INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.45' (ECDSA) to the list of known hosts. 2018/04/18 20:22:35 fuzzer started 2018/04/18 20:22:35 dialing manager at 10.128.0.26:44151 2018/04/18 20:22:41 kcov=true, comps=false 2018/04/18 20:22:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000002c0)=ANY=[]) shutdown(r0, 0x1) 2018/04/18 20:22:44 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) pwritev(r0, &(0x7f0000000840)=[{&(0x7f00000004c0)}, {&(0x7f00000005c0)}, {&(0x7f0000000700)}], 0x3, 0x0) 2018/04/18 20:22:44 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000000)=0xe6) 2018/04/18 20:22:44 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f0000000500)=ANY=[]]) 2018/04/18 20:22:44 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f", 0x0) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) rename(&(0x7f0000000080)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f", &(0x7f0000ab3ff0)='./file0\x00') 2018/04/18 20:22:44 executing program 4: r0 = socket(0x11, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f000098f000)={0x11, 0x6, r1, 0x1, 0x0, 0x6, @random="06004ee72211"}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000922000), 0x4) 2018/04/18 20:22:44 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/anycast6\x00') pread64(r0, &(0x7f0000000100)=""/133, 0x85, 0x0) 2018/04/18 20:22:44 executing program 1: r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) syzkaller login: [ 43.561224] ip (3885) used greatest stack depth: 54200 bytes left [ 44.171398] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.177894] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.190666] device bridge_slave_0 entered promiscuous mode [ 44.209239] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.215756] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.231620] device bridge_slave_0 entered promiscuous mode [ 44.256251] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.262805] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.296427] device bridge_slave_0 entered promiscuous mode [ 44.320420] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.326964] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.341620] device bridge_slave_0 entered promiscuous mode [ 44.372763] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.379341] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.390289] device bridge_slave_0 entered promiscuous mode [ 44.401561] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.408110] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.439340] device bridge_slave_0 entered promiscuous mode [ 44.458851] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.465329] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.492557] device bridge_slave_0 entered promiscuous mode [ 44.500902] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.507468] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.523871] device bridge_slave_1 entered promiscuous mode [ 44.534435] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.540938] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.561619] device bridge_slave_1 entered promiscuous mode [ 44.572072] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.578511] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.597327] device bridge_slave_0 entered promiscuous mode [ 44.604151] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.610648] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.621248] device bridge_slave_1 entered promiscuous mode [ 44.629711] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.636193] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.647475] device bridge_slave_1 entered promiscuous mode [ 44.667690] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.674206] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.684576] device bridge_slave_1 entered promiscuous mode [ 44.703982] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.716134] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.722645] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.750639] device bridge_slave_1 entered promiscuous mode [ 44.766945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.774475] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.780981] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.818134] device bridge_slave_1 entered promiscuous mode [ 44.828127] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.839718] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.846945] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.853457] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.875778] device bridge_slave_1 entered promiscuous mode [ 44.894885] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.910394] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.923008] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.993950] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.005934] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.029827] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.059083] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.082190] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.100382] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.141895] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.272168] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.315367] ip (4007) used greatest stack depth: 53976 bytes