INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.47' (ECDSA) to the list of known hosts. 2018/04/28 02:05:32 fuzzer started 2018/04/28 02:05:33 dialing manager at 10.128.0.26:44785 syzkaller login: [ 48.680658] can: request_module (can-proto-0) failed. [ 48.692482] can: request_module (can-proto-0) failed. 2018/04/28 02:05:37 kcov=true, comps=false 2018/04/28 02:05:37 executing program 0: syz_emit_ethernet(0x2e6, &(0x7f00000000c0)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x2c, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0x0, 0x4e22, 0x8}}}}}}, &(0x7f0000000000)) 2018/04/28 02:05:37 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffffffffffe) 2018/04/28 02:05:37 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_IP_XFRM_POLICY(r0, 0x10e, 0xb, &(0x7f000077d000)={{{@in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000c4afc8)={&(0x7f0000d9d000)={0x10}, 0xc, &(0x7f0000f22000)={&(0x7f0000f22d40)=@getae={0x40, 0x1f, 0x3fe, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, @in=@dev={0xac, 0x14}}}, 0x40}, 0x1}, 0x0) 2018/04/28 02:05:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x3, &(0x7f0000003000)=@framed={{0x18, 0x6, 0x3}, [], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231}, 0x48) 2018/04/28 02:05:37 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x5}, 0x4) syz_emit_ethernet(0x32, &(0x7f0000982f5b)={@random="0352ba8e8227", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x4000000000000320, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2=0xe0000002, @dev={0xac, 0x14}}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "2099e9", 0x0, "d085f5"}}}}}}, &(0x7f000004d000)) 2018/04/28 02:05:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f00003f7ffc)=0x4, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000bfcffc), &(0x7f0000d12ffc)=0x4) 2018/04/28 02:05:37 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0) syz_fuse_mount(&(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x40) 2018/04/28 02:05:37 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000beeff0)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2=0xe0000002, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x0, 0x32}, @in6=@ipv4={[], [0xff, 0xff]}, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1}, 0x0) [ 50.236766] IPVS: ftp: loaded support on port[0] = 21 [ 50.401598] IPVS: ftp: loaded support on port[0] = 21 [ 50.476591] IPVS: ftp: loaded support on port[0] = 21 [ 50.558864] IPVS: ftp: loaded support on port[0] = 21 [ 50.664877] IPVS: ftp: loaded support on port[0] = 21 [ 50.774723] IPVS: ftp: loaded support on port[0] = 21 [ 50.941807] IPVS: ftp: loaded support on port[0] = 21 [ 51.131314] IPVS: ftp: loaded support on port[0] = 21 [ 51.891256] ip (4680) used greatest stack depth: 54408 bytes left [ 52.954421] ip (4761) used greatest stack depth: 53944 bytes left [ 53.411967] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.418520] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.459241] device bridge_slave_0 entered promiscuous mode [ 53.536916] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.543465] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.563485] device bridge_slave_0 entered promiscuous mode [ 53.665962] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.672556] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.711661] device bridge_slave_1 entered promiscuous mode [ 53.859644] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.866170] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.902565] device bridge_slave_1 entered promiscuous mode [ 53.932303] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 53.945915] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.952435] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.996453] device bridge_slave_0 entered promiscuous mode [ 54.076326] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 54.084473] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.090962] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.125190] device bridge_slave_0 entered promiscuous mode [ 54.184722] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.191251] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.233353] device bridge_slave_1 entered promiscuous mode [ 54.243471] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 54.287641] ip (4858) used greatest stack depth: 53640 bytes left [ 54.310399] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.316948] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.361484] device bridge_slave_0 entered promiscuous mode [ 54.390012] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.396619] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.438789] device bridge_slave_1 entered promiscuous mode [ 54.467263] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 54.496572] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.503138] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.517230] device bridge_slave_0 entered promiscuous mode [ 54.526672] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 54.576866] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.583387] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.618824] device bridge_slave_1 entered promiscuous mode [ 54.656527] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 54.685215] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 54.759072] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 54.769193] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.775678] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.804605] device bridge_slave_1 entered promiscuous mode [ 54.886783] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 54.895336] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 54.924380] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.930885] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.980285] device bridge_slave_0 entered promiscuous mode [ 55.023939] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 55.040531] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.047140] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.072458] device bridge_slave_0 entered promiscuous mode [ 55.090365] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.128674] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.159803] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.166431] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.226536] device bridge_slave_1 entered promiscuous mode [ 55.275535] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 55.283159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.299012] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.305546] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.344976] device bridge_slave_1 entered promiscuous mode [ 55.373087] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.386170] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 55.423580] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 55.437608] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.487785] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 55.494998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.651443] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 