INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.28' (ECDSA) to the list of known hosts. 2018/04/16 23:00:41 fuzzer started 2018/04/16 23:00:42 dialing manager at 10.128.0.26:43021 2018/04/16 23:00:48 kcov=true, comps=false 2018/04/16 23:00:51 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") flistxattr(r0, &(0x7f0000000100)=""/2, 0x2) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/16 23:00:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x800010040005}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x5, 0x1, [0xeeb6]}, 0xa) 2018/04/16 23:00:51 executing program 7: clone(0x200, &(0x7f0000000100), &(0x7f0000000080), &(0x7f0000f8b000), &(0x7f0000000100)) mknod(&(0x7f0000b75ff8)='./file0\x00', 0x8000000002801001, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000240), &(0x7f0000000140)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00006f0000)=""/154, 0x9a}], 0x1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0x5) creat(&(0x7f0000b7a000)='./file0\x00', 0x0) 2018/04/16 23:00:51 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000087fff8)={0xffffffffffffffff}) fcntl$setownex(r0, 0xf, &(0x7f0000435000)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) 2018/04/16 23:00:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') pread64(r0, &(0x7f0000000200)=""/8, 0x5a, 0x9f) 2018/04/16 23:00:51 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x6c) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000740)='syz_tun\x00', 0x47b) sendto$inet(r0, &(0x7f0000000240)="a9", 0x1, 0x0, &(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080), 0x10) sendto$inet(r0, &(0x7f00000000c0)='4', 0x1, 0x0, 0x0, 0x0) close(r0) 2018/04/16 23:00:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x7}}, 0x14) 2018/04/16 23:00:51 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00003d1ffc)='bbr\x00', 0x4) recvfrom$inet(0xffffffffffffffff, &(0x7f00009be000)=""/11, 0x393, 0x0, 0x0, 0xffffffffffffff4e) shutdown(r0, 0x1) syzkaller login: [ 44.577907] ip (3737) used greatest stack depth: 54688 bytes left [ 44.856953] ip (3761) used greatest stack depth: 54672 bytes left [ 45.132658] ip (3789) used greatest stack depth: 54408 bytes left [ 45.152869] ip (3787) used greatest stack depth: 54312 bytes left [ 46.145288] ip (3890) used greatest stack depth: 54200 bytes left [ 46.450807] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.457313] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.497349] device bridge_slave_0 entered promiscuous mode [ 46.600403] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.606900] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.654971] device bridge_slave_0 entered promiscuous mode [ 46.678338] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.684806] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.704383] device bridge_slave_0 entered promiscuous mode [ 46.718770] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.725234] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.744940] device bridge_slave_0 entered promiscuous mode [ 46.754370] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.760790] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.778637] device bridge_slave_0 entered promiscuous mode [ 46.789864] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.796309] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.822997] device bridge_slave_0 entered promiscuous mode [ 46.838227] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.844743] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.864197] device bridge_slave_1 entered promiscuous mode [ 46.873537] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.879992] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.898619] device bridge_slave_0 entered promiscuous mode [ 46.912382] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.918832] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.933849] device bridge_slave_0 entered promiscuous mode [ 46.947388] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.953882] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.984553] device bridge_slave_1 entered promiscuous mode [ 46.992925] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.999390] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.012360] device bridge_slave_1 entered promiscuous mode [ 47.019377] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.025826] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.041392] device bridge_slave_1 entered promiscuous mode [ 47.047906] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.054365] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.073112] device bridge_slave_1 entered promiscuous mode [ 47.083960] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.090421] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.119554] device bridge_slave_1 entered promiscuous mode [ 47.133833] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.142921] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.149376] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.172893] device bridge_slave_1 entered promiscuous mode [ 47.179521] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.186007] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.209267] device bridge_slave_1 entered promiscuous mode [ 47.218238] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.231109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.239377] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.247583] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.255791] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.308563] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.358548] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.399829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.414220] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.433827] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.449996] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.462507] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.472116] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.527218] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.702742] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.306317] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.386475] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.410530] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.439852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.482318] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.492265] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.502431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.512519] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.581983] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.615017] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.645237] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.665270] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.696366] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.713316] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.742441] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 