INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.37' (ECDSA) to the list of known hosts. 2018/04/11 12:12:01 fuzzer started 2018/04/11 12:12:02 dialing manager at 10.128.0.26:36259 2018/04/11 12:12:08 kcov=true, comps=false 2018/04/11 12:12:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x5, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000ff0000000000000000630af0fe000000002f000000000000009500000000000000"], &(0x7f0000c43000)='syzkaller\x00', 0x8000, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe, 0x12, &(0x7f0000000000)="5b51b30ced6fe7cdea3c6a17d78b", &(0x7f0000000080)=""/18}, 0x28) 2018/04/11 12:12:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') pread64(r0, &(0x7f0000000000), 0x1d, 0x1001) 2018/04/11 12:12:11 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x2, 0x4, 0x7}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x13, 0x0, 0x800001, 0x0, 0x20000006, 0x0}, 0x2c) 2018/04/11 12:12:11 executing program 4: r0 = socket$inet(0x2, 0x20000000000003, 0x40000000000002) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xd1, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000500)=ANY=[], @ANYRES16, @ANYPTR=&(0x7f0000000600)=ANY=[], @ANYPTR], 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000015c0)={'team0\x00'}) 2018/04/11 12:12:11 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f0000000600)={&(0x7f0000000680)=@sco, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000080)=""/253, 0xfd}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0xfffffffffffffc64, &(0x7f000002efc0), 0x0, &(0x7f0000006fa0)}, 0x0) 2018/04/11 12:12:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xc, {0x2}, 'syz_tun\x00'}) 2018/04/11 12:12:11 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000600)=""/252, 0xfc}, 0x0) 2018/04/11 12:12:11 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000016c0), 0x0, &(0x7f00000017c0)) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') syzkaller login: [ 44.586803] ip (3754) used greatest stack depth: 54688 bytes left [ 45.048481] ip (3795) used greatest stack depth: 54672 bytes left [ 45.654216] ip (3855) used greatest stack depth: 54200 bytes left [ 46.190387] ip (3904) used greatest stack depth: 53960 bytes left [ 48.121763] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.377898] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.412010] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.510818] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.527658] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.535924] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.726625] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.736137] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 57.166656] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.326881] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.346939] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.365944] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.395854] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.709911] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.717085] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.808362] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.925966] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.932453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.943895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.092296] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.098593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.111930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.145402] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.151706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.160754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.191782] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.198342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.213581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.225653] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.234131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.250895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.454072] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.460403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.469102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.608964] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.615320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.625130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.657364] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.695226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.707607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/11 12:12:28 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) bind$packet(r0, &(0x7f0000000240)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6}, 0x14) 2018/04/11 12:12:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x5, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000ff0000000000000000630af0fe000000002f000000000000009500000000000000"], &(0x7f0000c43000)='syzkaller\x00', 0x8000, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe, 0x12, &(0x7f0000000000)="5b51b30ced6fe7cdea3c6a17d78b", &(0x7f0000000080)=""/18}, 0x28) 2018/04/11 12:12:29 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 2018/04/11 12:12:29 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x1b, "d736c5ca0d1b50e96f69f2e704670667af8d9e2618c2b76d8ca7c2049191fe77", "6e70bf9a57a799e7a56871e4f1e829091fc3abd062b731873ab286763a6b6551", "cfa8eb621d7bd0850e30158824b85ca75f9b4f56aa9152ab0a7c088b7d6106a0", "523fe94df3b990a0b9f83d855f95b06968d2350c45f648ab663bb4ec9aa39b7d", "fcf0d8b389ef1fbbfa4ef8f1c311dbf57e2aaeff6338500d648f008d5b0974e1", "65c3275cf4ae02ca1696f341"}}) 2018/04/11 12:12:29 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x70, 0x0, 0x0, 0x3f, 0xeda, 0x0, 0x0, 0x2, 0x6, 0x5, 0x4, 0x7, 0x3f, 0x0, 0x7fffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x7ff, 0x0, 0x0, 0x461e, 0x9, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, r0, 0x2) 2018/04/11 12:12:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r0, &(0x7f0000bc2000)="81", 0x1, 0x0, &(0x7f0000606fe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x1}, 0x1c) listen(r0, 0x7) r1 = accept4(r0, 0x0, &(0x7f0000004b80), 0x0) sendmmsg(r1, &(0x7f0000006d80)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000700)='>', 0x1}], 0x1, &(0x7f0000000a00)}}], 0x1, 0x0) 2018/04/11 12:12:29 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f000095cffe)={r1}, &(0x7f000095c000)=0x8) 2018/04/11 12:12:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2018/04/11 12:12:29 executing program 7: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x2, 0x4) sendmsg(r0, &(0x7f0000001880)={&(0x7f0000000040)=@in={0x2, 0x0, @broadcast=0xffffffff}, 0x80, &(0x7f0000001600), 0x0, &(0x7f0000000480)}, 0x0) 2018/04/11 12:12:29 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x2, 0x4, 0x7}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x13, 0x0, 0x800001, 0x0, 0x20000006, 0x0, 0x2}, 0x2c) 2018/04/11 12:12:29 executing program 3: r0 = socket$inet(0x2, 0x802, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) sendmsg(r0, &(0x7f0000779fc8)={0x0, 0x0, &(0x7f00002f0000)}, 0x0) 2018/04/11 12:12:29 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x1b, "d736c5ca0d1b50e96f69f2e704670667af8d9e2618c2b76d8ca7c2049191fe77", "6e70bf9a57a799e7a56871e4f1e829091fc3abd062b731873ab286763a6b6551", "cfa8eb621d7bd0850e30158824b85ca75f9b4f56aa9152ab0a7c088b7d6106a0", "523fe94df3b990a0b9f83d855f95b06968d2350c45f648ab663bb4ec9aa39b7d", "fcf0d8b389ef1fbbfa4ef8f1c311dbf57e2aaeff6338500d648f008d5b0974e1", "65c3275cf4ae02ca1696f341"}}) 2018/04/11 12:12:30 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2}, 'syz_tun\x00'}) 2018/04/11 12:12:30 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0xa, 0x3, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000001040)=[{0x10}], 