left [ 45.351013] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.973950] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.984533] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.002869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.075929] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.084355] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.130139] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.163718] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.191886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.216586] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.306100] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.323241] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.330748] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.381389] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.388619] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.547663] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.599664] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 47.121487] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.152654] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.258536] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.323734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.341012] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.377013] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.399481] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.425834] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.477781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.506201] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.533321] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.551660] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.614415] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.623832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.639430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.669549] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.676736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.688878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.710982] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.727427] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.734991] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.743178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.753210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.800176] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.810880] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.823123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.848822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.869088] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.876800] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.884141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.916102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.941343] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.953217] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.960311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.981882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.014690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.042856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.055576] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.066152] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.082157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.099906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.108620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.116868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.129640] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.140328] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.147464] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.156529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.180880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.201167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.218911] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.226187] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.247664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.270701] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.278145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.296125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.346344] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.353864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.366785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.397135] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.404427] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.416231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.444151] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.451593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.472765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.313270] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.319775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.326670] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.333141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.387261] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.393768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.410211] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.416681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.423529] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.430027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.438130] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.457690] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.464179] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.471015] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.477754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.495958] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.617947] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.624454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.631337] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.637809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.673967] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.692293] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.698778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.705660] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.712148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.723948] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.744291] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.750771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.757644] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.764151] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.839477] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.849947] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.856438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.863360] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.869840] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.892931] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.933598] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.940123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.947013] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.953541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.042122] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.423503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.436717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.461774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.469015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.476834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.484728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.492607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.855307] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.980868] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.085970] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.189411] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.217852] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.229851] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.395735] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.585232] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.683968] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.690271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.700016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.742354] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.748612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.761644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.973322] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.980578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.991681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.009266] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.024114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.045799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.072761] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.083930] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.090406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.101305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.155745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.185135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.226343] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.232592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.248373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.402951] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.410508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.423674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/18 20:23:11 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000360000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x12a}, 0x1}, 0x0) 2018/04/18 20:23:11 executing program 4: capset(&(0x7f0000000280)={0x20071026}, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f000005e000)={0x1, &(0x7f00009ea000)=[{}]}) 2018/04/18 20:23:11 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="02030003130000000000b2000000000005000600000000000a0000008d000000000000000000000000000000000046d5430700000000000005000900ff0000000a40000012000000fe8000000000000000001000100000ff000001000400000002000100000000000000020c0200000005000500000000800a00000000000000ff020000000c8000000000000000000100000000000000009041d23d4b3f7a2f537dbc8c0b48fbf929cd566965ff6b536279216c13ec8f"], 0xb7}, 0x1}, 0x0) [ 66.962368] capability: warning: `syz-executor4' uses deprecated v2 capabilities in a way that may be insecure 2018/04/18 20:23:12 