55.662609] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.682436] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 55.692408] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 55.700883] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.806902] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 55.855746] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 55.880962] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.947520] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 55.955182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.977854] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 55.984989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.053660] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.060763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.083438] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.193830] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.207464] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.220304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.235612] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 56.265324] team0: Port device team_slave_0 added [ 56.282829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.290455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.329841] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.336923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.422113] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.449125] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.467376] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 56.499248] team0: Port device team_slave_1 added [ 56.556115] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.563573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.636750] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.643943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.662766] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.725620] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.744440] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 56.751534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 56.764361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 56.853842] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.861419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.914934] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.924904] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 56.946351] team0: Port device team_slave_0 added [ 56.979628] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.992180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.028162] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.054655] team0: Port device team_slave_0 added [ 57.091777] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.100151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.110893] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.142839] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.159678] team0: Port device team_slave_0 added [ 57.191189] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 57.198770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.212706] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.237598] team0: Port device team_slave_1 added [ 57.263901] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 57.271747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.286523] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.309324] team0: Port device team_slave_0 added [ 57.344478] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.359875] team0: Port device team_slave_1 added [ 57.367955] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 57.391253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.417391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.449395] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.475276] team0: Port device team_slave_1 added [ 57.493645] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 57.500713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.520334] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.550516] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.571466] team0: Port device team_slave_1 added [ 57.608482] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 57.615874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.635259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.687954] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.714661] team0: Port device team_slave_0 added [ 57.724486] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 57.731548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.751424] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.803094] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 57.812092] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 57.819177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.831016] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.853951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.869504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.905710] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.934724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.950942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.977007] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.987135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.016354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.039317] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 58.051359] team0: Port device team_slave_0 added [ 58.065892] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.074652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.086201] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.099105] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 58.114907] team0: Port device team_slave_1 added [ 58.129293] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.149982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.172557] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.203853] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.212099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.229415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.262482] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.270447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.283291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.295820] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 58.313547] team0: Port device team_slave_0 added [ 58.337246] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 58.349384] team0: Port device team_slave_1 added [ 58.366190] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.379749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.403335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.422419] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.431247] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.453873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.481969] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 