0x10}, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x30, &(0x7f0000000ff0), 0x28c) 2018/04/11 12:12:30 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000a40)={0x0, 0x8c, "45a01e563714aa1b8cb51de5032f8984e1c4d2cefabd23d3ed84a09a8e440df70c0b8d3c22911e51870ecee248ef162dd099d32e96c0f916776115aa332ed17e107d9b32f8a820419d4d6b46ec022751ede14a719c42ee2d749554f02bf2c315eea41ca4be884d07b626d9e632c3abc3c5ca5be3f51b1d6b8684abe07bf995174fc8e97234262a5fd750cc72"}, &(0x7f0000000b40)=0x94) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000980)={r3, 0x400}, 0x8) mmap(&(0x7f0000c0a000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000fdb000)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0xd0, 0xd0, 0x1f8, 0xffffffff, 0xffffffff, 0x300, 0x300, 0x300, 0xffffffff, 0x4, &(0x7f0000e9afc0), {[{{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x3a0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) tee(r1, r0, 0x9, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000380)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x220, 0xe0, 0xffffffff, 0xe0, 0x2f0, 0x428, 0x428, 0xffffffff, 0x428, 0x428, 0x5, &(0x7f0000000300), {[{{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@loopback={0x0, 0x1}, @ipv6, @icmp_id=0x67, @gre_key=0x6}}}, {{@ip={@remote={0xac, 0x14, 0x14, 0xbb}, @loopback=0x7f000001, 0x0, 0x0, 'ip6gretap0\x00', 'syzkaller1\x00', {}, {0xff}, 0x0, 0x2, 0x20}, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x0, [0x0, 0x0, 0x5, 0x0, 0x9], 0x0, 0x6, 0xcf4}}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x10, @remote={0xac, 0x14, 0x14, 0xbb}, @broadcast=0xffffffff, @icmp_id=0x66, @gre_key=0x5}}}}, {{@ip={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast2=0xe0000002, 0x0, 0x0, 'syzkaller0\x00', 'bcsh0\x00', {0xff}, {}, 0x0, 0x3, 0x61}, 0x0, 0x98, 0xd0}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x5, @empty, @multicast1=0xe0000001, @gre_key=0x6, @icmp_id=0x64}}}}, {{@uncond, 0x0, 0x100, 0x138, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x2, 0x3ff}}, @common=@set={0x40, 'set\x00', 0x0, {{0xfffffffffffffff7, [0x77c1, 0xffffffffffffffff, 0x1f, 0xa9, 0x9, 0x5], 0x0, 0x7, 0x9}}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @remote={0xac, 0x14, 0x14, 0xbb}, @gre_key=0x5}}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4f0) r4 = socket$netlink(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f0000000040)={0x400}, 0xc) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000900)={0x0, 0x1, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000028fc8)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000015ff0)={&(0x7f0000023000)={0x14, 0x20, 0xaff, 0xffffffffffffffff, 0xffffffffffffffff}, 0x14}, 0x1}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000940)=@req) 2018/04/11 12:12:30 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x1b, "d736c5ca0d1b50e96f69f2e704670667af8d9e2618c2b76d8ca7c2049191fe77", "6e70bf9a57a799e7a56871e4f1e829091fc3abd062b731873ab286763a6b6551", "cfa8eb621d7bd0850e30158824b85ca75f9b4f56aa9152ab0a7c088b7d6106a0", "523fe94df3b990a0b9f83d855f95b06968d2350c45f648ab663bb4ec9aa39b7d", "fcf0d8b389ef1fbbfa4ef8f1c311dbf57e2aaeff6338500d648f008d5b0974e1", "65c3275cf4ae02ca1696f341"}}) 2018/04/11 12:12:30 executing program 2: r0 = memfd_create(&(0x7f0000000080)=',selinux/:mime_typeeth1([vmnet0GPL(posix_acl_access%keyringnodev(*systemmime_type\x00', 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000016c0), 0x0, &(0x7f00000002c0)=ANY=[]) write$binfmt_script(r0, &(0x7f0000000500)={'#! ', './file0', [{0x20}, {0x20, 'msdos\x00'}, {0x20, '+keyring]]^{nodev$vboxnet0selinux!nodev'}], 0xa}, 0x3b) 2018/04/11 12:12:30 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f00000005c0)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x40, 0x6}, 0x10) 2018/04/11 12:12:30 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x11, 0x3, 0x6) bind$packet(r0, &(0x7f0000000240)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6}, 0x14) syz_emit_ethernet(0x56, &(0x7f0000000500)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "37a30afa5dc632bedb2b8594c9c520d68ce86dcb4b657e8eb74830b9090ba8ab790d4f52bdc2825fe984593c4fe3f4b268daba3470c275857608a0c12e25adbb"}}}}, &(0x7f0000000180)) 2018/04/11 12:12:30 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000016c0), 0x0, &(0x7f00000017c0)) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='trusted.m'], &(0x7f0000000140)='procwlan0!