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000001b00)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa080600010800060400015b51fc71599a0084c52eacb6bd11fa8a6af500006e40349b13672703894603fdd911f4f22401e86d974ae7547f3b6e69aca08abf5b704543ffdb37294ebd85db6fc8ff2452b7ffb5d8f7c7fcfc0889045519c918a1"], 0x0) 2018/04/18 20:23:12 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/04/18 20:23:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r0, 0x4, 0x6000) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000004c0)=""/35, 0x23}, {&(0x7f0000000500)=""/172, 0xac}, {&(0x7f00000005c0)=""/6, 0x6}], 0x3, 0x0) 2018/04/18 20:23:12 executing program 7: syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x8001, &(0x7f00000005c0)) 2018/04/18 20:23:12 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)=ANY=[@ANYBLOB="02030003130000000020b2000000000005000600000000000a0000008d000000000000000000000000000000000046d5430700000000000005000900ff0000000a40000012000000fe8000000000000000001000000000ff000001000400000002000100000000000000020c0000000005000500000000800a00000000000000ff0200000000800000000000000000010000000000000000"], 0x98}, 0x1}, 0x0) 2018/04/18 20:23:12 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/mcfilter\x00') pread64(r0, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) 2018/04/18 20:23:12 executing program 3: capset(&(0x7f0000000000)={0x19980330}, &(0x7f000034d000)) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000080)=""/185) 2018/04/18 20:23:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @mcast1}, &(0x7f00000000c0)=0x1c) getsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000001000), &(0x7f0000000000)=0x4) [ 67.404639] capability: warning: `syz-executor3' uses 32-bit capabilities (legacy support in use) 2018/04/18 20:23:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/fib_trie\x00') pread64(r0, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) 2018/04/18 20:23:12 executing program 1: r0 = socket$unix(0x1, 0x801, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect(r0, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/04/18 20:23:12 executing program 4: r0 = memfd_create(&(0x7f0000000100)="2a3a21242d80", 0x6) fchmod(r0, 0x0) 2018/04/18 20:23:12 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/mcfilter\x00') pread64(r0, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) 2018/04/18 20:23:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={&(0x7f0000d55000)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f0000000300)={0x1c, 0x2, 0x1, 0x800000001, 0x0, 0x0, {}, [@nested={0x8, 0x8, [@generic="80"]}]}, 0x1c}, 0x1}, 0x0) 2018/04/18 20:23:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'bridge0\x00', 0x1001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0x2001}) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 2018/04/18 20:23:12 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) close(r0) 2018/04/18 20:23:12 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x8000) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") pread64(r2, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) ftruncate(r0, 0x0) 2018/04/18 20:23:12 executing program 7: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80e00, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") 2018/04/18 20:23:13 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/mcfilter\x00') pread64(r0, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) 2018/04/18 20:23:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-ssse3\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000380), 0x0) 2018/04/18 20:23:13 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000300)="6e657400fcffffffffffff72005e6e202d18d60cc326faad0f6d89a6c980c3372a95d4361a32dccf9c3d3ccc7588f2788e9dd68a69821b136eef66365cc94546700dd8cc0c83fd407f000ef73cf337c1b10d62118264068e5692c61e97f7a8cae028dede526cd8e4bea53905a1f5b372980bfe42c4b3d1ac99d2d3e44840e0f7bbd974adeac1bdf3ecc810d584fc258d654f0171732cb3378af1c8fd57b08b96009d795adcbb42049982aed022ce77f51de91ec5d27ed4412e1ad395d92e3db420eb4d95045f1e30d5b14ab1") getdents64(r0, &(0x7f0000000180)=""/216, 0x1d) 2018/04/18 20:23:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000400)={@dev={0xfe, 0x80}, @mcast2={0xff, 0x2, [], 0x1}, @local={0xfe, 0x80, [], 0xaa}, 0x0, 0x40, 0xffffffffffffffff}) 2018/04/18 20:23:13 executing program 0: r0 = open(&(0x7f0000000000)='/\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000080)=""/119, 0x77) 2018/04/18 20:23:13 executing program 3: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='../file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) 2018/04/18 20:23:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={"6c6f00c1457a6ddd5c876900000100", 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/04/18 20:23:13 executing program 1: r0 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x4, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000901ef8)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000b84000)=0x90) [ 68.199706] device lo entered promiscuous mode 2018/04/18 20:23:13 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/mcfilter\x00') pread64(r0, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) 2018/04/18 20:23:13 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000000)=0x3, 0x4) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x4, @dev={0xfe, 0x80}}, 0x1c) 2018/04/18 20:23:13 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc) 2018/04/18 20:23:13 