48.895012] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.469997] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.552057] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.596474] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.691735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.702928] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.721126] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.763836] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.780007] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.792700] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.808827] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.817249] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 49.896125] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 49.904931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 49.920005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 49.960416] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.967659] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 49.992438] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.000929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.014692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.038904] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.049636] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.056713] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.073883] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.083685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.098720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.156446] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.164280] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.171471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.180428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.209629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.239598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.270661] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.277972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.298566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.319332] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.330665] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.341822] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.349680] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.358300] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.365776] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.377387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.401100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.426212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.454803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.473741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.486423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.494778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.502570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.510666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.524513] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.531809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.541632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.561008] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.570322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.586744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.625306] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.637624] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.647307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.673894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.708739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.740184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.789435] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 50.797185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.806384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.368763] ip (4270) used greatest stack depth: 54160 bytes left [ 52.710267] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.716770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.723618] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.730253] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.761878] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.768694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.783899] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.790377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.797237] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.803695] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.817795] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.828070] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.834531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.841369] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.847896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.857315] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.867903] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.874348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.881203] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.887670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.912534] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 52.922833] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.929284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.936162] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.942605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.978740] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.007475] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.013971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.020841] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.027289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.097007] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.132384] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.138897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.145721] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.152199] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.232932] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.248901] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.255384] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.262214] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.268658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.295343] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.792213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.807672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.848735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.868836] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.883640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.892796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.900703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.051906] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.088970] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.117095] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.147098] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.275298] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.295198] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.322453] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.357134] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.860195] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.866592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.878235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.896127] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.912456] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 62.918699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.933174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.940966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.967854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.994920] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.003184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.024643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.081346] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.087634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.101241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.129306] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.150342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.182608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.213309] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.222247] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.237653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.261704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.291629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.314619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/16 23:01:18 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") flistxattr(r0, &(0x7f0000000100)=""/2, 0x2) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/16 23:01:18 executing program 1: 2018/04/16 23:01:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x7}}, 0x14) 2018/04/16 23:01:18 executing program 3: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0x100009, 0x4) bind$inet6(r0, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x21000000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/16 23:01:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{}, {}, {}, {}], 0x4) 2018/04/16 23:01:18 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) 2018/04/16 23:01:18 executing program 7: clone(0x200, &(0x7f0000000100), &(0x7f0000000080), &(0x7f0000f8b000), &(0x7f0000000100)) mknod(&(0x7f0000b75ff8)='./file0\x00', 0x8000000002801001, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000240), &(0x7f0000000140)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00006f0000)=""/154, 0x9a}], 0x1, 0x0) lseek(r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0x5) creat(&(0x7f0000b7a000)='./file0\x00', 0x0) 2018/04/16 23:01:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x800010040005}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x5, 0x1, [0xeeb6]}, 0xa) 2018/04/16 23:01:18 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000080), 0x4) 2018/04/16 23:01:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x7}}, 0x14) 2018/04/16 23:01:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000252000)='net/stat\x00') getdents(r0, &(0x7f0000000000)=""/241, 0xf1) getdents(r0, &(0x7f0000000000), 0x2b7) 2018/04/16 23:01:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000080)=0x80000000, 0x4) 2018/04/16 23:01:19 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000), 0x3) 2018/04/16 23:01:19 executing program 4: r0 = socket(0x2, 0x803, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)="6c6f0000000000000000000000835600", 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000f05ff0)={0x2, 0x0, @rand_addr}, 0x10) 2018/04/16 23:01:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) 2018/04/16 23:01:19 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080), 0x0) 2018/04/16 23:01:19 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000005cc0)={&(0x7f0000005c80)=@ipv6_newroute={0x1c, 0x18, 0x711, 0x0, 0x0, {0xa}}, 0x1c}, 0x1}, 0x0) 2018/04/16 23:01:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x7}}, 0x14) 2018/04/16 23:01:19 executing program 7: clock_gettime(0x10003, &(0x7f0000000480)) 2018/04/16 23:01:19 executing program 5: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x7}}, 0x14) 2018/04/16 23:01:19 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000), 0x3) 2018/04/16 23:01:19 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 2018/04/16 23:01:19 executing program 3: syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x3) 2018/04/16 