\\\x00', 0xc, 0x0) listxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=""/4096, 0x1000) 2018/04/11 12:12:30 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000680)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000380)=@updpolicy={0xb8, 0x19, 0x11, 0x0, 0x0, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@remote={0xac, 0x14, 0x14, 0xbb}}, {}, {}, 0x0, 0x0, 0x0, 0xffffff9e}}, 0xb8}, 0x1}, 0x0) 2018/04/11 12:12:30 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x1b, "d736c5ca0d1b50e96f69f2e704670667af8d9e2618c2b76d8ca7c2049191fe77", "6e70bf9a57a799e7a56871e4f1e829091fc3abd062b731873ab286763a6b6551", "cfa8eb621d7bd0850e30158824b85ca75f9b4f56aa9152ab0a7c088b7d6106a0", "523fe94df3b990a0b9f83d855f95b06968d2350c45f648ab663bb4ec9aa39b7d", "fcf0d8b389ef1fbbfa4ef8f1c311dbf57e2aaeff6338500d648f008d5b0974e1", "65c3275cf4ae02ca1696f341"}}) 2018/04/11 12:12:30 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0xa, 0x3, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000001040)=[{0x10}], 0x10}, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x30, &(0x7f0000000ff0), 0x28c) 2018/04/11 12:12:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@dev={0xfe, 0x80}}, 0x14) 2018/04/11 12:12:30 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x190) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/11 12:12:30 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@rand_addr=0x80000001, @rand_addr=0x9, 0x1, 0x1, [@rand_addr]}, 0x14) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x290) 2018/04/11 12:12:30 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f00000005c0)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x40, 0x6}, 0x10) 2018/04/11 12:12:30 executing program 4: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x1b, "d736c5ca0d1b50e96f69f2e704670667af8d9e2618c2b76d8ca7c2049191fe77", "6e70bf9a57a799e7a56871e4f1e829091fc3abd062b731873ab286763a6b6551", "cfa8eb621d7bd0850e30158824b85ca75f9b4f56aa9152ab0a7c088b7d6106a0", "523fe94df3b990a0b9f83d855f95b06968d2350c45f648ab663bb4ec9aa39b7d", "fcf0d8b389ef1fbbfa4ef8f1c311dbf57e2aaeff6338500d648f008d5b0974e1", "65c3275cf4ae02ca1696f341"}}) 2018/04/11 12:12:30 executing program 5: r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00@']) 2018/04/11 12:12:31 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x190) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 2018/04/11 12:12:31 executing program 4: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x1b, "d736c5ca0d1b50e96f69f2e704670667af8d9e2618c2b76d8ca7c2049191fe77", "6e70bf9a57a799e7a56871e4f1e829091fc3abd062b731873ab286763a6b6551", "cfa8eb621d7bd0850e30158824b85ca75f9b4f56aa9152ab0a7c088b7d6106a0", "523fe94df3b990a0b9f83d855f95b06968d2350c45f648ab663bb4ec9aa39b7d", "fcf0d8b389ef1fbbfa4ef8f1c311dbf57e2aaeff6338500d648f008d5b0974e1", "65c3275cf4ae02ca1696f341"}}) 2018/04/11 12:12:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x100000039) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x4048804, &(0x7f0000000080)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) write$binfmt_misc(r0, &(0x7f0000001980)=ANY=[], 0x0) 2018/04/11 12:12:31 executing program 6: 2018/04/11 12:12:31 executing program 1: 2018/04/11 12:12:31 executing program 0: 2018/04/11 12:12:31 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) 2018/04/11 12:12:31 executing program 7: r0 = socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000480)=""/220, &(0x7f0000000580)=0xdc) 