[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 33.180350] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 34.571511] random: sshd: uninitialized urandom read (32 bytes read) [ 35.027356] random: sshd: uninitialized urandom read (32 bytes read) [ 36.411565] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.7' (ECDSA) to the list of known hosts. [ 42.000966] random: sshd: uninitialized urandom read (32 bytes read) 2018/05/08 19:17:53 fuzzer started 2018/05/08 19:17:53 dialing manager at 10.128.0.26:35805 [ 61.851284] can: request_module (can-proto-0) failed. [ 61.862661] can: request_module (can-proto-0) failed. 2018/05/08 19:18:14 kcov=true, comps=false 2018/05/08 19:18:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3}, {0x6}]}) 2018/05/08 19:18:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x5, 0x2000000000000004, 0x80000000004, 0x2}, 0x14) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)='z'}, 0x10) 2018/05/08 19:18:16 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/05/08 19:18:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x14, 0x0, 0x207, 0x1}, 0x14}, 0x1}, 0x0) 2018/05/08 19:18:16 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = dup(r0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000004000)=0x3000, 0xfffffffffffffe20) mlock2(&(0x7f0000013000/0x3000)=nil, 0x3000, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000003ff0)={&(0x7f0000012000/0x2000)=nil, 0x2000}) 2018/05/08 19:18:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)=@updsa={0x138, 0x1a, 0x1, 0x0, 0x0, {{@in=@broadcast=0xffffffff, @in6=@mcast2={0xff, 0x2, [], 0x1}}, {@in=@loopback=0x7f000001, 0x0, 0x6c}, @in6=@mcast2={0xff, 0x2, [], 0x1}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/05/08 19:18:16 executing program 6: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000a6b000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000000)="1f0000000104ff00fd437f0000005deff30501000800030052d80000fdff00", 0x1f) 2018/05/08 19:18:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @rand_addr}, {0x0, @random="87253169f6ee"}, 0xfffffffffffffffc, {0x2, 0x0, @loopback=0x7f000001}}) [ 66.254811] IPVS: ftp: loaded support on port[0] = 21 [ 66.373288] IPVS: ftp: loaded support on port[0] = 21 [ 66.422732] IPVS: ftp: loaded support on port[0] = 21 [ 66.461537] IPVS: ftp: loaded support on port[0] = 21 [ 66.485190] IPVS: ftp: loaded support on port[0] = 21 [ 66.508318] IPVS: ftp: loaded support on port[0] = 21 [ 66.513863] IPVS: ftp: loaded support on port[0] = 21 [ 66.543597] IPVS: ftp: loaded support on port[0] = 21 [ 69.162549] ip (4776) used greatest stack depth: 54344 bytes left [ 69.530395] ip (4801) used greatest stack depth: 54312 bytes left [ 69.843603] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.850191] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.899172] device bridge_slave_0 entered promiscuous mode [ 70.025217] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.032546] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.106568] device bridge_slave_0 entered promiscuous mode [ 70.135012] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.141554] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.150737] device bridge_slave_0 entered promiscuous mode [ 70.171447] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.177940] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.196370] device bridge_slave_0 entered promiscuous mode [ 70.223444] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.229946] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.239807] device bridge_slave_1 entered promiscuous mode [ 70.251883] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.258436] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.276160] device bridge_slave_0 entered promiscuous mode [ 70.308522] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.315023] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.343224] device bridge_slave_1 entered promiscuous mode [ 70.371209] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.377689] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.409198] device bridge_slave_0 entered promiscuous mode [ 70.426975] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.433517] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.449860] device bridge_slave_1 entered promiscuous mode [ 70.464560] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.480287] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.486753] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.516216] device bridge_slave_1 entered promiscuous mode [ 70.527299] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.533807] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.547818] device bridge_slave_1 entered promiscuous mode [ 70.560710] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.567207] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.588662] device bridge_slave_0 entered promiscuous mode [ 70.616107] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.622592] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.652700] device bridge_slave_1 entered promiscuous mode [ 70.664680] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.671867] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.678376] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.688405] device bridge_slave_0 entered promiscuous mode [ 70.706293] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.717869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.726562] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.733134] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.776206] device bridge_slave_1 entered promiscuous mode [ 70.808866] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 70.821584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.838260] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 70.848267] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.854788] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.902163] device bridge_slave_1 entered promiscuous mode [ 70.936182] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 70.952401] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.973762] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.015673] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.040587] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.132999] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 71.175257] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.239850] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.388503] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 