23:01:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000000)=""/241, 0xf1, 0x0) 2018/04/16 23:01:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec), 0xfd6c) 2018/04/16 23:01:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001}, @in=@rand_addr}}, 0xf0}, 0x1}, 0x0) 2018/04/16 23:01:19 executing program 7: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) inotify_rm_watch(r0, r1) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 2018/04/16 23:01:19 executing program 5: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x7}}, 0x14) 2018/04/16 23:01:19 executing program 3: unshare(0x40600) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200), &(0x7f00000003c0), 0x0) 2018/04/16 23:01:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x14) 2018/04/16 23:01:19 executing program 4: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:19 executing program 6: rt_sigaction(0x1f, &(0x7f0000000000), 0x0, 0x8, &(0x7f0000000040)) 2018/04/16 23:01:20 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r0, &(0x7f0000000000)='}', 0x1, 0x0, &(0x7f0000606fe4)={0xa, 0x4e21, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x1}, 0x1c) listen(r0, 0xc00000000007) r1 = accept(r0, &(0x7f0000000180), &(0x7f0000000200)=0x80) sendmmsg(r1, &(0x7f0000001b40)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)="9d", 0x1}], 0x1, &(0x7f0000000340)}}], 0x1, 0x0) 2018/04/16 23:01:20 executing program 1: socket$packet(0x11, 0x800000000002, 0x300) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/16 23:01:20 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852a, 0x8020ffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:20 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) close(r0) 2018/04/16 23:01:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'teql0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000900)=@setlink={0x28, 0x13, 0x301, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_MASTER={0x8, 0xa, 0x5}]}, 0x28}, 0x1}, 0x0) 2018/04/16 23:01:20 executing program 5: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x7}}, 0x14) 2018/04/16 23:01:20 executing program 4: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:20 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000940000)={0x1000000000000005, 0x70, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = getpgid(0xffffffffffffffff) fcntl$setown(r1, 0x8, r2) bind$inet(r1, &(0x7f0000dec000)={0x2, 0x8000000000004e20, @loopback=0x7f000001}, 0x10) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x82000, 0x0) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000040), 0x2) setsockopt$inet_tcp_int(r3, 0x6, 0x7, &(0x7f0000df1000)=0x6, 0x4) r4 = dup(r1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f000093fffc)=0xffffffffffffffd8) ioctl$KDSETLED(r4, 0x4b32, 0x7fff) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f0000f7a000)) sendto$inet(r1, &(0x7f0000de1fff), 0xffffffffffffffe6, 0x20008045, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) r5 = accept4(r1, 0x0, &(0x7f0000213ffc), 0x80000) getpeername$unix(0xffffffffffffffff, &(0x7f000062efeb), &(0x7f0000d0a000)=0x15) read(r0, &(0x7f00000000c0)=""/4096, 0x1000) fcntl$getown(0xffffffffffffffff, 0x9) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000504000)={&(0x7f0000078ff4)={0x10}, 0xc, &(0x7f000009b000)={&(0x7f0000000080)=ANY=[]}, 0x1}, 0x0) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000c7bf92), &(0x7f0000e7dffc)=0x6e) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f00000010c0)={0x20, 0x4}) fstatfs(r5, &(0x7f0000001100)=""/152) mmap(&(0x7f0000aa7000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000aa7000)='coredump_filter\x00') sendfile(r4, r6, 0x0, 0xef5d) [ 71.211273] IPv4: Oversized IP packet from 127.0.0.1 2018/04/16 23:01:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x7}}, 0x14) 2018/04/16 23:01:20 executing program 6: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x1, &(0x7f0000982f5b)=ANY=[@ANYBLOB="03ffd88e82276215410772f8080045070000000000000000907800000000e0000001000000000401cc9078002099e9005d00"], &(0x7f00000e7fec)) 2018/04/16 23:01:20 executing program 4: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:20 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852a, 0x8020ffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:20 executing program 1: socket$packet(0x11, 0x800000000002, 0x300) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/16 23:01:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000101000)={@link_local={0x1, 0x80, 0xc2}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x0, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}}}}}}}}, 0x0) [ 71.455720] IPv4: Oversized IP packet from 127.0.0.1 2018/04/16 23:01:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x7}}, 0x14) 2018/04/16 23:01:21 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r0, &(0x7f0000000000)='}', 0x1, 0x0, &(0x7f0000606fe4)={0xa, 0x4e21, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x1}, 0x1c) listen(r0, 0xc00000000007) r1 = accept(r0, &(0x7f0000000180), &(0x7f0000000200)=0x80) sendmmsg(r1, &(0x7f0000001b40)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)="9d", 0x1}], 0x1, &(0x7f0000000340)}}], 0x1, 0x0) 2018/04/16 23:01:21 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="617474722f63757272656e740076a9ca4ff16c4970cf9c38337cf4577baac62ad1a02d7b959a80745998d5daaa7b853ba29bc29fb78082066936b39c6d106edb010dd03c39ba9f13389191d6ffd44ab16212b92766651111dd034d18c4276a2c7d5bcddf82aa563dec3f2b") unshare(0x40600) pwritev(r0, &(0x7f0000000200), 0x0, 0x0) 2018/04/16 23:01:21 executing program 2: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)="e1", 0x1, 0xfffffffffffffffb) 2018/04/16 23:01:21 executing program 4: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047504d6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0f37a6438b99a45ea22b1f4fb05668a8a0eb2447145012945a42cfa188cb11bdcac0e1a07ea90b9026bffa80230beb7ee22c1ec4a6f5708d9e3ded1f17bf199d72a98384eabf09434beef73963fe7b39601f2e25a0e9ae0b17a52a87f053048fe5c498dd0cce40de37a6ce85c000000000000000000000000000000") preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/16 23:01:21 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852a, 0x8020ffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:21 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x0, 