2018/04/11 12:12:31 executing program 6: 2018/04/11 12:12:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000483ffc)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00003ad000)=ANY=[], &(0x7f00008f1ffc), 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000000)=""/106, &(0x7f00009d0000)=0x6a) 2018/04/11 12:12:31 executing program 0: r0 = socket$inet(0x2, 0x20000000000003, 0x40000000000002) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xd1, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000500)=ANY=[], @ANYRES16, @ANYPTR=&(0x7f0000000600)=ANY=[], @ANYPTR], 0x4) 2018/04/11 12:12:31 executing program 4: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x1b, "d736c5ca0d1b50e96f69f2e704670667af8d9e2618c2b76d8ca7c2049191fe77", "6e70bf9a57a799e7a56871e4f1e829091fc3abd062b731873ab286763a6b6551", "cfa8eb621d7bd0850e30158824b85ca75f9b4f56aa9152ab0a7c088b7d6106a0", "523fe94df3b990a0b9f83d855f95b06968d2350c45f648ab663bb4ec9aa39b7d", "fcf0d8b389ef1fbbfa4ef8f1c311dbf57e2aaeff6338500d648f008d5b0974e1", "65c3275cf4ae02ca1696f341"}}) 2018/04/11 12:12:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team_slave\x00'}) 2018/04/11 12:12:31 executing program 7: r0 = socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000004940)={&(0x7f0000000a00)={0x10}, 0xc, &(0x7f0000004900)={&(0x7f0000004140)={0x168, 0x0, 0x14, 0x70bd27, 0x0, {0x3}, [{{0x8, 0x1}, {0x84, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4}}, {0x8, 0x6}}}]}}, {{0x8, 0x1}, {0xc0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4}}, {0x8, 0x6}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x14, 0x4, 'activebackup\x00'}}}]}}]}, 0x168}, 0x1}, 0x20004004) 2018/04/11 12:12:31 executing program 3: 2018/04/11 12:12:31 executing program 5: [ 62.811480] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/11 12:12:31 executing program 6: 2018/04/11 12:12:31 executing program 3: 2018/04/11 12:12:31 executing program 5: 2018/04/11 12:12:31 executing program 0: 2018/04/11 12:12:32 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x1b, "d736c5ca0d1b50e96f69f2e704670667af8d9e2618c2b76d8ca7c2049191fe77", "6e70bf9a57a799e7a56871e4f1e829091fc3abd062b731873ab286763a6b6551", "cfa8eb621d7bd0850e30158824b85ca75f9b4f56aa9152ab0a7c088b7d6106a0", "523fe94df3b990a0b9f83d855f95b06968d2350c45f648ab663bb4ec9aa39b7d", "fcf0d8b389ef1fbbfa4ef8f1c311dbf57e2aaeff6338500d648f008d5b0974e1", "65c3275cf4ae02ca1696f341"}}) 2018/04/11 12:12:32 executing program 2: 2018/04/11 12:12:32 executing program 7: 2018/04/11 12:12:32 executing program 5: 2018/04/11 12:12:32 executing program 3: 2018/04/11 12:12:32 executing program 6: 2018/04/11 12:12:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000483ffc)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00003ad000)=ANY=[], &(0x7f00008f1ffc), 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000000)=""/106, &(0x7f00009d0000)=0x6a) 2018/04/11 12:12:32 executing program 0: 2018/04/11 12:12:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000483ffc)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00003ad000)=ANY=[], &(0x7f00008f1ffc), 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000000)=""/106, &(0x7f00009d0000)=0x6a) 2018/04/11 12:12:32 executing program 7: 2018/04/11 12:12:32 executing program 2: 2018/04/11 12:12:32 executing program 5: [ 63.268220] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/11 12:12:32 executing program 6: [ 63.461493] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/11 12:12:32 executing program 0: 2018/04/11 12:12:32 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x1b, "d736c5ca0d1b50e96f69f2e704670667af8d9e2618c2b76d8ca7c2049191fe77", "6e70bf9a57a799e7a56871e4f1e829091fc3abd062b731873ab286763a6b6551", "cfa8eb621d7bd0850e30158824b85ca75f9b4f56aa9152ab0a7c088b7d6106a0", "523fe94df3b990a0b9f83d855f95b06968d2350c45f648ab663bb4ec9aa39b7d", "fcf0d8b389ef1fbbfa4ef8f1c311dbf57e2aaeff6338500d648f008d5b0974e1", "65c3275cf4ae02ca1696f341"}}) 