: panic_on_warn set ... [ 92.982063] [ 92.989433] CPU: 1 PID: 5019 Comm: kworker/1:3 Tainted: G B 4.16.0+ #87 [ 92.997395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.006762] Workqueue: ipv6_addrconf addrconf_dad_work [ 93.012043] Call Trace: [ 93.014637] dump_stack+0x185/0x1d0 [ 93.018276] panic+0x39d/0x940 [ 93.021488] ? memcmp+0x119/0x180 [ 93.024944] kmsan_report+0x238/0x240 [ 93.028747] __msan_warning_32+0x6c/0xb0 [ 93.032804] memcmp+0x119/0x180 [ 93.036087] __dev_mc_add+0x1c2/0x8e0 [ 93.039894] ? ndisc_mc_map+0x59f/0x8c0 [ 93.043867] dev_mc_add+0x6d/0x80 [ 93.047415] igmp6_group_added+0x2db/0xa00 [ 93.052185] ipv6_dev_mc_inc+0xe9e/0x1130 [ 93.056339] addrconf_dad_work+0x462/0x2a20 [ 93.060663] ? ipv6_get_saddr_eval+0x1450/0x1450 [ 93.065419] process_one_work+0x12c6/0x1f60 [ 93.069763] worker_thread+0x113c/0x24f0 [ 93.073832] ? process_one_work+0x1f60/0x1f60 [ 93.078330] kthread+0x539/0x720 [ 93.081704] ? process_one_work+0x1f60/0x1f60 [ 93.086204] ? kthread_blkcg+0xf0/0xf0 [ 93.090089] ret_from_fork+0x35/0x40 [ 93.094250] Dumping ftrace buffer: [ 93.097773] (ftrace buffer empty) [ 93.101460] Kernel Offset: disabled [ 93.105064] Rebooting in 86400 seconds..