58.491199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.507566] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.528496] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.545771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.571607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.599261] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.607264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.615395] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 58.630424] team0: Port device team_slave_1 added [ 58.652644] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.671970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.689475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.703397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.723068] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.730544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.739483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.764251] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.773196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.798782] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.812993] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 58.821339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.831388] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.870430] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 58.882614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.902598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.026372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 59.033717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.046144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.065681] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 59.086772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.119529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.177514] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 59.184814] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 59.203728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 59.242156] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 59.254252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.299450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.340919] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 59.363244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.388295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.443941] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 59.454189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.472400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.511189] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 59.518745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.534238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.710882] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 59.719169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.737763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.676702] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.683236] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.690194] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.696669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.758896] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 60.766004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.249301] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.255834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.263534] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.270063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.295585] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 61.311527] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.318103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.325010] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.331519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.391727] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 61.424169] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.430687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.437620] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.444138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.488288] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 61.501394] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.507897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.514819] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.521293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.572272] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 61.791730] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.798250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.805356] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.811821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.858522] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 61.866762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.882879] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.894638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.902976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.912278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.106356] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.112882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.119808] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.126270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.145159] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.350371] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.356925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.363876] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.370539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.383211] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 62.881361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.901168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.087382] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.353401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.663165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.896143] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 70.908577] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.939286] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.059484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.200406] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.229941] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 71.660097] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 71.680226] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 71.687700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 71.704357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.761828] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 71.780006] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.808698] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 71.924593] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 72.077017] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 72.168871] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 72.175352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.183179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.467476] 8021q: adding VLAN 0 to HW filter on device team0 [ 72.534352] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 72.540772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.551971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.601900] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 