2018/04/11 12:12:32 executing program 2: 2018/04/11 12:12:32 executing program 5: 2018/04/11 12:12:32 executing program 6: 2018/04/11 12:12:32 executing program 1: 2018/04/11 12:12:32 executing program 3: 2018/04/11 12:12:32 executing program 7: 2018/04/11 12:12:32 executing program 7: 2018/04/11 12:12:32 executing program 1: 2018/04/11 12:12:32 executing program 6: 2018/04/11 12:12:32 executing program 2: 2018/04/11 12:12:32 executing program 0: 2018/04/11 12:12:32 executing program 5: 2018/04/11 12:12:32 executing program 3: 2018/04/11 12:12:32 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x1b, "d736c5ca0d1b50e96f69f2e704670667af8d9e2618c2b76d8ca7c2049191fe77", "6e70bf9a57a799e7a56871e4f1e829091fc3abd062b731873ab286763a6b6551", "cfa8eb621d7bd0850e30158824b85ca75f9b4f56aa9152ab0a7c088b7d6106a0", "523fe94df3b990a0b9f83d855f95b06968d2350c45f648ab663bb4ec9aa39b7d", "fcf0d8b389ef1fbbfa4ef8f1c311dbf57e2aaeff6338500d648f008d5b0974e1", "65c3275cf4ae02ca1696f341"}}) 2018/04/11 12:12:32 executing program 2: 2018/04/11 12:12:33 executing program 6: 2018/04/11 12:12:33 executing program 7: 2018/04/11 12:12:33 executing program 1: 2018/04/11 12:12:33 executing program 0: 2018/04/11 12:12:33 executing program 5: 2018/04/11 12:12:33 executing program 3: 2018/04/11 12:12:33 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x1b, "d736c5ca0d1b50e96f69f2e704670667af8d9e2618c2b76d8ca7c2049191fe77", "6e70bf9a57a799e7a56871e4f1e829091fc3abd062b731873ab286763a6b6551", "cfa8eb621d7bd0850e30158824b85ca75f9b4f56aa9152ab0a7c088b7d6106a0", "523fe94df3b990a0b9f83d855f95b06968d2350c45f648ab663bb4ec9aa39b7d", "fcf0d8b389ef1fbbfa4ef8f1c311dbf57e2aaeff6338500d648f008d5b0974e1", "65c3275cf4ae02ca1696f341"}}) 2018/04/11 12:12:33 executing program 2: 2018/04/11 12:12:33 executing program 1: 2018/04/11 12:12:33 executing program 2: 2018/04/11 12:12:33 executing program 0: r0 = socket(0x4000000000000010, 0x802, 0x0) write(r0, &(0x7f0000000000)="220000001a000704009433de0100040080010f0092ac001500fffe3b06000f00ff27", 0x22) 2018/04/11 12:12:33 executing program 7: r0 = socket$inet(0x2, 0x6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="183d0800ff02e6c70000000079024846d3a1c1000000001800000000400000000097000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0xbd, &(0x7f00000000c0)=""/189}, 0x48) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0xa}, 0x235) setsockopt(r0, 0x0, 0x40, &(0x7f0000000000), 0x0) 2018/04/11 12:12:33 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x20000000000001) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000080)="99d8c1a10b54a97da178170a7f3655c03a9f328f9ae7848c5f0f1478eea00f1f935e11", 0x23}], 0x1, &(0x7f0000000000)}, 0xffffffffffffffff}], 0x2, 0x0) 2018/04/11 12:12:33 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f00000000c0)=0x1e, 0x4) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000000000), 0x4) 2018/04/11 12:12:33 executing program 6: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000013c0)="8c", 0x1) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) tee(r0, r3, 0x8, 0x0) 2018/04/11 12:12:33 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x1b, "d736c5ca0d1b50e96f69f2e704670667af8d9e2618c2b76d8ca7c2049191fe77", "6e70bf9a57a799e7a56871e4f1e829091fc3abd062b731873ab286763a6b6551", "cfa8eb621d7bd0850e30158824b85ca75f9b4f56aa9152ab0a7c088b7d6106a0", "523fe94df3b990a0b9f83d855f95b06968d2350c45f648ab663bb4ec9aa39b7d", "fcf0d8b389ef1fbbfa4ef8f1c311dbf57e2aaeff6338500d648f008d5b0974e1", "65c3275cf4ae02ca1696f341"}}) [ 64.420028] syz-executor7: vmalloc: allocation failure: 9999220736 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 64.431956] syz-executor7 cpuset=syz7 mems_allowed=0 [ 64.437231] CPU: 1 PID: 5362 Comm: syz-executor7 Not tainted 4.16.0+ #83 [ 64.444102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.453490] Call Trace: [ 64.456126] dump_stack+0x185/0x1d0 [ 