71.468770] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.492452] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.614680] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.696933] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.720878] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 71.749258] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 71.765259] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.796379] ip (4950) used greatest stack depth: 54184 bytes left [ 71.865334] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.876421] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 71.897890] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.948704] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 71.962313] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 71.969326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.998688] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.013310] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 72.056889] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 72.063950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.104123] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.113813] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 72.121677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.151471] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.198362] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 72.205348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.247301] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 72.254335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.275298] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 72.282625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.307188] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 72.316528] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 72.329235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.356174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 72.366813] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 72.374783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.429858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.463907] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 72.475993] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 72.486817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.519986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.552705] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 72.565788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 72.578701] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 72.599903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.622899] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 72.644902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.694326] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 72.704943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.760919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 72.768017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.095493] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.107999] team0: Port device team_slave_0 added [ 73.128509] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.146280] team0: Port device team_slave_0 added [ 73.163535] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.176802] team0: Port device team_slave_0 added [ 73.201213] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.211093] team0: Port device team_slave_0 added [ 73.260769] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.285103] team0: Port device team_slave_0 added [ 73.303071] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.320625] team0: Port device team_slave_1 added [ 73.345587] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.364138] team0: Port device team_slave_0 added [ 73.388975] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.405087] team0: Port device team_slave_1 added [ 73.418202] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.429161] team0: Port device team_slave_0 added [ 73.437978] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.454723] team0: Port device team_slave_1 added [ 73.466944] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.478125] team0: Port device team_slave_1 added [ 73.502625] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.528753] team0: Port device team_slave_0 added [ 73.540169] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.552963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.572629] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.600300] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.615802] team0: Port device team_slave_1 added [ 73.642473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.654428] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.670978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.684451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.707508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.728134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.741984] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.751783] team0: Port device team_slave_1 added [ 73.759728] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.767570] team0: Port device team_slave_1 added [ 73.773640] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.782540] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.803777] team0: Port device team_slave_1 added [ 73.827135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.847526] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.869757] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.889341] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.899593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.944998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.978550] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.003356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.030967] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.041313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.049342] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.065883] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.079829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.087978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.102966] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.110639] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 