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x8}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000200)=0x8, 0x4) [ 68.385356] device lo left promiscuous mode 2018/04/18 20:23:13 executing program 0: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x11, r0, 0x0) 2018/04/18 20:23:13 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TCFLSH(r0, 0x80047456, 0x0) 2018/04/18 20:23:13 executing program 2: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 2018/04/18 20:23:13 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000004c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x8, r1) 2018/04/18 20:23:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0xfd}, &(0x7f0000000440)=0x24) 2018/04/18 20:23:13 executing program 6: pread64(0xffffffffffffffff, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) 2018/04/18 20:23:13 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000000)=0x3, 0x4) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x4, @dev={0xfe, 0x80}}, 0x1c) 2018/04/18 20:23:13 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/18 20:23:13 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/mcfilter\x00') pread64(0xffffffffffffffff, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) 2018/04/18 20:23:13 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x24042) 2018/04/18 20:23:13 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={0x0, {0x2, 0x0, @multicast2=0xe0000002}, {0x2}, {0x2}, 0xc, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000440)='ip6tnl0\x00'}) 2018/04/18 20:23:13 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r0, 0x4, 0x246400) pread64(r0, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) 2018/04/18 20:23:13 executing program 1: r0 = syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={"76657468305f746f5fff010000046500", 0xfff}) 2018/04/18 20:23:13 executing program 2: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 2018/04/18 20:23:13 executing program 5: capset(&(0x7f0000000300)={0x19980330}, &(0x7f0000000340)) setresgid(0x0, 0x0, 0x0) 2018/04/18 20:23:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000013db4)={0x14, 0x1e, 0x2ff}, 0x14}, 0x1}, 0x0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) recvmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x26, &(0x7f00000004c0), 0x0, &(0x7f0000000540)=""/226, 0xe2}, 0x0) 2018/04/18 20:23:14 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") fcntl$setstatus(r0, 0x4, 0x246400) pread64(r0, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) 2018/04/18 20:23:14 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x4, 0xfffffffd, 0xfffffffc, &(0x7f0000000080)) 2018/04/18 20:23:14 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)="d8", 0x1, 0xffffffffffffffff) keyctl$assume_authority(0x10, r0) 2018/04/18 20:23:14 executing program 5: capset(&(0x7f0000000300)={0x19980330}, &(0x7f0000000340)) setuid(0x0) 2018/04/18 20:23:14 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000017fdc)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 2018/04/18 20:23:14 executing program 2: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) 2018/04/18 20:23:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') pread64(r0, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) 2018/04/18 20:23:14 executing program 6: syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') 2018/04/18 20:23:14 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)="d8", 0x1, 0xffffffffffffffff) keyctl$assume_authority(0x10, r0) 2018/04/18 20:23:14 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100), 0x0) 2018/04/18 20:23:14 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r0, &(0x7f0000000180)=""/216, 0x1c) getdents(r0, &(0x7f0000000380)=""/199, 0xc7) 2018/04/18 20:23:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000001000), &(0x7f0000000000)=0x4) 2018/04/18 20:23:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000058000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000a73000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) 2018/04/18 20:23:14 executing program 7: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000300)="572b07a988602c0d6131bedfb0f3a14b9f17c17e0319881f2368cd2c78e5a1666cc88faba27a1f06e770b889284d807b92556d4a375dd6ec4b2e3bbcc88cfd317d72b274055781939d9c051e5a255c728bb73a46db9b5c683909fff12b592d0f9b39759d9cc5742deb2c938164d2e5e1dbbb750968ee58acf2aea6591bf193d5", &(0x7f00000003c0)}, 0x20) mount(&(0x7f0000000140)='.', &(0x7f0000000180)='.', &(0x7f00000001c0)='tmpfs\x00', 0x0, &(0x7f0000000200)="eb810de94c00d3d4475fa5c836c7d5922c9fadcf00ece349f9867b60a73dcafba4a7e6394a863ceb01826747db4e9750ac249d8b49eb58c1beecb3181f33ae8d924f6c79fec4d3480db5353ec18b1aac53d8cef942728c443eb1b7ba8d70bda0f2d797cc4458fc943225bcf190b5b33a52af237113c693c75fbd5769ee1d92e238fe42b5d7a91dad3e82fb3413ccaa603fc71b70bc131dbc9c149278d0ac44711506e5ff05f8328566a9bf7b824a623e19bb25a85aeb25955f4cf71f74ccf32c95a7db617130b0e6f632cd70947ef05cf4574984d92e5d088e1fa416d023e04b04ab178dff3d6ed187694c62fd273135e9dcb95dc7ceb5514759bb96be16e973") bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4), 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, &(0x7f0000000b80)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x100000000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x0, &(0x7f0000000a80)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) perf_event_open(&(0x7f0000000a00)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='.', 