64.459806] warn_alloc+0x3fc/0x660 [ 64.463464] ================================================================== [ 64.470837] BUG: KMSAN: uninit-value in kernel_text_address+0x248/0x3a0 [ 64.477596] CPU: 1 PID: 5362 Comm: syz-executor7 Not tainted 4.16.0+ #83 [ 64.484441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.493802] Call Trace: [ 64.496408] dump_stack+0x14a/0x1d0 [ 64.500054] ? kernel_text_address+0x248/0x3a0 [ 64.504642] kmsan_report+0x142/0x240 [ 64.508450] __msan_warning_32+0x6c/0xb0 [ 64.512529] kernel_text_address+0x248/0x3a0 [ 64.516949] __kernel_text_address+0x34/0xe0 [ 64.521371] show_trace_log_lvl+0x954/0x1030 [ 64.525796] ? __vmalloc_node_range+0xa6f/0x1140 [ 64.530579] show_stack+0xfc/0x150 [ 64.534127] ? print_worker_info+0x1b0/0x660 [ 64.538544] dump_stack+0x185/0x1d0 [ 64.542182] warn_alloc+0x3fc/0x660 [ 64.545836] ? __irqentry_text_end+0x1fb47e/0x1fb47e [ 64.550949] ? __vmalloc_node_range+0x10b/0x1140 [ 64.555724] __vmalloc_node_range+0xa6f/0x1140 [ 64.560359] __vmalloc_node_flags_caller+0x102/0x120 [ 64.565491] ? xt_alloc_entry_offsets+0x62/0x70 [ 64.570170] ? xt_alloc_entry_offsets+0x62/0x70 [ 64.574856] kvmalloc_node+0x2a6/0x2e0 [ 64.578762] xt_alloc_entry_offsets+0x62/0x70 [ 64.583263] translate_table+0x216/0x37c0 [ 64.587419] ? __kmalloc_node+0xdec/0x1190 [ 64.591670] ? kvmalloc_node+0x1a1/0x2e0 [ 64.595743] ? __local_bh_enable_ip+0x3b/0x140 [ 64.600347] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 64.605725] do_ipt_set_ctl+0x60c/0x930 [ 64.609718] ? cleanup_entry+0x5a0/0x5a0 [ 64.613792] nf_setsockopt+0x476/0x4d0 2018/04/11 12:12:33 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000900)=""/4096, 0x1000}], 0x1, &(0x7f0000001980)=""/48, 0x30}, 0x0) r1 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r1, 0x40086602, &(0x7f00000002c0)) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000180)={0x4, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x88) write$cgroup_pid(r2, &(0x7f0000000100)=ANY=[], 0xfffffea0) ioctl$fiemap(r1, 0xc020660b, &(0x7f0000000100)={0x0, 0xcb09}) fcntl$addseals(r1, 0x409, 0x6) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="ba", 0x1, 0x4000090, &(0x7f0000000040)={0x2, 0x4e1c, @loopback=0x7f000001}, 0x10) 2018/04/11 12:12:33 executing program 0: r0 = socket(0xa, 0x3, 0x7) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="0068d5151d65a904d7000000000000000000000002"]) ioctl(r0, 0x8916, &(0x7f0000000000)) 2018/04/11 12:12:33 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x20000000000001) connect$inet6(r0, &(0x7f000000cfe4)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000080)="99d8c1a10b54a97da178170a7f3655c03a9f328f9ae7848c5f0f1478eea00f1f935e11", 0x23}], 0x1, &(0x7f0000000000)}, 0xffffffffffffffff}], 0x2, 0x0) 2018/04/11 12:12:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000002fe4)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b800000018001f24ffffffffffffffff0a00000000000008000000001400090009000000", @ANYBLOB="005533d14929aca21774e33863c2fb825ee244", @ANYBLOB="88000800820010ca43c8532978d0965946b775175da4c25257282298148ceef06464926e00fa5f73693d41da29aa099a7401572c83e9e992bd8dc8f59e919303b40339b561b0f7ba05fbff6c9f4fd2991c52b4221e55479085c30f31496fa2edeedd6e19622fb8e4005677b3aca33354ab3e1735032aa6fb565277ad0000000000000000000000721e30b25bed14ce558c7d5a1fef056fe901e095e06656bc55979b350dfc489b4a9a6271d0a2ba9848daf5f505c46e10d79e2ecfb1def405b5b3a40a8201a0d7102d4fb696cc75"], 0x3}, 0x1}, 0x0) 2018/04/11 12:12:33 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f0000000000)=@ethtool_drvinfo={0x1b, "d736c5ca0d1b50e96f69f2e704670667af8d9e2618c2b76d8ca7c2049191fe77", "6e70bf9a57a799e7a56871e4f1e829091fc3abd062b731873ab286763a6b6551", "cfa8eb621d7bd0850e30158824b85ca75f9b4f56aa9152ab0a7c088b7d6106a0", "523fe94df3b990a0b9f83d855f95b06968d2350c45f648ab663bb4ec9aa39b7d", "fcf0d8b389ef1fbbfa4ef8f1c311dbf57e2aaeff6338500d648f008d5b0974e1", "65c3275cf4ae02ca1696f341"}}) [ 