72.608415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.619437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.689745] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 72.717601] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 72.730261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.757189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.925894] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 72.932356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.948567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.046291] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.052679] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.065088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.115231] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.551656] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.659470] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.734358] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.754304] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.761195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.778357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.893759] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.026737] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.671813] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/28 02:06:05 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffffffffffe) 2018/04/28 02:06:06 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffffffffffe) 2018/04/28 02:06:06 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffffffffffe) 2018/04/28 02:06:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x3, &(0x7f0000003000)=@framed={{0x18, 0x6, 0x3}, [], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231}, 0x48) 2018/04/28 02:06:06 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f0000000800)=""/120, 0x78}], 0x2) 2018/04/28 02:06:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x3, &(0x7f0000003000)=@framed={{0x18, 0x6, 0x3}, [], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231}, 0x48) 2018/04/28 02:06:06 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f0000000800)=""/120, 0x78}], 0x2) 2018/04/28 02:06:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f00003f7ffc)=0x4, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000bfcffc), &(0x7f0000d12ffc)=0x4) 2018/04/28 02:06:07 executing program 0: syz_emit_ethernet(0x2e6, &(0x7f00000000c0)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x2c, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0x0, 0x4e22, 0x8}}}}}}, &(0x7f0000000000)) 2018/04/28 02:06:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f00003f7ffc)=0x4, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000bfcffc), &(0x7f0000d12ffc)=0x4) 2018/04/28 02:06:07 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f0000000800)=""/120, 0x78}], 0x2) 2018/04/28 02:06:07 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0) syz_fuse_mount(&(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x40) 2018/04/28 02:06:07 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000beeff0)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2=0xe0000002, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x0, 0x32}, @in6=@ipv4={[], [0xff, 0xff]}, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/04/28 02:06:07 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_IP_XFRM_POLICY(r0, 0x10e, 0xb, &(0x7f000077d000)={{{@in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000c4afc8)={&(0x7f0000d9d000)={0x10}, 0xc, &(0x7f0000f22000)={&(0x7f0000f22d40)=@getae={0x40, 0x1f, 0x3fe, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, @in=@dev={0xac, 0x14}}}, 0x40}, 0x1}, 0x0) 2018/04/28 02:06:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x5}, 0x4) syz_emit_ethernet(0x32, &(0x7f0000982f5b)={@random="0352ba8e8227", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x4000000000000320, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2=0xe0000002, @dev={0xac, 0x14}}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "2099e9", 0x0, "d085f5"}}}}}}, &(0x7f000004d000)) 2018/04/28 02:06:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x3, &(0x7f0000003000)=@framed={{0x18, 0x6, 0x3}, [], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231}, 0x48) [ 79.562460] alg: No test for authenc(digest_null,ecb(cipher_null)) (authenc(digest_null-generic,ecb-cipher_null)) 2018/04/28 02:06:07 executing program 0: syz_emit_ethernet(0x2e6, &(0x7f00000000c0)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x2c, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0x0, 0x4e22, 0x8}}}}}}, &(0x7f0000000000)) 2018/04/28 02:06:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_IP_XFRM_POLICY(r0, 0x10e, 0xb, &(0x7f000077d000)={{{@in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000c4afc8)={&(0x7f0000d9d000)={0x10}, 0xc, &(0x7f0000f22000)={&(0x7f0000f22d40)=@getae={0x40, 0x1f, 0x3fe, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, @in=@dev={0xac, 0x14}}}, 0x40}, 0x1}, 0x0) 2018/04/28 02:06:07 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f0000000800)=""/120, 0x78}], 0x2) 2018/04/28 02:06:07 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0) syz_fuse_mount(&(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x40) 2018/04/28 02:06:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x5}, 0x4) syz_emit_ethernet(0x32, &(0x7f0000982f5b)={@random="0352ba8e8227", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x4000000000000320, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2=0xe0000002, @dev={0xac, 0x14}}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "2099e9", 0x0, "d085f5"}}}}}}, &(0x7f000004d000)) 2018/04/28 02:06:07 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000beeff0)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2=0xe0000002, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x0, 0x32}, @in6=@ipv4={[], [0xff, 0xff]}, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/04/28 02:06:07 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_IP_XFRM_POLICY(r0, 0x10e, 0xb, &(0x7f000077d000)={{{@in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000c4afc8)={&(0x7f0000d9d000)={0x10}, 0xc, &(0x7f0000f22000)={&(0x7f0000f22d40)=@getae={0x40, 0x1f, 0x3fe, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, @in=@dev={0xac, 0x14}}}, 0x40}, 0x1}, 0x0) 2018/04/28 02:06:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f00003f7ffc)=0x4, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000bfcffc), &(0x7f0000d12ffc)=0x4) 2018/04/28 02:06:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_IP_XFRM_POLICY(r0, 0x10e, 0xb, &(0x7f000077d000)={{{@in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000c4afc8)={&(0x7f0000d9d000)={0x10}, 0xc, &(0x7f0000f22000)={&(0x7f0000f22d40)=@getae={0x40, 0x1f, 0x3fe, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, @in=@dev={0xac, 0x14}}}, 0x40}, 0x1}, 0x0) 2018/04/28 02:06:08 executing program 1: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0) syz_fuse_mount(&(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x40) 2018/04/28 02:06:08 executing program 