74.117673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.129827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.145790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.154827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.166324] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.175476] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.188269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.202678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.229949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.242568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.260698] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.273241] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.281226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.296483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.313750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.337271] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.352265] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.364083] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.380750] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.392676] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.400529] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.407839] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.437225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.472864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.490105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.506726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.529347] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.539695] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.548991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.557851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.567405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.576816] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.584263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.594416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.608539] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.635248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.646714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.658745] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.666500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.675868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.704201] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.714227] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.722847] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.749759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.765088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.785309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.800695] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.808228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.817495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.837841] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.851308] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.858696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.884245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.896854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.908406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.941435] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.952838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.969787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.984363] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.991887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.014831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.062168] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 75.069676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.087821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.431670] ip (5248) used greatest stack depth: 54152 bytes left [ 77.020022] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.026547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.033487] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.039974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.079988] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.097104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.118746] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.125273] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.132219] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.138670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.175168] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.237978] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.244488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.251373] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.257856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.315750] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.340182] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.346704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.353579] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.360022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.367885] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.376524] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.383012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.389938] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.396426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.418483] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.426774] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.433255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.440144] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.446673] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.482573] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.713407] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.719894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.726775] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.733260] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.773415] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.805352] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.811839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.818725] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.825276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.867149] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.112257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.127373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.160515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.197755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.220423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.239235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.246699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.969017] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.994001] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.075911] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.231302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.271255] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.420678] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.702886] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.737369] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 