'memory', 0x20}, {0x0, 'rdma', 0x20}, {0x0, 'rdma', 0x20}]}, 0xfffffca5) 2018/04/16 23:01:21 executing program 6: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = inotify_init1(0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 2018/04/16 23:01:21 executing program 4: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:21 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="cd394b081bf2ffffffffffff86dd6002000000003a0000000000000000000000ffff00000080ff0200000000000000000000000000010500907800000000609433df00003a00ff020036000000000000000000000001fe800000000000000200000000000000802a08000000006b"], 0x0) 2018/04/16 23:01:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) sendto$inet(r0, &(0x7f0000000040), 0x132, 0x900000020000000, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff}, 0x14) sendto$inet(r0, &(0x7f0000000cc0)="b16419702ec5be69645f772ecc2f3b7a36ead2b6dca003000000494102b91685f0dd326d79475c10e35dfa7b8b3a0691a825756223491ba44eb28a97b1c325fa72a95502e91c7b480639aa429bfa487f327b1116f655eaeb645a30", 0x5b, 0x1, 0x0, 0x0) 2018/04/16 23:01:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x7}}, 0x14) 2018/04/16 23:01:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) getpeername(r0, &(0x7f00000004c0)=@alg, &(0x7f00000005c0)=0x80) 2018/04/16 23:01:21 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852a, 0x8020ffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:21 executing program 4: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000000)="89", 0x1}, {&(0x7f00000002c0)="8c", 0x1}], 0x2) 2018/04/16 23:01:22 executing program 3: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r0 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={"6c6f00fadd00000018000800", 0x0}) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x3ca66c437787328, 0x0) 2018/04/16 23:01:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0xfffffffe, 0x4) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x20020003, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000002f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000003180), 0x0, &(0x7f00000031c0)}}, {{&(0x7f0000003480)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x80, &(0x7f0000005780), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000000600008d01000000000000"], 0x10}}], 0x2, 0x0) 2018/04/16 23:01:22 executing program 6: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) 2018/04/16 23:01:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000040)={@dev={0xfe, 0x7}}, 0x14) 2018/04/16 23:01:22 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) 2018/04/16 23:01:22 executing program 4: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:22 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000040)={@dev={0xfe, 0x7}}, 0x14) 2018/04/16 23:01:22 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1=0xe0000001}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 2018/04/16 23:01:22 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) 2018/04/16 23:01:22 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:22 executing program 2: clone(0x200, &(0x7f0000000100), &(0x7f0000000080), &(0x7f0000f8b000), &(0x7f0000000100)) mknod(&(0x7f0000b75ff8)='./file0\x00', 0x8000000002801001, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000240), &(0x7f0000000140)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x0) pread64(r0, &(0x7f00000000c0)=""/53, 0x1c1, 0x0) creat(&(0x7f0000b7a000)='./file0\x00', 0x0) 2018/04/16 23:01:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000301ffff00000000000000000000004f220800b60000001f"], 0x1c}, 0x1}, 0x0) 2018/04/16 23:01:22 executing program 0: r0 = socket(0x200000000010, 0x2, 0x0) write(r0, &(0x7f000095c000)="2400000026007f000000000000007701000000ff0100000002000000ffffffff0100ff10", 0x24) 2018/04/16 23:01:22 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3, 0xfffffffffffffff9}, 0x4) [ 73.621487] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 73.756389] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 2018/04/16 23:01:23 executing program 1: clone(0x200, &(0x7f0000000100), &(0x7f0000000080), &(0x7f0000f8b000), &(0x7f0000000100)) mknod(&(0x7f0000b75ff8)='./file0\x00', 0x8000000002801001, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000240), &(0x7f0000000140)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x0) pread64(r0, &(0x7f00000000c0)=""/53, 0x1c1, 0x0) creat(&(0x7f0000b7a000)='./file0\x00', 0x0) 2018/04/16 23:01:23 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e00000027f0000010000000002000000000000007f0000019d9259a8d93b1c2426e71109edf8b33e23cb82880bf53488c97da6c483a68b267b44ba692467645c1ac6a4c8d105ae0906040699bf9fa1a12787fc8993effbbe006e1cc4c6e2da0e950a22efc2afea61a5ccd268b171230b27eb52dca15fe0345544f07239d277d3307a6863d85259492e7fea4cde7a47402007c9758075f904496d0614047c945b426ee982e80dbf3ecc79908aa4c8ca68b9381d5e1347f56d4ef7a4d1099c6d46f7c90ad3711a0b5addb7b14d38"], 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000c26000)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}, @loopback=0x7f000001}, 0xc) 2018/04/16 23:01:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000040)={@dev={0xfe, 0x7}}, 0x14) 2018/04/16 23:01:23 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:23 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x800e}}, @icmp=@parameter_prob={0x3, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:01:23 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:23 executing program 2: clone(0x200, &(0x7f0000000100), &(0x7f0000000080), &(0x7f0000f8b000), &(0x7f0000000100)) mknod(&(0x7f0000b75ff8)='./file0\x00', 0x8000000002801001, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000240), &(0x7f0000000140)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x0) pread64(r0, &(0x7f00000000c0)=""/53, 0x1c1, 0x0) creat(&(0x7f0000b7a000)='./file0\x00', 0x0) 2018/04/16 23:01:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x5623000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001, 0x0, 0x2b}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) 2018/04/16 23:01:23 executing program 4: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:23 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x800e}}, @icmp=@parameter_prob={0x3, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:01:23 