0x0) 2018/04/18 20:23:14 executing program 4: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000000)) dup2(r0, r1) 2018/04/18 20:23:14 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x4, 0xfffffffd, 0xfffffffc, &(0x7f0000000080)) [ 69.418576] tmpfs: No value for mount option ' L' 2018/04/18 20:23:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/netstat\x00') pread64(r0, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) [ 69.558854] tmpfs: No value for mount option ' L' 2018/04/18 20:23:15 executing program 1: 2018/04/18 20:23:15 executing program 2: r0 = open(&(0x7f0000000000)='/\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000020) close(r0) 2018/04/18 20:23:15 executing program 4: 2018/04/18 20:23:15 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getdents64(r0, &(0x7f0000000180)=""/216, 0x1c) getdents(r0, &(0x7f0000000380)=""/199, 0xc7) 2018/04/18 20:23:15 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') pread64(r0, &(0x7f0000003c00)=""/4096, 0xfffffffffffffe22, 0x1) 2018/04/18 20:23:15 executing program 0: 2018/04/18 20:23:15 executing program 7: 2018/04/18 20:23:15 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000080)=""/226, 0xe2, 0x0) 2018/04/18 20:23:15 executing program 7: 2018/04/18 20:23:15 executing program 1: 2018/04/18 20:23:15 executing program 6: 2018/04/18 20:23:15 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x19fc46a5a0e599ea, &(0x7f0000ffc000/0x4000)=nil) 2018/04/18 20:23:15 executing program 2: 2018/04/18 20:23:15 executing program 3: 2018/04/18 20:23:15 executing program 4: 2018/04/18 20:23:15 executing program 5: 2018/04/18 20:23:15 executing program 7: 2018/04/18 20:23:15 executing program 1: 2018/04/18 20:23:15 executing program 2: 2018/04/18 20:23:15 executing program 0: 2018/04/18 20:23:15 executing program 6: 2018/04/18 20:23:15 executing program 3: 2018/04/18 20:23:15 executing program 4: 2018/04/18 20:23:15 executing program 5: 2018/04/18 20:23:15 executing program 7: 2018/04/18 20:23:15 executing program 6: 2018/04/18 20:23:15 executing program 1: 2018/04/18 20:23:15 executing program 2: 2018/04/18 20:23:15 executing program 4: 2018/04/18 20:23:15 executing program 0: 2018/04/18 20:23:15 executing program 3: 2018/04/18 20:23:16 executing program 0: 2018/04/18 20:23:16 executing program 7: 2018/04/18 20:23:16 executing program 5: 2018/04/18 20:23:16 executing program 4: 2018/04/18 20:23:16 executing program 6: 2018/04/18 20:23:16 executing program 1: 2018/04/18 20:23:16 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000840)=[{&(0x7f0000000380)}, {&(0x7f00000007c0)="44d478", 0x3}], 0x2, 0x0) eventfd2(0x3, 0x0) 2018/04/18 20:23:16 executing program 3: 2018/04/18 20:23:16 executing program 7: 2018/04/18 20:23:16 executing program 0: 2018/04/18 20:23:16 executing program 0: 2018/04/18 20:23:16 executing program 4: 2018/04/18 20:23:16 executing program 6: 2018/04/18 20:23:16 executing program 5: 2018/04/18 20:23:16 executing program 1: 2018/04/18 20:23:16 executing program 7: 2018/04/18 20:23:16 executing program 3: 2018/04/18 20:23:16 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000840)=[{&(0x7f0000000380)}, {&(0x7f00000007c0)="44d478", 0x3}], 0x2, 0x0) eventfd2(0x3, 0x0) 2018/04/18 20:23:16 executing program 0: 2018/04/18 20:23:16 executing program 5: 2018/04/18 20:23:16 executing program 6: 2018/04/18 20:23:16 executing program 1: 2018/04/18 20:23:16 executing program 4: 2018/04/18 20:23:16 executing program 3: 2018/04/18 20:23:16 executing program 7: 2018/04/18 20:23:16 executing program 0: 2018/04/18 20:23:16 executing program 5: 2018/04/18 20:23:16 executing program 4: 2018/04/18 20:23:16 executing program 6: 2018/04/18 20:23:16 executing program 2: 2018/04/18 20:23:16 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)) 2018/04/18 20:23:17 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1000000000000004, 0x4000009f}, 0xfffffffffffffe77) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x20000000, 0x2, 0x1, &(0x7f0000000180)) 2018/04/18 20:23:17 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x3080, 0x0) 2018/04/18 20:23:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045439, 0x6f2000) 2018/04/18 20:23:17 executing program 5: r0 = socket$inet(0x2b, 0x1, 0x0) shutdown(r0, 0x0) 2018/04/18 20:23:17 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000280)={'veth0_to_bond\x00'}) 2018/04/18 20:23:17 executing program 4: 2018/04/18 20:23:17 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00003aa000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e05411, &(0x7f0000000000)=""/106) 2018/04/18 20:23:17 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}}, 0x5c) 2018/04/18 20:23:17 executing program 1: 2018/04/18 20:23:17 executing program 7: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) close(r1) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) close(r0) 2018/04/18 20:23:17 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 2018/04/18 20:23:17 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000040)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}, [], "802a08000000006b"}}}}}}}, 0x0) 2018/04/18 20:23:17 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000058000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa}}}, 0x108) 2018/04/18 20:23:18 