86.841310] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 86.866619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.934471] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.121596] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.143196] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.176195] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.493765] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.610977] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.617341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.631295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.674852] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.681409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.705922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.754446] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.762597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.777901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.810762] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 87.904470] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.910803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.919684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.954873] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.963700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.984185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.110310] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.116635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.127889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.426188] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.432538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.448134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.489551] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.568997] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.653669] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.706764] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 88.714362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.759881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.809925] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.884551] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.019536] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.249581] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.705092] 8021q: adding VLAN 0 to HW filter on device team0 2018/05/08 19:18:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x5, 0x2000000000000004, 0x80000000004, 0x2}, 0x14) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)='z'}, 0x10) 2018/05/08 19:18:44 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) [ 93.714457] audit: type=1326 audit(1525807124.713:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6593 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455979 code=0x0 2018/05/08 19:18:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x5, 0x2000000000000004, 0x80000000004, 0x2}, 0x14) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)='z'}, 0x10) 2018/05/08 19:18:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @rand_addr}, {0x0, @random="87253169f6ee"}, 0xfffffffffffffffc, {0x2, 0x0, @loopback=0x7f000001}}) 2018/05/08 19:18:44 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) [ 93.977126] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. [ 94.062148] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. [ 94.109152] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. [ 94.169364] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. 2018/05/08 19:18:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3}, {0x6}]}) 2018/05/08 19:18:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x5, 0x2000000000000004, 0x80000000004, 0x2}, 0x14) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000040)='z'}, 0x10) 2018/05/08 19:18:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @rand_addr}, {0x0, @random="87253169f6ee"}, 0xfffffffffffffffc, {0x2, 0x0, @loopback=0x7f000001}}) 2018/05/08 19:18:45 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/05/08 19:18:45 executing program 6: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000a6b000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000000)="1f0000000104ff00fd437f0000005deff30501000800030052d80000fdff00", 0x1f) 2018/05/08 19:18:45 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = dup(r0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000004000)=0x3000, 0xfffffffffffffe20) mlock2(&(0x7f0000013000/0x3000)=nil, 0x3000, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000003ff0)={&(0x7f0000012000/0x2000)=nil, 0x2000}) 2018/05/08 19:18:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x14, 0x0, 0x207, 0x1}, 0x14}, 0x1}, 0x0) 2018/05/08 19:18:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)=@updsa={0x138, 0x1a, 0x1, 0x0, 0x0, {{@in=@broadcast=0xffffffff, @in6=@mcast2={0xff, 0x2, [], 0x1}}, {@in=@loopback=0x7f000001, 0x0, 0x6c}, @in6=@mcast2={0xff, 0x2, [], 0x1}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}, 0x1}, 0x0) [ 94.474488] audit: type=1326 audit(1525807125.473:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6659 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455979 code=0x0 [ 94.516315] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. 2018/05/08 19:18:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3}, {0x6}]}) [ 94.568959] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. [ 94.644225] audit: type=1326 audit(1525807125.640:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6676 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455979 code=0x0 2018/05/08 19:18:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3}, {0x6}]}) 2018/05/08 19:18:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x14, 0x0, 0x207, 0x1}, 0x14}, 0x1}, 0x0) 2018/05/08 19:18:45 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = dup(r0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000004000)=0x3000, 0xfffffffffffffe20) mlock2(&(0x7f0000013000/0x3000)=nil, 0x3000, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000003ff0)={&(0x7f0000012000/0x2000)=nil, 0x2000}) 2018/05/08 19:18:45 executing program 6: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000a6b000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000000)="1f0000000104ff00fd437f0000005deff30501000800030052d80000fdff00", 