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000db4fb6)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="40a8f100d10d", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @broadcast=0xffffffff}, @icmp=@timestamp={0xd}}}}}, &(0x7f0000ea3000)) 2018/04/16 23:01:23 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852a, 0x8020ffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x5623000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001, 0x0, 0x2b}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) 2018/04/16 23:01:23 executing program 6: socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x6a, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr, {[@timestamp={0x44, 0x4}]}}, @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}, &(0x7f0000000040)) 2018/04/16 23:01:24 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x800e}}, @icmp=@parameter_prob={0x3, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:01:24 executing program 4: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4)=[@in6={0xa, 0x4e23}], 0x1c) sendto$inet(r0, &(0x7f0000ac0fbb)="c4", 0x1, 0x0, &(0x7f00006e2000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f000056effc), 0x4) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}}, &(0x7f00000001c0)=0xb0) 2018/04/16 23:01:24 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000b2000), 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080), 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000965fec), 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000640), 0x0) writev(0xffffffffffffffff, &(0x7f0000001040), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 2018/04/16 23:01:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x5623000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001, 0x0, 0x2b}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) 2018/04/16 23:01:24 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852a, 0x8020ffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:24 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x5b}, 0x32) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x10, 0xfffffffc, 0xcce0ecd, &(0x7f0000000180)) 2018/04/16 23:01:24 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x0) recvmsg$kcm(r0, &(0x7f0000001a40)={&(0x7f0000000240)=@nfc, 0x80, &(0x7f0000001880)=[{&(0x7f00000002c0)=""/221, 0xdd}], 0x1, &(0x7f0000001940)=""/223, 0xdf}, 0x0) 2018/04/16 23:01:24 executing program 4: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x5623000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001, 0x0, 0x2b}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) 2018/04/16 23:01:24 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x800e}}, @icmp=@parameter_prob={0x3, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:01:24 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000840)=[{0x10, 0x3a}], 0x10}, 0x0) 2018/04/16 23:01:24 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852a, 0x8020ffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:24 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14}}, 0x40) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@random="875db04ddf52", @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty=0xac1414aa, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/16 23:01:24 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000490000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000482000)="be", 0x1, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)='c', 0x1, 0x1, &(0x7f00000000c0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/16 23:01:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000223fd4)=[@in6={0xa, 0x4e23}], 0x1c) sendto$inet(r0, &(0x7f0000ac0fbb)="c4", 0x1, 0x0, &(0x7f00006e2000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f000056effc), 0x4) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}}, &(0x7f00000001c0)=0xb0) [ 75.786711] raw_sendmsg: syz-executor2 forgot to set AF_INET. Fix it! 2018/04/16 23:01:24 executing program 4: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:24 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x800e}}, @icmp=@parameter_prob={0x3, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:01:24 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x5623000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001, 0x0, 0x2b}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) 2018/04/16 23:01:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000252000)='map_files\x00') getdents(r0, &(0x7f0000000040), 0x931c4bc063f2bcfb) 2018/04/16 23:01:25 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852a, 0x8020ffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x4}, {}, {}, {}, {}, {}, {}, {}], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff, 0x10000007fffffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000540)='A', 0x1}], 0x1) writev(r0, &(0x7f0000001040)=[{&(0x7f00000000c0)='2', 0x1}], 0x1) 2018/04/16 23:01:25 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x800e}}, @icmp=@parameter_prob={0x3, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:01:25 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000252000)='net/stat\x00') getdents(r0, &(0x7f0000000000), 0x0) 2018/04/16 23:01:25 executing program 4: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:25 executing program 1: unshare(0x20004087ffff) 2018/04/16 23:01:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x5623000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001, 0x0, 0x2b}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) 2018/04/16 23:01:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x5623000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0x104, 0x10, 0x0, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001, 0x0, 0x2b}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) 2018/04/16 23:01:25 executing program 4: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffff9}, 0x4) 2018/04/16 23:01:25 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x800e}}, @icmp=@parameter_prob={0x3, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:01:25 executing program 1: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x20000000, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 2018/04/16 23:01:25 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000140), &(0x7f0000000180), 