5: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0) syz_fuse_mount(&(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x40) 2018/04/28 02:06:08 executing program 0: syz_emit_ethernet(0x2e6, &(0x7f00000000c0)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x2c, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0x0, 0x4e22, 0x8}}}}}}, &(0x7f0000000000)) 2018/04/28 02:06:08 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_IP_XFRM_POLICY(r0, 0x10e, 0xb, &(0x7f000077d000)={{{@in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000c4afc8)={&(0x7f0000d9d000)={0x10}, 0xc, &(0x7f0000f22000)={&(0x7f0000f22d40)=@getae={0x40, 0x1f, 0x3fe, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, @in=@dev={0xac, 0x14}}}, 0x40}, 0x1}, 0x0) 2018/04/28 02:06:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x5}, 0x4) syz_emit_ethernet(0x32, &(0x7f0000982f5b)={@random="0352ba8e8227", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x4000000000000320, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2=0xe0000002, @dev={0xac, 0x14}}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "2099e9", 0x0, "d085f5"}}}}}}, &(0x7f000004d000)) 2018/04/28 02:06:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x5}, 0x4) syz_emit_ethernet(0x32, &(0x7f0000982f5b)={@random="0352ba8e8227", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x4000000000000320, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2=0xe0000002, @dev={0xac, 0x14}}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "2099e9", 0x0, "d085f5"}}}}}}, &(0x7f000004d000)) 2018/04/28 02:06:08 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000beeff0)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2=0xe0000002, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x0, 0x32}, @in6=@ipv4={[], [0xff, 0xff]}, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/04/28 02:06:08 executing program 1: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0) syz_fuse_mount(&(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x40) 2018/04/28 02:06:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f00003f7ffc)=0x4, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000bfcffc), &(0x7f0000d12ffc)=0x4) 2018/04/28 02:06:08 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f0000000800)=""/120, 0x78}], 0x2) 2018/04/28 02:06:08 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f0000000800)=""/120, 0x78}], 0x2) 2018/04/28 02:06:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_IP_XFRM_POLICY(r0, 0x10e, 0xb, &(0x7f000077d000)={{{@in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000c4afc8)={&(0x7f0000d9d000)={0x10}, 0xc, &(0x7f0000f22000)={&(0x7f0000f22d40)=@getae={0x40, 0x1f, 0x3fe, 0x0, 0x0, {{@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, @in=@dev={0xac, 0x14}}}, 0x40}, 0x1}, 0x0) 2018/04/28 02:06:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x5}, 0x4) syz_emit_ethernet(0x32, &(0x7f0000982f5b)={@random="0352ba8e8227", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x4000000000000320, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2=0xe0000002, @dev={0xac, 0x14}}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "2099e9", 0x0, "d085f5"}}}}}}, &(0x7f000004d000)) 2018/04/28 02:06:08 executing program 7: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$rds(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)) 2018/04/28 02:06:08 executing program 6: mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='system.posix_acl_default\x00', &(0x7f000054afec)="0200000001000000000000000200000200000000", 0x14, 0x0) 2018/04/28 02:06:08 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f0000000800)=""/120, 0x78}], 0x2) 2018/04/28 02:06:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f00003f7ffc)=0x4, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000bfcffc), &(0x7f0000d12ffc)=0x4) 2018/04/28 02:06:08 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f0000000800)=""/120, 0x78}], 0x2) 2018/04/28 02:06:08 executing program 1: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0) syz_fuse_mount(&(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x40) 2018/04/28 02:06:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x43ffc) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x19, 0x0, 0x0, r0, &(0x7f0000002200)='0', 0x1, 0x8000000}]) 2018/04/28 02:06:09 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f0000000800)=""/120, 0x78}], 0x2) 2018/04/28 02:06:09 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x5}, 0x4) syz_emit_ethernet(0x32, &(0x7f0000982f5b)={@random="0352ba8e8227", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x4000000000000320, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2=0xe0000002, @dev={0xac, 0x14}}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "2099e9", 0x0, "d085f5"}}}}}}, &(0x7f000004d000)) 2018/04/28 02:06:09 executing program 6: mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='system.posix_acl_default\x00', &(0x7f000054afec)="0200000001000000000000000200000200000000", 0x14, 0x0) 2018/04/28 02:06:09 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f0000000800)=""/120, 0x78}], 0x2) 2018/04/28 02:06:09 executing program 7: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$rds(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)) 2018/04/28 02:06:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f00003f7ffc)=0x4, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000bfcffc), &(0x7f0000d12ffc)=0x4) 2018/04/28 02:06:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x43ffc) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x19, 0x0, 0x0, r0, &(0x7f0000002200)='0', 0x1, 0x8000000}]) 2018/04/28 02:06:09 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$rds(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)) 2018/04/28 02:06:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x43ffc) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x19, 0x0, 0x0, r0, &(0x7f0000002200)='0', 0x1, 0x8000000}]) 2018/04/28 02:06:09 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$rds(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)) 2018/04/28 02:06:09 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000180)={@random="154cb6310458", @random="1a1ec96a2de6", [], {@ipv6={0x86dd, {0x0, 0x8, "87d470", 0x30, 0x0, 0x0, @dev={0xfe, 0x80}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, {[], @icmpv6=@time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "921040", 0x0, 0x0, 0x0, @empty, @mcast1={0xff, 0x1, [], 0x1}}}}}}}}, &(0x7f00000012c0)) 2018/04/28 02:06:09 executing program 7: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$rds(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)) 2018/04/28 02:06:09 executing program 3: getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x9}, 0x8) unshare(0x42020200) 2018/04/28 02:06:09 executing program 6: mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='system.posix_acl_default\x00', &(0x7f000054afec)="0200000001000000000000000200000200000000", 0x14, 0x0) 2018/04/28 02:06:09 executing program 0: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x80, 0xffff, 0x1}, 0x10) sendmsg(r0, &(0x7f00000000c0)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/28 