0x1f) 2018/05/08 19:18:45 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = dup(r0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000004000)=0x3000, 0xfffffffffffffe20) mlock2(&(0x7f0000013000/0x3000)=nil, 0x3000, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000003ff0)={&(0x7f0000012000/0x2000)=nil, 0x2000}) 2018/05/08 19:18:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @rand_addr}, {0x0, @random="87253169f6ee"}, 0xfffffffffffffffc, {0x2, 0x0, @loopback=0x7f000001}}) 2018/05/08 19:18:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)=@updsa={0x138, 0x1a, 0x1, 0x0, 0x0, {{@in=@broadcast=0xffffffff, @in6=@mcast2={0xff, 0x2, [], 0x1}}, {@in=@loopback=0x7f000001, 0x0, 0x6c}, @in6=@mcast2={0xff, 0x2, [], 0x1}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/05/08 19:18:45 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe), 0x0, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000ae7ff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) [ 94.812373] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. 2018/05/08 19:18:45 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = dup(r0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000004000)=0x3000, 0xfffffffffffffe20) mlock2(&(0x7f0000013000/0x3000)=nil, 0x3000, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000003ff0)={&(0x7f0000012000/0x2000)=nil, 0x2000}) 2018/05/08 19:18:45 executing program 1: clock_getres(0x3, &(0x7f00000000c0)) [ 94.869259] audit: type=1326 audit(1525807125.867:6): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6700 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455979 code=0x0 [ 94.894484] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. 2018/05/08 19:18:46 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = dup(r0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000004000)=0x3000, 0xfffffffffffffe20) mlock2(&(0x7f0000013000/0x3000)=nil, 0x3000, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000003ff0)={&(0x7f0000012000/0x2000)=nil, 0x2000}) 2018/05/08 19:18:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00004ca000)={&(0x7f0000690000)={0x14, 0x0, 0x207, 0x1}, 0x14}, 0x1}, 0x0) 2018/05/08 19:18:46 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe), 0x0, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000ae7ff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 2018/05/08 19:18:46 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe), 0x0, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000ae7ff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 2018/05/08 19:18:46 executing program 6: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000a6b000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000000)="1f0000000104ff00fd437f0000005deff30501000800030052d80000fdff00", 0x1f) 2018/05/08 19:18:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)=@updsa={0x138, 0x1a, 0x1, 0x0, 0x0, {{@in=@broadcast=0xffffffff, @in6=@mcast2={0xff, 0x2, [], 0x1}}, {@in=@loopback=0x7f000001, 0x0, 0x6c}, @in6=@mcast2={0xff, 0x2, [], 0x1}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'lzjh\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/05/08 19:18:46 executing program 1: clock_getres(0x3, &(0x7f00000000c0)) 2018/05/08 19:18:46 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = dup(r0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000004000)=0x3000, 0xfffffffffffffe20) mlock2(&(0x7f0000013000/0x3000)=nil, 0x3000, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000003ff0)={&(0x7f0000012000/0x2000)=nil, 0x2000}) [ 95.194273] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. [ 95.257771] netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. 2018/05/08 19:18:46 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000fd0ff3)='/dev/usbmon#\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x40189206, &(0x7f0000ddd000)) 2018/05/08 19:18:46 executing program 4: unshare(0x40600) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='/exe\x00') 2018/05/08 19:18:46 executing program 5: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00', r1}) 2018/05/08 19:18:46 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe), 0x0, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000ae7ff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 2018/05/08 19:18:46 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe), 0x0, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000ae7ff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 2018/05/08 19:18:46 executing program 3: r0 = socket$inet_sctp(0x2, 0x80000000005, 0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000), 0x4) 2018/05/08 19:18:46 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x6}, {&(0x7f0000000800)=""/120, 0x1}], 0x2) 2018/05/08 19:18:46 executing program 1: clock_getres(0x3, &(0x7f00000000c0)) 2018/05/08 19:18:46 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe), 0x0, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000ae7ff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 2018/05/08 19:18:46 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe), 0x0, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000ae7ff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 2018/05/08 19:18:46 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x6}, {&(0x7f0000000800)=""/120, 0x1}], 0x2) 2018/05/08 19:18:46 executing program 3: r0 = socket$inet_sctp(0x2, 0x80000000005, 0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000), 0x4) 2018/05/08 19:18:46 executing program 4: unshare(0x40600) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='/exe\x00') 2018/05/08 19:18:46 executing program 1: clock_getres(0x3, &(0x7f00000000c0)) 2018/05/08 19:18:46 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000fd0ff3)='/dev/usbmon#\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x40189206, &(0x7f0000ddd000)) 2018/05/08 19:18:46 executing program 5: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00', r1}) 2018/05/08 19:18:47 executing program 5: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00', r1}) 2018/05/08 19:18:47 executing program 4: unshare(0x40600) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='/exe\x00') 2018/05/08 19:18:47 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x6}, {&(0x7f0000000800)=""/120, 0x1}], 0x2) 2018/05/08 19:18:47 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x6}, {&(0x7f0000000800)=""/120, 0x1}], 0x2) 2018/05/08 19:18:47 executing program 1: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00', r1}) 2018/05/08 19:18:47 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000fd0ff3)='/dev/usbmon#\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x40189206, &(0x7f0000ddd000)) 