0x8) 2018/04/16 23:01:25 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852a, 0x8020ffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:25 executing program 2: r0 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) fsetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_default\x00', &(0x7f0000000500)='\x00', 0x1, 0x0) 2018/04/16 23:01:25 executing program 5: clone(0x200, &(0x7f00000e7000), &(0x7f000025e000), &(0x7f0000c47000), &(0x7f0000000040)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f00006fcff0)) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x26502, 0x0) 2018/04/16 23:01:25 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x3, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:01:25 executing program 4: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3}, 0x4) 2018/04/16 23:01:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x5623000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0x104, 0x10, 0x0, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001, 0x0, 0x2b}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) 2018/04/16 23:01:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000252000)='map_files\x00') unshare(0x40600) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) 2018/04/16 23:01:25 executing program 1: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0x100009, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000903ff8)=@fragment, 0x8) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000000)=0x800000005, 0x4) bind$inet6(r0, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x21000000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/16 23:01:25 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000140), &(0x7f0000000180), 0x8) 2018/04/16 23:01:25 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852a, 0x8020ffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x5623000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0x104, 0x10, 0x0, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001, 0x0, 0x2b}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) 2018/04/16 23:01:25 executing program 4: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3}, 0x4) 2018/04/16 23:01:25 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x3, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:01:25 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000140), &(0x7f0000000180), 0x8) 2018/04/16 23:01:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000252000)='map_files\x00') unshare(0x40600) getdents(r0, &(0x7f0000000040), 0x931c4bc063f2bcfb) 2018/04/16 23:01:25 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852a, 0x8020ffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:25 executing program 1: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x104) 2018/04/16 23:01:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x5623000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) 2018/04/16 23:01:26 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000140), &(0x7f0000000180), 0x8) 2018/04/16 23:01:26 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x3, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000200)) 2018/04/16 23:01:26 executing program 4: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3}, 0x4) 2018/04/16 23:01:26 executing program 2: r0 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) fsetxattr(r0, &(0x7f00000004c0)=@known='system.posix_acl_default\x00', &(0x7f0000000500)='GPL\a):#user$em1)%nodev\x00', 0x17, 0x0) 2018/04/16 23:01:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x10000006}) 2018/04/16 23:01:26 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000254ff8)='./file0\x00', 0x141042, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280)={0x7fffffff}, &(0x7f0000000200), 0x8) ftruncate(r2, 0x27ffe) sendfile(r1, r2, &(0x7f0000000040), 0x8080000001) 2018/04/16 23:01:26 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852a, 0x8020ffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:26 executing program 6: ppoll(&(0x7f00000000c0)=[{}], 0x1, &(0x7f0000000140), &(0x7f0000000180), 0x8) 2018/04/16 23:01:26 executing program 2: ppoll(&(0x7f0000000100)=[{}], 0x1, &(0x7f0000000080), &(0x7f0000000180), 0x5) 2018/04/16 23:01:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x5623000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) 2018/04/16 23:01:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000252000)='net/stat\x00') getdents(r0, &(0x7f0000000040), 0x931c4bc063f2bcfb) 2018/04/16 23:01:26 executing program 0: syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f00000007c0)=ANY=[]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x1, './file0\x00'}, 0x6e) 2018/04/16 23:01:26 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)='\b', 0x1}], 0x1, &(0x7f0000000240)}, 0x20000040) 2018/04/16 23:01:26 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852a, 0x8020ffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:26 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50900fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x9}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x2, 0x7fd189a56000, 0x1, &(0x7f0000002580)) 2018/04/16 23:01:26 executing program 6: ppoll(&(0x7f00000000c0)=[{}], 0x1, &(0x7f0000000140), &(0x7f0000000180), 0x8) 2018/04/16 23:01:26 executing program 6: ppoll(&(0x7f00000000c0)=[{}], 0x1, &(0x7f0000000140), &(0x7f0000000180), 0x8) 2018/04/16 23:01:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) r1 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000180), 0x127) close(r1) 2018/04/16 23:01:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000490000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000482000)="be", 0x1, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x852b, 0xffff, 0x10000007fffffff}, 0x14) sendto$inet(r0, &(0x7f0000dd9000)="b7", 0x1, 0x0, &(0x7f00007a5000)={0x2}, 0x10) sendto$inet(r0, &(0x7f0000000000)='c', 0x1, 0x1, &(0x7f00000000c0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/16 23:01:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x5623000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) 2018/04/16 23:01:26 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2}, 0x10) connect$unix(r0, &(0x7f0000000340)=@abs, 