02:06:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x43ffc) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x19, 0x0, 0x0, r0, &(0x7f0000002200)='0', 0x1, 0x8000000}]) [ 81.419297] IPVS: ftp: loaded support on port[0] = 21 2018/04/28 02:06:09 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$rds(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)) 2018/04/28 02:06:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x43ffc) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x19, 0x0, 0x0, r0, &(0x7f0000002200)='0', 0x1, 0x8000000}]) 2018/04/28 02:06:09 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000180)={@random="154cb6310458", @random="1a1ec96a2de6", [], {@ipv6={0x86dd, {0x0, 0x8, "87d470", 0x30, 0x0, 0x0, @dev={0xfe, 0x80}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, {[], @icmpv6=@time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "921040", 0x0, 0x0, 0x0, @empty, @mcast1={0xff, 0x1, [], 0x1}}}}}}}}, &(0x7f00000012c0)) [ 81.753591] IPVS: ftp: loaded support on port[0] = 21 2018/04/28 02:06:09 executing program 7: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$rds(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)) 2018/04/28 02:06:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x43ffc) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x19, 0x0, 0x0, r0, &(0x7f0000002200)='0', 0x1, 0x8000000}]) 2018/04/28 02:06:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x43ffc) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x19, 0x0, 0x0, r0, &(0x7f0000002200)='0', 0x1, 0x8000000}]) 2018/04/28 02:06:09 executing program 6: mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='system.posix_acl_default\x00', &(0x7f000054afec)="0200000001000000000000000200000200000000", 0x14, 0x0) 2018/04/28 02:06:09 executing program 0: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x80, 0xffff, 0x1}, 0x10) sendmsg(r0, &(0x7f00000000c0)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/28 02:06:09 executing program 3: getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x9}, 0x8) unshare(0x42020200) 2018/04/28 02:06:09 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000180)={@random="154cb6310458", @random="1a1ec96a2de6", [], {@ipv6={0x86dd, {0x0, 0x8, "87d470", 0x30, 0x0, 0x0, @dev={0xfe, 0x80}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, {[], @icmpv6=@time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "921040", 0x0, 0x0, 0x0, @empty, @mcast1={0xff, 0x1, [], 0x1}}}}}}}}, &(0x7f00000012c0)) 2018/04/28 02:06:09 executing program 1: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x80, 0xffff, 0x1}, 0x10) sendmsg(r0, &(0x7f00000000c0)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/28 02:06:09 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000180)={@random="154cb6310458", @random="1a1ec96a2de6", [], {@ipv6={0x86dd, {0x0, 0x8, "87d470", 0x30, 0x0, 0x0, @dev={0xfe, 0x80}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, {[], @icmpv6=@time_exceed={0x3, 0x0, 0x0, 0x0, [], {0x0, 0x6, "921040", 0x0, 0x0, 0x0, @empty, @mcast1={0xff, 0x1, [], 0x1}}}}}}}}, &(0x7f00000012c0)) 2018/04/28 02:06:09 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001000)={0x10000}, 0x10) 2018/04/28 02:06:10 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)=',') 2018/04/28 02:06:10 executing program 7: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xd) 2018/04/28 02:06:10 executing program 2: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000040), 0x4) 2018/04/28 02:06:10 executing program 1: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x80, 0xffff, 0x1}, 0x10) sendmsg(r0, &(0x7f00000000c0)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/28 02:06:10 executing program 0: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x80, 0xffff, 0x1}, 0x10) sendmsg(r0, &(0x7f00000000c0)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/28 02:06:10 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001000)={0x10000}, 0x10) 2018/04/28 02:06:10 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001000)={0x10000}, 0x10) 2018/04/28 02:06:10 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)=',') 2018/04/28 02:06:10 executing program 4: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000040), 0x4) 2018/04/28 02:06:10 executing program 0: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x80, 0xffff, 0x1}, 0x10) sendmsg(r0, &(0x7f00000000c0)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/28 02:06:10 executing program 7: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xd) 2018/04/28 02:06:10 executing program 1: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000b89fe4)=@req={0x80, 0xffff, 0x1}, 0x10) sendmsg(r0, &(0x7f00000000c0)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/28 02:06:10 executing program 2: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000040), 0x4) 2018/04/28 02:06:10 executing program 3: getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x9}, 0x8) unshare(0x42020200) 2018/04/28 02:06:10 executing program 2: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000040), 0x4) 2018/04/28 02:06:10 executing program 7: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xd) 2018/04/28 02:06:10 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001000)={0x10000}, 0x10) 2018/04/28 02:06:10 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)=',') 2018/04/28 02:06:10 executing program 4: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000040), 0x4) 2018/04/28 02:06:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'lo\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) 2018/04/28 02:06:11 executing program 0: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000000)=0x200, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1a) 2018/04/28 02:06:11 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)=',') [ 83.465924] IPVS: ftp: loaded support on port[0] = 21 2018/04/28 02:06:11 executing program 2: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000040), 0x4) 2018/04/28 02:06:11 executing program 7: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xd) 2018/04/28 02:06:11 executing program 5: unshare(0x8000400) r0 = mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x42, 0x0, &(0x7f000004b000)={0x3, 0x7, 0x3}) ftruncate(r0, 0x100000001) 2018/04/28 02:06:11 executing program 4: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x9, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000040), 0x4) 2018/04/28 02:06:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'lo\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) 2018/04/28 02:06:11 executing program 3: getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x9}, 0x8) unshare(0x42020200) 2018/04/28 02:06:11 executing program 0: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000000)=0x200, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1a) 2018/04/28 02:06:11 executing program 6: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000000)=0x200, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1a) 2018/04/28 02:06:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000f9a000)=[{&(0x7f00007a7000)="2900000021001900013d3510000a00060200000000000000000100040d001000000000240003000800", 0x29}], 0x1) 2018/04/28 02:06:11 