2018/05/08 19:18:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x80000000005, 0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000), 0x4) 2018/05/08 19:18:47 executing program 7: perf_event_open(&(0x7f0000bba000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f00000003c0)) 2018/05/08 19:18:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x80000000005, 0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000), 0x4) 2018/05/08 19:18:47 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x6}, {&(0x7f0000000800)=""/120, 0x1}], 0x2) 2018/05/08 19:18:47 executing program 4: unshare(0x40600) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='/exe\x00') 2018/05/08 19:18:47 executing program 1: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00', r1}) 2018/05/08 19:18:47 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x6}, {&(0x7f0000000800)=""/120, 0x1}], 0x2) 2018/05/08 19:18:47 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f0000fd0ff3)='/dev/usbmon#\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x40189206, &(0x7f0000ddd000)) 2018/05/08 19:18:47 executing program 5: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00', r1}) 2018/05/08 19:18:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000caf000)="9c", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$TCXONC(r0, 0x540a, 0x1) 2018/05/08 19:18:47 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x6}, {&(0x7f0000000800)=""/120, 0x1}], 0x2) 2018/05/08 19:18:47 executing program 2: r0 = gettid() r1 = signalfd4(0xffffffffffffffff, &(0x7f0000336000)={0x9}, 0x8, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000005b000)) timer_create(0x0, &(0x7f0000344000)={0x0, 0x4, 0x4, @tid=r0}, &(0x7f0000cb2ffc)) rt_sigprocmask(0x0, &(0x7f0000479000)={0xfffffffffffffffe}, 0x0, 0x8) clock_gettime(0x0, &(0x7f000005b000)={0x0, 0x0}) timer_settime(0x0, 0xfffffffffffffffd, &(0x7f000005bfe0)={{}, {0x0, r3+10000000}}, &(0x7f0000046000)) epoll_pwait(r2, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/05/08 19:18:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14}, @remote={0xac, 0x14, 0x14, 0xbb}, @rand_addr}, 0xc) 2018/05/08 19:18:47 executing program 1: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x89a2, &(0x7f0000000000)={'bridge0\x00', r1}) 2018/05/08 19:18:47 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) 2018/05/08 19:18:47 executing program 7: perf_event_open(&(0x7f0000bba000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f00000003c0)) 2018/05/08 19:18:47 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)="e91f7189591e9233614b00", 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/05/08 19:18:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14}, @remote={0xac, 0x14, 0x14, 0xbb}, @rand_addr}, 0xc) 2018/05/08 19:18:47 executing program 1: socket$inet6(0xa, 0x80003, 0x0) r0 = perf_event_open(&(0x7f0000bba000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f00000003c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(r2, 0x0, &(0x7f0000000040)=0xffffff8e) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='smaps\x00') ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000500)={{0x0, 0x3, 0x4, 0x3, 0x8}, 0x18, 0x2, 0x9}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') gettid() setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000140)={0x9, 0x0, 0x7, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@int=0xfe00000000000000, 0x4) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") 2018/05/08 19:18:47 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x10) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) shutdown(r2, 0x1) sendto$inet6(r2, &(0x7f0000000040)="97", 0x1, 0x0, 0x0, 0x0) 2018/05/08 19:18:47 executing program 2: r0 = gettid() r1 = signalfd4(0xffffffffffffffff, &(0x7f0000336000)={0x9}, 0x8, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000005b000)) timer_create(0x0, &(0x7f0000344000)={0x0, 0x4, 0x4, @tid=r0}, &(0x7f0000cb2ffc)) rt_sigprocmask(0x0, &(0x7f0000479000)={0xfffffffffffffffe}, 0x0, 0x8) clock_gettime(0x0, &(0x7f000005b000)={0x0, 0x0}) timer_settime(0x0, 0xfffffffffffffffd, &(0x7f000005bfe0)={{}, {0x0, r3+10000000}}, &(0x7f0000046000)) epoll_pwait(r2, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/05/08 19:18:47 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)="e91f7189591e9233614b00", 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/05/08 19:18:47 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) 2018/05/08 19:18:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14}, @remote={0xac, 0x14, 0x14, 0xbb}, @rand_addr}, 0xc) 2018/05/08 19:18:48 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)="e91f7189591e9233614b00", 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/05/08 19:18:48 executing program 1: socket$inet6(0xa, 0x80003, 0x0) r0 = perf_event_open(&(0x7f0000bba000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f00000003c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(r2, 0x0, &(0x7f0000000040)=0xffffff8e) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='smaps\x00') ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000500)={{0x0, 0x3, 0x4, 0x3, 0x8}, 0x18, 0x2, 0x9}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') gettid() setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000140)={0x9, 0x0, 0x7, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@int=0xfe00000000000000, 0x4) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") 2018/05/08 19:18:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000caf000)="9c", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$TCXONC(r0, 0x540a, 0x1) 2018/05/08 19:18:48 executing program 2: r0 = gettid() r1 = signalfd4(0xffffffffffffffff, &(0x7f0000336000)={0x9}, 0x8, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000005b000)) timer_create(0x0, &(0x7f0000344000)={0x0, 0x4, 0x4, @tid=r0}, &(0x7f0000cb2ffc)) rt_sigprocmask(0x0, &(0x7f0000479000)={0xfffffffffffffffe}, 0x0, 0x8) clock_gettime(0x0, &(0x7f000005b000)={0x0, 0x0}) timer_settime(0x0, 0xfffffffffffffffd, &(0x7f000005bfe0)={{}, {0x0, r3+10000000}}, &(0x7f0000046000)) epoll_pwait(r2, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/05/08 19:18:48 executing program 7: perf_event_open(&(0x7f0000bba000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f00000003c0)) 2018/05/08 19:18:48 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) 2018/05/08 19:18:48 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)="e91f7189591e9233614b00", 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000480)) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 2018/05/08 