0x6e) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852a, 0x8020ffff}, 0x14) sendto$inet(r0, &(0x7f0000000300)='U', 0x1, 0x0, 0x0, 0x0) 2018/04/16 23:01:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c) 2018/04/16 23:01:26 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x3}, 0x1c) sendmsg(r0, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000000ff0)=[{&(0x7f0000000040)="06ef", 0x2}], 0x1, &(0x7f0000000080)}, 0x2000c080) write(r0, &(0x7f0000000300)="d019", 0x2) 2018/04/16 23:01:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYBLOB="ffffff000a00020051ddaaedeaaa0000ac46096c7d700cf0086742dc27ba121e0d64365b6868831caf7b97c6863ede0e726e7291bccd15ebadfcfdcbdaa0af7663f0a209bd9c49e587cdbe9b162cb41fe97d8215f23f5a38418b1f70b481902ecf90d40fec3b9dc0974d67758f2bbb3fe1ffe841850a75076106800000000000008f9e179048f4a527cd5caace1ba006e98eebbb947f4aabc53e5fa0caf3429c6ea505796d07b86686ba34aabd45f00941993af75e4ed45878b4009d961416c0eb336b3882ec5e91410037a73f6db4acd98433584feb9278203157920b"], 0x2}, 0x1}, 0x0) [ 77.983646] ================================================================== [ 77.991086] BUG: KMSAN: uninit-value in rawv6_sendmsg+0x4bee/0x4cc0 [ 77.997507] CPU: 0 PID: 6318 Comm: syz-executor5 Not tainted 4.16.0+ #84 [ 78.004345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.013702] Call Trace: [ 78.016294] dump_stack+0x185/0x1d0 [ 78.019929] ? rawv6_sendmsg+0x4bee/0x4cc0 [ 78.024166] kmsan_report+0x142/0x240 [ 78.027993] __msan_warning_32+0x6c/0xb0 [ 78.032109] rawv6_sendmsg+0x4bee/0x4cc0 [ 78.036173] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 78.041631] ? futex_wait_queue_me+0x687/0x710 [ 78.046246] ? compat_rawv6_ioctl+0x30/0x30 [ 78.050571] inet_sendmsg+0x48d/0x740 [ 78.054373] ? security_socket_sendmsg+0x9e/0x210 [ 78.059222] ? inet_getname+0x500/0x500 [ 78.063203] sock_write_iter+0x3b9/0x470 [ 78.067278] ? sock_read_iter+0x480/0x480 [ 78.071431] __vfs_write+0x719/0x910 [ 78.075177] vfs_write+0x463/0x8d0 [ 78.078727] SYSC_write+0x172/0x360 2018/04/16 23:01:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x5623000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000001, 0x0, 0x2b}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0x0, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) [ 78.082361] SyS_write+0x55/0x80 [ 78.085728] do_syscall_64+0x309/0x430 [ 78.089638] ? SYSC_read+0x360/0x360 [ 78.093359] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 78.098543] RIP: 0033:0x455329 [ 78.101725] RSP: 002b:00007f1264a46c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 78.109432] RAX: ffffffffffffffda RBX: 00007f1264a476d4 RCX: 0000000000455329 [ 78.116707] RDX: 0000000000000002 RSI: 0000000020000300 RDI: 0000000000000013 [ 78.124058] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 78.131327] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 78.138597] R13: 00000000000006b6 R14: 00000000006fd1b0 R15: 0000000000000000 [ 78.145863] [ 78.147485] Uninit was stored to memory at: [ 78.151903] kmsan_internal_chain_origin+0x12b/0x210 [ 78.157005] kmsan_memcpy_origins+0x11d/0x170 [ 78.161501] __msan_memcpy+0x19f/0x1f0 [ 78.165386] skb_copy_bits+0x63a/0xdb0 [ 78.169269] rawv6_sendmsg+0x427e/0x4cc0 [ 78.173333] inet_sendmsg+0x48d/0x740 [ 78.177139] sock_write_iter+0x3b9/0x470 2018/04/16 23:01:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000100)=""/68, 0x44}, 0x0) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) [ 78.181200] __vfs_write+0x719/0x910 [ 78.184915] vfs_write+0x463/0x8d0 [ 78.188447] SYSC_write+0x172/0x360 [ 78.192073] SyS_write+0x55/0x80 [ 78.195432] do_syscall_64+0x309/0x430 [ 78.199315] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 78.204488] Uninit was created at: [ 78.208027] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 78.213040] kmsan_alloc_page+0x82/0xe0 [ 78.217103] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 78.221855] alloc_pages_current+0x6b5/0x970 [ 78.226263] skb_page_frag_refill+0x3ba/0x5e0 [ 78.230758] sk_page_frag_refill+0xa4/0x340 [ 78.235078] __ip6_append_data+0x1a20/0x4bb0 [ 78.239494] ip6_append_data+0x40e/0x6b0 [ 78.243555] rawv6_sendmsg+0x2787/0x4cc0 [ 78.247613] inet_sendmsg+0x48d/0x740 [ 78.251416] sock_write_iter+0x3b9/0x470 [ 78.255480] __vfs_write+0x719/0x910 [ 78.259194] vfs_write+0x463/0x8d0 [ 78.262731] SYSC_write+0x172/0x360 [ 78.266357] SyS_write+0x55/0x80 [ 78.269717] do_syscall_64+0x309/0x430 [ 78.273607] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 78.278781] ================================================================== [ 78.286136] Disabling lock debugging due to kernel taint [ 78.291579] Kernel panic - not syncing: panic_on_warn set ... [ 78.291579] [ 78.298942] CPU: 0 PID: 6318 Comm: syz-executor5 Tainted: G B 4.16.0+ #84 [ 78.307077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.316426] Call Trace: [ 78.319020] dump_stack+0x185/0x1d0 [ 78.322654] panic+0x39d/0x940 [ 78.325872] ? rawv6_sendmsg+0x4bee/0x4cc0 [ 78.330111] kmsan_report+0x238/0x240 [ 78.333917] __msan_warning_32+0x6c/0xb0 [ 78.337981] rawv6_sendmsg+0x4bee/0x4cc0 [ 78.342050] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 78.347507] ? futex_wait_queue_me+0x687/0x710 [ 78.352107] ? compat_rawv6_ioctl+0x30/0x30 [ 78.356433] inet_sendmsg+0x48d/0x740 [ 78.360237] ? security_socket_sendmsg+0x9e/0x210 [ 78.365084] ? inet_getname+0x500/0x500 [ 78.369060] sock_write_iter+0x3b9/0x470 [ 78.373130] ? sock_read_iter+0x480/0x480 [ 78.377284] __vfs_write+0x719/0x910 [ 78.381018] vfs_write+0x463/0x8d0 [ 78.384569] SYSC_write+0x172/0x360 [ 78.388207] SyS_write+0x55/0x80 [ 78.391572] do_syscall_64+0x309/0x430 [ 78.395464] ? SYSC_read+0x360/0x360 [ 78.399190] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 78.404376] RIP: 0033:0x455329 [ 78.407564] RSP: 002b:00007f1264a46c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 78.415271] RAX: ffffffffffffffda RBX: 00007f1264a476d4 RCX: 0000000000455329 [ 78.422538] RDX: 0000000000000002 RSI: 0000000020000300 RDI: 0000000000000013 [ 78.429817] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 78.437070] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 78.444341] R13: 00000000000006b6 R14: 00000000006fd1b0 R15: 0000000000000000 [ 78.452141] Dumping ftrace buffer: [ 78.455664] (ftrace buffer empty) [ 78.459349] Kernel Offset: disabled [ 78.462952] Rebooting in 86400 seconds..