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) close(r1) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) close(r0) 2018/04/18 20:23:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000004000)={0x6, 0x4, 0x2106, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0xa]}, 0x2c) syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/18 20:23:18 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00003aa000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 2018/04/18 20:23:18 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) write(r0, &(0x7f0000000700)="c6", 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x1}, 0x8) 2018/04/18 20:23:18 executing program 5: r0 = socket(0xa, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 2018/04/18 20:23:18 executing program 1: mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) 2018/04/18 20:23:18 executing program 7: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) close(r1) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) close(r0) 2018/04/18 20:23:18 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r1) r2 = accept4(r0, &(0x7f0000660ff4)=@nl=@unspec, &(0x7f0000000040)=0xf5b19b4c0b1ce647, 0x0) recvfrom$inet(r2, &(0x7f00000002c0)=""/12, 0xb, 0x2, 0x0, 0xfffffe99) 2018/04/18 20:23:18 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) close(r1) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) close(r0) 2018/04/18 20:23:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000004000)={0x6, 0x4, 0x2106, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0xa]}, 0x2c) syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/18 20:23:18 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00003aa000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 2018/04/18 20:23:18 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r1) r2 = accept4(r0, &(0x7f0000660ff4)=@nl=@unspec, &(0x7f0000000040)=0xf5b19b4c0b1ce647, 0x0) recvfrom$inet(r2, &(0x7f00000002c0)=""/12, 0xb, 0x2, 0x0, 0xfffffe99) 2018/04/18 20:23:18 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r1) r2 = accept4(r0, &(0x7f0000660ff4)=@nl=@unspec, &(0x7f0000000040)=0xf5b19b4c0b1ce647, 0x0) recvfrom$inet(r2, &(0x7f00000002c0)=""/12, 0xb, 0x2, 0x0, 0xfffffe99) 2018/04/18 20:23:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000004000)={0x6, 0x4, 0x2106, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0xa]}, 0x2c) syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/18 20:23:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r0, &(0x7f0000017000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000006fc8)={0x0, 0x0, &(0x7f000000e000)=[{&(0x7f0000027fc2)='z', 0x1}], 0x1, &(0x7f0000011000)}, 0xc100) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000029f90)=[{&(0x7f0000000080)="80", 0x1}], 0x1, &(0x7f000001f000)}, 0x0) 2018/04/18 20:23:18 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r1) r2 = accept4(r0, &(0x7f0000660ff4)=@nl=@unspec, &(0x7f0000000040)=0xf5b19b4c0b1ce647, 0x0) recvfrom$inet(r2, &(0x7f00000002c0)=""/12, 0xb, 0x2, 0x0, 0xfffffe99) 2018/04/18 20:23:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev\x00') preadv(r0, &(0x7f0000001580)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x800) 2018/04/18 20:23:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000004000)={0x6, 0x4, 0x2106, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0xa]}, 0x2c) syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/18 20:23:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r0, &(0x7f0000017000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000006fc8)={0x0, 0x0, &(0x7f000000e000)=[{&(0x7f0000027fc2)='z', 0x1}], 0x1, &(0x7f0000011000)}, 0xc100) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000029f90)=[{&(0x7f0000000080)="80", 0x1}], 0x1, &(0x7f000001f000)}, 0x0) 2018/04/18 20:23:19 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r1) r2 = accept4(r0, &(0x7f0000660ff4)=@nl=@unspec, &(0x7f0000000040)=0xf5b19b4c0b1ce647, 0x0) recvfrom$inet(r2, &(0x7f00000002c0)=""/12, 0xb, 0x2, 0x0, 0xfffffe99) 2018/04/18 20:23:19 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) write(r0, &(0x7f0000000700)="c6", 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x1}, 0x8) 2018/04/18 20:23:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) write(r0, &(0x7f0000000700)="c6", 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x1}, 0x8) 2018/04/18 20:23:19 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) close(r1) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) close(r0) 2018/04/18 20:23:19 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000f3eff0)="01010000000ef40000000300409d9254", 0x10) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x0) r2 = accept4(r1, 0x0, &(0x7f0000000240), 0x0) sendmsg$nl_netfilter(r2, &(0x7f0000000980)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000940)={&(0x7f0000000300)={0x1a8, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0x8, 0x0, [@generic="88"]}, @generic="58203c4aa3eb22519cd70d7cadea5e81b2bedf89b21ebb9f53dcff2406cadaca15aa2f624180641defed037eb9a09312f0f62d65ddc949670f18e3605101458f1841d3ff12a35346683b6cc553f6a72cd031c649d742969b649aeca132cbb7724b32f0946fef1e", @nested={0x48, 0x41, [@typed={0x14, 0x10, @ipv6=@loopback={0x0, 0x1}}, @typed={0x14, 0x64, @ipv6=@local={0xfe, 0x80, [], 0xaa}}, @typed={0xc, 0x5, @u64=0x40000000}, @typed={0x8, 0x10, @pid}, @typed={0x8, 0x88, @pid}]}, @nested={0xd4, 0x54, [@typed={0xc, 