19:18:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14}, @remote={0xac, 0x14, 0x14, 0xbb}, @rand_addr}, 0xc) 2018/05/08 19:18:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x10) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) shutdown(r2, 0x1) sendto$inet6(r2, &(0x7f0000000040)="97", 0x1, 0x0, 0x0, 0x0) 2018/05/08 19:18:48 executing program 4: socket$inet6(0xa, 0x80003, 0x0) r0 = perf_event_open(&(0x7f0000bba000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f00000003c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(r2, 0x0, &(0x7f0000000040)=0xffffff8e) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='smaps\x00') ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000500)={{0x0, 0x3, 0x4, 0x3, 0x8}, 0x18, 0x2, 0x9}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') gettid() setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000140)={0x9, 0x0, 0x7, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@int=0xfe00000000000000, 0x4) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") 2018/05/08 19:18:48 executing program 3: socket$inet6(0xa, 0x80003, 0x0) r0 = perf_event_open(&(0x7f0000bba000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f00000003c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(r2, 0x0, &(0x7f0000000040)=0xffffff8e) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='smaps\x00') ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000500)={{0x0, 0x3, 0x4, 0x3, 0x8}, 0x18, 0x2, 0x9}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="40000010b9b82bd47668c7379f01000000000000000000a3a533f73840d7ddce9f800ad27f3be72f0fd2d40b259b109f75c59125c6d0e6d660a2ea109a92bdaad50c8c285310f0d345ec12a2d94d6116d515ec6dfce411cd1116fa2cc07503004ab550c30911d6b9791295ae3909161e3e58d21f48f537bc3ddef48c1d703581688d09d10fd19b03d368e17cc0463e1d5870b433ab8085fb8318e369e7de549d50a3cf018de4a44e343f306e3671259658609fc7c24b41d24e7f2dd284d2c100069dc4f62800000000000000000000000000002055e58786d120dfe6f25be689fbfe6d47982ff4f5c2b8122c129995f6f49b580b1350b18a6e63b97cd77182c1c5b6425531b6faa92fefbee5d8da82ceb932fbedf505300c822fbe1e4172ce56c05d8fd082e1a42d4708a42c46a3532b00000000000000000000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') gettid() setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000140)={0x9, 0x0, 0x7, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@int=0xfe00000000000000, 0x4) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") 2018/05/08 19:18:48 executing program 2: r0 = gettid() r1 = signalfd4(0xffffffffffffffff, &(0x7f0000336000)={0x9}, 0x8, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000005b000)) timer_create(0x0, &(0x7f0000344000)={0x0, 0x4, 0x4, @tid=r0}, &(0x7f0000cb2ffc)) rt_sigprocmask(0x0, &(0x7f0000479000)={0xfffffffffffffffe}, 0x0, 0x8) clock_gettime(0x0, &(0x7f000005b000)={0x0, 0x0}) timer_settime(0x0, 0xfffffffffffffffd, &(0x7f000005bfe0)={{}, {0x0, r3+10000000}}, &(0x7f0000046000)) epoll_pwait(r2, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/05/08 19:18:48 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000b32fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) 2018/05/08 19:18:48 executing program 7: perf_event_open(&(0x7f0000bba000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f00000003c0)) 2018/05/08 19:18:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x10) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) shutdown(r2, 0x1) sendto$inet6(r2, &(0x7f0000000040)="97", 0x1, 0x0, 0x0, 0x0) 2018/05/08 19:18:49 executing program 2: socket$inet6(0xa, 0x80003, 0x0) r0 = perf_event_open(&(0x7f0000bba000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f00000003c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(r2, 0x0, &(0x7f0000000040)=0xffffff8e) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='smaps\x00') ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000500)={{0x0, 0x3, 0x4, 0x3, 0x8}, 0x18, 0x2, 0x9}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="40000010b9b82bd47668c7379f01000000000000000000a3a533f73840d7ddce9f800ad27f3be72f0fd2d40b259b109f75c59125c6d0e6d660a2ea109a92bdaad50c8c285310f0d345ec12a2d94d6116d515ec6dfce411cd1116fa2cc07503004ab550c30911d6b9791295ae3909161e3e58d21f48f537bc3ddef48c1d703581688d09d10fd19b03d368e17cc0463e1d5870b433ab8085fb8318e369e7de549d50a3cf018de4a44e343f306e3671259658609fc7c24b41d24e7f2dd284d2c100069dc4f62800000000000000000000000000002055e58786d120dfe6f25be689fbfe6d47982ff4f5c2b8122c129995f6f49b580b1350b18a6e63b97cd77182c1c5b6425531b6faa92fefbee5d8da82ceb932fbedf505300c822fbe1e4172ce56c05d8fd082e1a42d4708a42c46a3532b00000000000000000000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') gettid() setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000140)={0x9, 0x0, 0x7, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@int=0xfe00000000000000, 0x4) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") 2018/05/08 19:18:49 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000caf000)="9c", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$TCXONC(r0, 0x540a, 0x1) 2018/05/08 19:18:49 executing program 1: socket$inet6(0xa, 0x80003, 0x0) r0 = perf_event_open(&(0x7f0000bba000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f00000003c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(r2, 0x0, &(0x7f0000000040)=0xffffff8e) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='smaps\x00') ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000500)={{0x0, 0x3, 0x4, 0x3, 0x8}, 0x18, 0x2, 0x9}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') gettid() setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000140)={0x9, 0x0, 0x7, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@int=0xfe00000000000000, 0x4) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") [ 98.719757] ================================================================== [ 98.727161] BUG: KMSAN: uninit-value in __sctp_v6_cmp_addr+0x49a/0x850 [ 98.733814] CPU: 0 PID: 8 Comm: ksoftirqd/0 Not tainted 4.17.0-rc3+ #88 [ 98.740549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.749887] Call Trace: [ 98.752480] dump_stack+0x185/0x1d0 [ 98.756113] ? __sctp_v6_cmp_addr+0x49a/0x850 [ 98.760625] kmsan_report+0x142/0x240 [ 98.764419] __msan_warning_32+0x6c/0xb0 [ 98.768487] __sctp_v6_cmp_addr+0x49a/0x850 [ 98.772807] sctp_inet6_cmp_addr+0x3dc/0x400 [ 98.777206] ? sctp_inet6_af_supported+0xf0/0xf0 [ 98.781950] sctp_bind_addr_match+0x18b/0x2f0 [ 98.786434] sctp_addrs_lookup_transport+0x904/0xa20 [ 98.791534] sctp_rcv+0x15e6/0x4d30 [ 98.795154] ? raw_local_deliver+0x63/0x1660 [ 98.799561] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 98.804915] ? raw_local_deliver+0xe2/0x1660 [ 98.809306] ? iptable_nat_ipv4_fn+0xb0/0xb0 [ 