executing program 5: unshare(0x8000400) r0 = mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x42, 0x0, &(0x7f000004b000)={0x3, 0x7, 0x3}) ftruncate(r0, 0x100000001) 2018/04/28 02:06:11 executing program 6: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000000)=0x200, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1a) 2018/04/28 02:06:11 executing program 7: unshare(0x8000400) r0 = mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x42, 0x0, &(0x7f000004b000)={0x3, 0x7, 0x3}) ftruncate(r0, 0x100000001) 2018/04/28 02:06:11 executing program 2: unshare(0x8000400) r0 = mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x42, 0x0, &(0x7f000004b000)={0x3, 0x7, 0x3}) ftruncate(r0, 0x100000001) 2018/04/28 02:06:11 executing program 0: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000000)=0x200, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1a) 2018/04/28 02:06:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'lo\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) [ 83.793193] netlink: 'syz-executor4': attribute type 16 has an invalid length. 2018/04/28 02:06:11 executing program 5: unshare(0x8000400) r0 = mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x42, 0x0, &(0x7f000004b000)={0x3, 0x7, 0x3}) ftruncate(r0, 0x100000001) 2018/04/28 02:06:11 executing program 6: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000000)=0x200, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1a) 2018/04/28 02:06:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000f9a000)=[{&(0x7f00007a7000)="2900000021001900013d3510000a00060200000000000000000100040d001000000000240003000800", 0x29}], 0x1) 2018/04/28 02:06:12 executing program 7: unshare(0x8000400) r0 = mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x42, 0x0, &(0x7f000004b000)={0x3, 0x7, 0x3}) ftruncate(r0, 0x100000001) 2018/04/28 02:06:12 executing program 2: unshare(0x8000400) r0 = mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x42, 0x0, &(0x7f000004b000)={0x3, 0x7, 0x3}) ftruncate(r0, 0x100000001) 2018/04/28 02:06:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'lo\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) 2018/04/28 02:06:12 executing program 0: r0 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000000)=0x200, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1a) 2018/04/28 02:06:12 executing program 6: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x40002, 0x0) fallocate(r0, 0x3, 0x1, 0x4) 2018/04/28 02:06:12 executing program 5: unshare(0x8000400) r0 = mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x42, 0x0, &(0x7f000004b000)={0x3, 0x7, 0x3}) ftruncate(r0, 0x100000001) 2018/04/28 02:06:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000f9a000)=[{&(0x7f00007a7000)="2900000021001900013d3510000a00060200000000000000000100040d001000000000240003000800", 0x29}], 0x1) [ 84.552805] netlink: 'syz-executor4': attribute type 16 has an invalid length. 2018/04/28 02:06:12 executing program 2: unshare(0x8000400) r0 = mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x42, 0x0, &(0x7f000004b000)={0x3, 0x7, 0x3}) ftruncate(r0, 0x100000001) 2018/04/28 02:06:12 executing program 5: ioprio_set$pid(0x0, 0x0, 0x7fff) [ 84.606755] netlink: 'syz-executor3': attribute type 16 has an invalid length. 2018/04/28 02:06:12 executing program 0: unshare(0x40600) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$KDGKBLED(r0, 0x80045104, &(0x7f0000000000)) 2018/04/28 02:06:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/28 02:06:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000f9a000)=[{&(0x7f00007a7000)="2900000021001900013d3510000a00060200000000000000000100040d001000000000240003000800", 0x29}], 0x1) 2018/04/28 02:06:12 executing program 6: r0 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x10001, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0xd72c669d218eb00) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000000ffc)=0x90) 2018/04/28 02:06:12 executing program 7: unshare(0x8000400) r0 = mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x42, 0x0, &(0x7f000004b000)={0x3, 0x7, 0x3}) ftruncate(r0, 0x100000001) [ 84.861825] netlink: 'syz-executor4': attribute type 16 has an invalid length. 2018/04/28 02:06:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000f9a000)=[{&(0x7f00007a7000)="2900000021001900013d3510000a00060200000000000000000100040d001000000000240003000800", 0x29}], 0x1) 2018/04/28 02:06:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000f9a000)=[{&(0x7f00007a7000)="2900000021001900013d3510000a00060200000000000000000100040d001000000000240003000800", 0x29}], 0x1) 2018/04/28 02:06:13 executing program 5: ioprio_set$pid(0x0, 0x0, 0x7fff) 2018/04/28 02:06:13 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "0b168e", 0x14, 0x6, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000000c0)) 2018/04/28 02:06:13 executing program 0: unshare(0x40600) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$KDGKBLED(r0, 0x80045104, &(0x7f0000000000)) 2018/04/28 02:06:13 executing program 6: r0 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x10001, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0xd72c669d218eb00) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000000ffc)=0x90) 2018/04/28 02:06:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/28 02:06:13 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000ffff6a000000004000000001"]) r1 = memfd_create(&(0x7f0000000140)='[\\posix_acl_access\x00', 0x1) write$cgroup_subtree(r1, &(0x7f00000001c0)={[{0x2b, "06e953ea5ef30db9e68f1d07c4e6954c7c2de41dfcd21def18097d138e970b9d72671b0e5c27", 0x20}]}, 0x28) ioctl(r0, 0x8916, &(0x7f0000000000)) [ 85.139882] netlink: 'syz-executor3': attribute type 16 has an invalid length. 2018/04/28 02:06:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/28 02:06:13 executing program 5: ioprio_set$pid(0x0, 0x0, 0x7fff) [ 85.209910] netlink: 'syz-executor4': attribute type 16 has an invalid length. 2018/04/28 02:06:13 executing program 6: r0 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x10001, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0xd72c669d218eb00) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000000ffc)=0x90) 2018/04/28 02:06:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000f9a000)=[{&(0x7f00007a7000)="2900000021001900013d3510000a00060200000000000000000100040d001000000000240003000800", 0x29}], 0x1) 2018/04/28 02:06:13 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "0b168e", 0x14, 0x6, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000000c0)) 2018/04/28 02:06:13 executing program 0: unshare(0x40600) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$KDGKBLED(r0, 0x80045104, &(0x7f0000000000)) 2018/04/28 02:06:13 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000ffff6a000000004000000001"]) r1 = memfd_create(&(0x7f0000000140)='[\\posix_acl_access\x00', 0x1) write$cgroup_subtree(r1, &(0x7f00000001c0)={[{0x2b, "06e953ea5ef30db9e68f1d07c4e6954c7c2de41dfcd21def18097d138e970b9d72671b0e5c27", 0x20}]}, 0x28) ioctl(r0, 0x8916, &(0x7f0000000000)) 2018/04/28 02:06:13 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000ffff6a000000004000000001"]) r1 = memfd_create(&(0x7f0000000140)='[\\posix_acl_access\x00', 0x1) write$cgroup_subtree(r1, &(0x7f00000001c0)={[{0x2b, "06e953ea5ef30db9e68f1d07c4e6954c7c2de41dfcd21def18097d138e970b9d72671b0e5c27", 0x20}]}, 0x28) ioctl(r0, 0x8916, &(0x7f0000000000)) 2018/04/28 02:06:13 executing program 5: ioprio_set$pid(0x0, 0x0, 0x7fff) [ 85.442158] netlink: 'syz-executor3': attribute type 16 has an invalid length. 