0x38, @u64=0x8}, @typed={0xc, 0x55, @str='hash\x00'}, @typed={0xc, 0x55, @u64=0x1400}, @typed={0x8, 0x64, @fd=r0}, @typed={0x8, 0x75, @ipv4=@multicast2=0xe0000002}, @typed={0xc, 0x25, @u64=0x2}, @generic="493f18c5c40988da5665e6f40b75413a5f60ceda00c746da39f68b0d16ee1212e1c01ed8269faf9d37e35e735e0cd09e398f7fa2b071c6222e7043e61b784d8076b85b2e48ebfa8d5b4725e7574776d3a7e6288d3828c02d5cac2a146765066bc9d392ed4f73fc6438c97410706a39", @generic="06976f202e8700e5572a926497b71d57cc76b3e66a56d8b450f0ae2b9e40"]}, @typed={0x8, 0x94, @pid}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x1}, 0x20004894) 2018/04/18 20:23:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000004440)={0x10, 0x2a, 0x11}, 0x10}], 0x1, 0x0, 0x0, 0x4000080}, 0x80) 2018/04/18 20:23:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000004000)={0x6, 0x4, 0x2106, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0xa]}, 0x2c) 2018/04/18 20:23:19 executing program 0: clone(0x200, &(0x7f0000251dca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000828ffe)) mknod(&(0x7f0000000040)='./file0\x00', 0x1000000000001040, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000300)) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)='attr/current\x00') write(r1, &(0x7f0000001100), 0x0) open$dir(&(0x7f0000a67000)='./file0\x00', 0x26102, 0x0) [ 74.507143] ================================================================== [ 74.514570] BUG: KMSAN: uninit-value in vmac_setkey+0x337/0x940 [ 74.520637] CPU: 1 PID: 6290 Comm: syz-executor7 Not tainted 4.16.0+ #84 [ 74.527481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.536846] Call Trace: [ 74.539444] dump_stack+0x185/0x1d0 [ 74.543079] ? vmac_setkey+0x337/0x940 [ 74.546970] kmsan_report+0x142/0x240 [ 74.550777] ? aes_set_key+0x260/0x260 2018/04/18 20:23:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000004000)={0x0, 0x4, 0x2106, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0xa]}, 0x2c) 2018/04/18 20:23:19 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) [ 74.554672] __msan_warning_32+0x6c/0xb0 [ 74.558734] ? aes_set_key+0x260/0x260 [ 74.562629] vmac_setkey+0x337/0x940 [ 74.566364] ? vmac_final+0x3f80/0x3f80 [ 74.570343] shash_async_setkey+0x337/0x4c0 [ 74.574670] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 74.580036] ? trace_kmalloc+0xb6/0x2b0 [ 74.584021] ? shash_async_digest+0x1b0/0x1b0 [ 74.588528] crypto_ahash_setkey+0x31a/0x470 [ 74.592947] hash_setkey+0x8b/0xa0 [ 74.596496] alg_setsockopt+0x6c5/0x740 [ 74.600477] ? hash_release+0x50/0x50 [ 74.604285] ? alg_accept+0xd0/0xd0 [ 74.607921] SYSC_setsockopt+0x4b8/0x570 [ 74.611990] SyS_setsockopt+0x76/0xa0 [ 74.615797] do_syscall_64+0x309/0x430 [ 74.619692] ? SYSC_recv+0xe0/0xe0 [ 74.623239] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 74.628436] RIP: 0033:0x455329 [ 74.631626] RSP: 002b:00007f81dd049c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 74.639337] RAX: ffffffffffffffda RBX: 00007f81dd04a6d4 RCX: 0000000000455329 [ 74.646611] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 74.653888] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 74.661160] R10: 0000000020f3eff0 R11: 0000000000000246 R12: 00000000ffffffff [ 74.668439] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 74.675713] [ 74.677393] Local variable description: ----out.i@vmac_setkey [ 74.683276] Variable was created at: [ 74.687008] vmac_setkey+0x93/0x940 [ 74.690636] shash_async_setkey+0x337/0x4c0 [ 74.694956] ================================================================== [ 74.702310] Disabling lock debugging due to kernel taint [ 74.707767] Kernel panic - not syncing: panic_on_warn set ... [ 74.707767] [ 74.715148] CPU: 1 PID: 6290 Comm: syz-executor7 Tainted: G B 4.16.0+ #84 [ 74.723290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.732645] Call Trace: [ 74.735250] dump_stack+0x185/0x1d0 [ 74.738885] panic+0x39d/0x940 [ 74.742106] ? vmac_setkey+0x337/0x940 [ 74.745997] kmsan_report+0x238/0x240 [ 74.749805] ? aes_set_key+0x260/0x260 [ 74.753697] __msan_warning_32+0x6c/0xb0 [ 74.757762] ? aes_set_key+0x260/0x260 [ 74.761658] vmac_setkey+0x337/0x940 [ 74.765388] ? vmac_final+0x3f80/0x3f80 [ 74.769370] shash_async_setkey+0x337/0x4c0 [ 74.773712] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 74.779082] ? trace_kmalloc+0xb6/0x2b0 [ 74.783061] ? shash_async_digest+0x1b0/0x1b0 [ 74.787565] crypto_ahash_setkey+0x31a/0x470 [ 74.791979] hash_setkey+0x8b/0xa0 [ 74.795521] alg_setsockopt+0x6c5/0x740 [ 74.799506] ? hash_release+0x50/0x50 [ 74.803307] ? alg_accept+0xd0/0xd0 [ 74.806940] SYSC_setsockopt+0x4b8/0x570 [ 74.811009] SyS_setsockopt+0x76/0xa0 [ 74.814826] do_syscall_64+0x309/0x430 [ 74.818736] ? SYSC_recv+0xe0/0xe0 [ 74.822288] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 74.827479] RIP: 0033:0x455329 [ 74.830670] RSP: 002b:00007f81dd049c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 74.838379] RAX: ffffffffffffffda RBX: 00007f81dd04a6d4 RCX: 0000000000455329 [ 74.845655] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 74.852934] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 74.860217] R10: 0000000020f3eff0 R11: 0000000000000246 R12: 00000000ffffffff [ 74.867665] R13: 0000000000000510 R14: 00000000006faa20 R15: 0000000000000000 [ 74.875467] Dumping ftrace buffer: [ 74.879116] (ftrace buffer empty) [ 74.882823] Kernel Offset: disabled [ 74.886436] Rebooting in 86400 seconds..