64.617698] ip_setsockopt+0x24b/0x2b0 [ 64.621597] ? ipv4_pktinfo_prepare+0x650/0x650 [ 64.626279] dccp_setsockopt+0x1c3/0x1f0 [ 64.630356] ? dccp_ioctl+0x290/0x290 [ 64.634167] sock_common_setsockopt+0x136/0x170 [ 64.638852] ? sock_common_recvmsg+0x270/0x270 [ 64.643467] SYSC_setsockopt+0x4b8/0x570 [ 64.648238] SyS_setsockopt+0x76/0xa0 [ 64.652053] do_syscall_64+0x309/0x430 [ 64.655956] ? SYSC_recv+0xe0/0xe0 [ 64.659514] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 64.664710] RIP: 0033:0x455259 [ 64.667992] RSP: 002b:00007f3201317c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 64.675721] RAX: ffffffffffffffda RBX: 00007f32013186d4 RCX: 0000000000455259 [ 64.683016] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000013 [ 64.690297] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 64.697576] R10: 0000000020000000 R11: 0000000000000246 R12: 00000000ffffffff [ 64.704860] R13: 000000000000050e R14: 00000000006fa9f0 R15: 0000000000000000 [ 64.712141] [ 64.713775] Local variable description: ----reclaim_state.i.i.i@__alloc_pages_nodemask [ 64.721823] Variable was created at: [ 64.725549] __alloc_pages_nodemask+0x160/0x5dc0 [ 64.730316] __kmalloc_node+0x44b/0x1190 [ 64.734373] ================================================================== [ 64.741814] Disabling lock debugging due to kernel taint [ 64.747268] Kernel panic - not syncing: panic_on_warn set ... [ 64.747268] [ 64.754643] CPU: 1 PID: 5362 Comm: syz-executor7 Tainted: G B 4.16.0+ #83 [ 64.762802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.772164] Call Trace: [ 64.774776] dump_stack+0x14a/0x1d0 [ 64.778421] panic+0x39d/0x940 [ 64.781653] ? kernel_text_address+0x248/0x3a0 [ 64.786246] kmsan_report+0x238/0x240 [ 64.790059] __msan_warning_32+0x6c/0xb0 [ 64.794130] kernel_text_address+0x248/0x3a0 [ 64.798551] __kernel_text_address+0x34/0xe0 [ 64.802977] show_trace_log_lvl+0x954/0x1030 [ 64.807398] ? __vmalloc_node_range+0xa6f/0x1140 [ 64.812173] show_stack+0xfc/0x150 [ 64.815723] ? print_worker_info+0x1b0/0x660 [ 64.820142] dump_stack+0x185/0x1d0 [ 64.823787] warn_alloc+0x3fc/0x660 [ 64.827443] ? __irqentry_text_end+0x1fb47e/0x1fb47e [ 64.832565] ? __vmalloc_node_range+0x10b/0x1140 [ 64.837335] __vmalloc_node_range+0xa6f/0x1140 [ 64.841939] __vmalloc_node_flags_caller+0x102/0x120 [ 64.847055] ? xt_alloc_entry_offsets+0x62/0x70 [ 64.851738] ? xt_alloc_entry_offsets+0x62/0x70 [ 64.856431] kvmalloc_node+0x2a6/0x2e0 [ 64.860335] xt_alloc_entry_offsets+0x62/0x70 [ 64.864845] translate_table+0x216/0x37c0 [ 64.869006] ? __kmalloc_node+0xdec/0x1190 [ 64.873255] ? kvmalloc_node+0x1a1/0x2e0 [ 64.877333] ? __local_bh_enable_ip+0x3b/0x140 [ 64.881939] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 64.887318] do_ipt_set_ctl+0x60c/0x930 [ 64.891311] ? cleanup_entry+0x5a0/0x5a0 [ 64.895384] nf_setsockopt+0x476/0x4d0 [ 64.899293] ip_setsockopt+0x24b/0x2b0 [ 64.903195] ? ipv4_pktinfo_prepare+0x650/0x650 [ 64.907878] dccp_setsockopt+0x1c3/0x1f0 [ 64.911955] ? dccp_ioctl+0x290/0x290 [ 64.915768] sock_common_setsockopt+0x136/0x170 [ 64.920452] ? sock_common_recvmsg+0x270/0x270 [ 64.925046] SYSC_setsockopt+0x4b8/0x570 [ 64.929124] SyS_setsockopt+0x76/0xa0 [ 64.932933] do_syscall_64+0x309/0x430 [ 64.936833] ? SYSC_recv+0xe0/0xe0 [ 64.940381] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 64.945571] RIP: 0033:0x455259 [ 64.948764] RSP: 002b:00007f3201317c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 64.956482] RAX: ffffffffffffffda RBX: 00007f32013186d4 RCX: 0000000000455259 [ 64.963766] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000013 [ 64.971047] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 64.978330] R10: 0000000020000000 R11: 0000000000000246 R12: 00000000ffffffff [ 64.985608] R13: 000000000000050e R14: 00000000006fa9f0 R15: 0000000000000000 [ 64.993399] Dumping ftrace buffer: [ 64.996944] (ftrace buffer empty) [ 65.000633] Kernel Offset: disabled [ 65.004237] Rebooting in 86400 seconds..