2018/04/28 02:06:13 executing program 6: r0 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x10001, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0xd72c669d218eb00) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000000ffc)=0x90) 2018/04/28 02:06:13 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "0b168e", 0x14, 0x6, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000000c0)) 2018/04/28 02:06:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/28 02:06:13 executing program 0: unshare(0x40600) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$KDGKBLED(r0, 0x80045104, &(0x7f0000000000)) 2018/04/28 02:06:13 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r1, &(0x7f00000026c0)={&(0x7f00000004c0)=@vsock={0x0, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000002640)=[{&(0x7f0000001640)=""/4096, 0x1000}], 0x1, &(0x7f00000003c0)=""/7, 0x7, 0x384}, 0x10002) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000300)) close(r0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) 2018/04/28 02:06:13 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000ffff6a000000004000000001"]) r1 = memfd_create(&(0x7f0000000140)='[\\posix_acl_access\x00', 0x1) write$cgroup_subtree(r1, &(0x7f00000001c0)={[{0x2b, "06e953ea5ef30db9e68f1d07c4e6954c7c2de41dfcd21def18097d138e970b9d72671b0e5c27", 0x20}]}, 0x28) ioctl(r0, 0x8916, &(0x7f0000000000)) 2018/04/28 02:06:13 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000ffff6a000000004000000001"]) r1 = memfd_create(&(0x7f0000000140)='[\\posix_acl_access\x00', 0x1) write$cgroup_subtree(r1, &(0x7f00000001c0)={[{0x2b, "06e953ea5ef30db9e68f1d07c4e6954c7c2de41dfcd21def18097d138e970b9d72671b0e5c27", 0x20}]}, 0x28) ioctl(r0, 0x8916, &(0x7f0000000000)) 2018/04/28 02:06:13 executing program 5: unshare(0x40600) r0 = syz_open_dev$evdev(&(0x7f0000fc0000)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/226) 2018/04/28 02:06:13 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xb}}, 0x14}, 0x1}, 0x8000) sendmmsg(r1, &(0x7f00000063c0)=[{{&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa}}}, 0x3a, &(0x7f0000000080), 0x5}}, {{&(0x7f0000000000)=@nl=@proc={0x10}, 0xc, &(0x7f00000020c0), 0x0, &(0x7f0000002140)=[{0x10}], 0x10}}], 0x2, 0x0) 2018/04/28 02:06:13 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "0b168e", 0x14, 0x6, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000000c0)) 2018/04/28 02:06:13 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000ffff6a000000004000000001"]) r1 = memfd_create(&(0x7f0000000140)='[\\posix_acl_access\x00', 0x1) write$cgroup_subtree(r1, &(0x7f00000001c0)={[{0x2b, "06e953ea5ef30db9e68f1d07c4e6954c7c2de41dfcd21def18097d138e970b9d72671b0e5c27", 0x20}]}, 0x28) ioctl(r0, 0x8916, &(0x7f0000000000)) 2018/04/28 02:06:13 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000ffff6a000000004000000001"]) r1 = memfd_create(&(0x7f0000000140)='[\\posix_acl_access\x00', 0x1) write$cgroup_subtree(r1, &(0x7f00000001c0)={[{0x2b, "06e953ea5ef30db9e68f1d07c4e6954c7c2de41dfcd21def18097d138e970b9d72671b0e5c27", 0x20}]}, 0x28) ioctl(r0, 0x8916, &(0x7f0000000000)) 2018/04/28 02:06:13 executing program 2: r0 = eventfd2(0x0, 0x80800) read$eventfd(r0, &(0x7f0000354000), 0x389) [ 86.217597] ================================================================== [ 86.225034] BUG: KMSAN: uninit-value in post_init_entity_util_avg+0x83b/0x9a0 [ 86.232300] CPU: 0 PID: 4504 Comm: udevd Not tainted 4.16.0+ #87 [ 86.238432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.247769] Call Trace: [ 86.250347] dump_stack+0x185/0x1d0 [ 86.253957] ? post_init_entity_util_avg+0x83b/0x9a0 [ 86.259044] kmsan_report+0x142/0x240 [ 86.262831] __msan_warning_32+0x6c/0xb0 [ 86.266878] post_init_entity_util_avg+0x83b/0x9a0 [ 86.271796] wake_up_new_task+0x9d0/0x1700 [ 86.276019] _do_fork+0x765/0xf00 [ 86.279459] SYSC_clone+0xf6/0x110 [ 86.282985] SyS_clone+0x77/0xa0 [ 86.286334] do_syscall_64+0x309/0x430 [ 86.290205] ? sys_vfork+0x70/0x70 [ 86.293734] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 86.298905] RIP: 0033:0x7f805625cf46 [ 86.302596] RSP: 002b:00007ffd2f8ea2b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 86.310289] RAX: ffffffffffffffda RBX: 00007ffd2f8ea2b0 RCX: 00007f805625cf46 [ 86.317539] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 86.324794] RBP: 00007ffd2f8ea310 R08: 0000000000001198 R09: 0000000000001198 [ 86.332045] R10: 00007f8056b79a70 R11: 0000000000000246 R12: 0000000000000000 [ 86.339299] R13: 00007ffd2f8ea2d0 R14: 0000000000000005 R15: 0000000000000005 [ 86.346554] [ 86.348161] Uninit was stored to memory at: [ 86.352466] kmsan_internal_chain_origin+0x12b/0x210 [ 86.357553] __msan_chain_origin+0x69/0xc0 [ 86.361771] reweight_entity+0x135c/0x1a30 [ 86.365985] task_tick_fair+0x5f1/0x1040 [ 86.370027] scheduler_tick+0x28b/0x490 [ 86.373985] update_process_times+0x157/0x1a0 [ 86.378469] tick_sched_timer+0x33b/0x4b0 [ 86.382609] __hrtimer_run_queues+0xc03/0x15d0 [ 86.387174] hrtimer_interrupt+0x426/0xaf0 [ 86.391399] local_apic_timer_interrupt+0x66/0x230 [ 86.396311] smp_apic_timer_interrupt+0x5a/0x90 [ 86.400980] Local variable description: ----flags.i.i.i.i@_raw_spin_lock_irqsave [ 86.408491] Variable was created at: [ 86.412186] _raw_spin_lock_irqsave+0x45/0xf0 [ 86.416663] hrtimer_interrupt+0x101/0xaf0 [ 86.420875] ================================================================== [ 86.428210] Disabling lock debugging due to kernel taint [ 86.433639] Kernel panic - not syncing: panic_on_warn set ... [ 86.433639] [ 86.440986] CPU: 0 PID: 4504 Comm: udevd Tainted: G B 4.16.0+ #87 [ 86.448410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.457742] Call Trace: [ 86.460314] dump_stack+0x185/0x1d0 [ 86.463926] panic+0x39d/0x940 [ 86.467125] ? post_init_entity_util_avg+0x83b/0x9a0 [ 86.472211] kmsan_report+0x238/0x240 [ 86.475994] __msan_warning_32+0x6c/0xb0 [ 86.480038] post_init_entity_util_avg+0x83b/0x9a0 [ 86.484954] wake_up_new_task+0x9d0/0x1700 [ 86.489175] _do_fork+0x765/0xf00 [ 86.492627] SYSC_clone+0xf6/0x110 [ 86.496151] SyS_clone+0x77/0xa0 [ 86.499510] do_syscall_64+0x309/0x430 [ 86.503397] ? sys_vfork+0x70/0x70 [ 86.506924] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 86.512091] RIP: 0033:0x7f805625cf46 [ 86.515782] RSP: 002b:00007ffd2f8ea2b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 86.523471] RAX: ffffffffffffffda RBX: 00007ffd2f8ea2b0 RCX: 00007f805625cf46 [ 86.530721] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 86.537971] RBP: 00007ffd2f8ea310 R08: 0000000000001198 R09: 0000000000001198 [ 86.545224] R10: 00007f8056b79a70 R11: 0000000000000246 R12: 0000000000000000 [ 86.552477] R13: 00007ffd2f8ea2d0 R14: 0000000000000005 R15: 0000000000000005 [ 87.671711] Shutting down cpus with NMI [ 87.687356] Dumping ftrace buffer: [ 87.690897] (ftrace buffer empty) [ 87.694590] Kernel Offset: disabled [ 87.698211] Rebooting in 86400 seconds..