98.813699] ? kmsan_set_origin_inline+0x6b/0x120 [ 98.818522] ? sctp_v4_cmp_addr+0x250/0x250 [ 98.822826] ? sctp_csum_combine+0xa0/0xa0 [ 98.827053] ip_local_deliver_finish+0x874/0xec0 [ 98.832501] ip_local_deliver+0x43c/0x4e0 [ 98.836637] ? ip_local_deliver+0x4e0/0x4e0 [ 98.840942] ? ip_call_ra_chain+0x7c0/0x7c0 [ 98.845248] ip_rcv_finish+0xa36/0x1d00 [ 98.849216] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 98.854571] ? nf_hook_slow+0x36f/0x3d0 [ 98.858544] ip_rcv+0x118f/0x16d0 [ 98.861983] ? ip_rcv+0x16d0/0x16d0 [ 98.865595] __netif_receive_skb_core+0x47df/0x4a90 [ 98.870600] ? kmsan_set_origin_inline+0x40/0x120 [ 98.875433] ? ip_local_deliver_finish+0xec0/0xec0 [ 98.880357] process_backlog+0x62d/0xe20 [ 98.884414] ? rps_trigger_softirq+0x2f0/0x2f0 [ 98.888976] net_rx_action+0x7c1/0x1a70 [ 98.892935] ? net_tx_action+0xab0/0xab0 [ 98.896981] __do_softirq+0x56d/0x93d [ 98.900769] ? ksoftirqd_should_run+0x30/0x30 [ 98.905244] run_ksoftirqd+0x1f/0x40 [ 98.908948] smpboot_thread_fn+0x488/0x970 [ 98.913165] ? cpu_report_death+0x1e0/0x1e0 [ 98.917482] kthread+0x539/0x720 [ 98.920830] ? cpu_report_death+0x1e0/0x1e0 [ 98.925133] ? kthread_blkcg+0xf0/0xf0 [ 98.929006] ret_from_fork+0x35/0x40 [ 98.932703] [ 98.934318] Local variable description: ----dest@sctp_rcv [ 98.939843] Variable was created at: [ 98.943546] sctp_rcv+0x13d/0x4d30 [ 98.947075] ip_local_deliver_finish+0x874/0xec0 [ 98.951813] ================================================================== [ 98.959155] Disabling lock debugging due to kernel taint [ 98.964587] Kernel panic - not syncing: panic_on_warn set ... [ 98.964587] [ 98.971935] CPU: 0 PID: 8 Comm: ksoftirqd/0 Tainted: G B 4.17.0-rc3+ #88 [ 98.980063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.989418] Call Trace: [ 98.991998] dump_stack+0x185/0x1d0 [ 98.995636] panic+0x39d/0x940 [ 98.998850] ? __sctp_v6_cmp_addr+0x49a/0x850 [ 99.003347] kmsan_report+0x238/0x240 [ 99.007150] __msan_warning_32+0x6c/0xb0 [ 99.011215] __sctp_v6_cmp_addr+0x49a/0x850 [ 99.015546] sctp_inet6_cmp_addr+0x3dc/0x400 2018/05/08 19:18:50 executing program 3: socket$inet6(0xa, 0x80003, 0x0) r0 = perf_event_open(&(0x7f0000bba000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f00000003c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(r2, 0x0, &(0x7f0000000040)=0xffffff8e) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='smaps\x00') ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000500)={{0x0, 0x3, 0x4, 0x3, 0x8}, 0x18, 0x2, 0x9}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="40000010b9b82bd47668c7379f01000000000000000000a3a533f73840d7ddce9f800ad27f3be72f0fd2d40b259b109f75c59125c6d0e6d660a2ea109a92bdaad50c8c285310f0d345ec12a2d94d6116d515ec6dfce411cd1116fa2cc07503004ab550c30911d6b9791295ae3909161e3e58d21f48f537bc3ddef48c1d703581688d09d10fd19b03d368e17cc0463e1d5870b433ab8085fb8318e369e7de549d50a3cf018de4a44e343f306e3671259658609fc7c24b41d24e7f2dd284d2c100069dc4f62800000000000000000000000000002055e58786d120dfe6f25be689fbfe6d47982ff4f5c2b8122c129995f6f49b580b1350b18a6e63b97cd77182c1c5b6425531b6faa92fefbee5d8da82ceb932fbedf505300c822fbe1e4172ce56c05d8fd082e1a42d4708a42c46a3532b00000000000000000000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') gettid() setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000140)={0x9, 0x0, 0x7, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@int=0xfe00000000000000, 0x4) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") 2018/05/08 19:18:50 executing program 4: socket$inet6(0xa, 0x80003, 0x0) r0 = perf_event_open(&(0x7f0000bba000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f00000003c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(r2, 0x0, &(0x7f0000000040)=0xffffff8e) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='smaps\x00') ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000500)={{0x0, 0x3, 0x4, 0x3, 0x8}, 0x18, 0x2, 0x9}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') gettid() setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000140)={0x9, 0x0, 0x7, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@int=0xfe00000000000000, 0x4) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") 2018/05/08 19:18:50 executing program 2: socket$inet6(0xa, 0x80003, 0x0) r0 = perf_event_open(&(0x7f0000bba000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f00000003c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(r2, 0x0, &(0x7f0000000040)=0xffffff8e) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='smaps\x00') ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000500)={{0x0, 0x3, 0x4, 0x3, 0x8}, 0x18, 0x2, 0x9}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="40000010b9b82bd47668c7379f01000000000000000000a3a533f73840d7ddce9f800ad27f3be72f0fd2d40b259b109f75c59125c6d0e6d660a2ea109a92bdaad50c8c285310f0d345ec12a2d94d6116d515ec6dfce411cd1116fa2cc07503004ab550c30911d6b9791295ae3909161e3e58d21f48f537bc3ddef48c1d703581688d09d10fd19b03d368e17cc0463e1d5870b433ab8085fb8318e369e7de549d50a3cf018de4a44e343f306e3671259658609fc7c24b41d24e7f2dd284d2c100069dc4f62800000000000000000000000000002055e58786d120dfe6f25be689fbfe6d47982ff4f5c2b8122c129995f6f49b580b1350b18a6e63b97cd77182c1c5b6425531b6faa92fefbee5d8da82ceb932fbedf505300c822fbe1e4172ce56c05d8fd082e1a42d4708a42c46a3532b00000000000000000000000000000000000000000000"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') gettid() setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000140)={0x9, 0x0, 0x7, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@int=0xfe00000000000000, 0x4) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") 2018/05/08 19:18:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000caf000)="9c", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$TCXONC(r0, 0x540a, 0x1) 2018/05/08 19:18:50 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000caf000)="9c", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$TCXONC(r0, 0x540a, 0x1) 2018/05/08 19:18:50 executing program 1: socket$inet6(0xa, 0x80003, 0x0) r0 = perf_event_open(&(0x7f0000bba000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f00000003c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bcsf0\x00') accept$packet(r2, 0x0, &(0x7f0000000040)=0xffffff8e) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='smaps\x00') ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000500)={{0x0, 0x3, 0x4, 0x3, 0x8}, 0x18, 0x2, 0x9}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x10) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0xac, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x2}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') gettid() setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000140)={0x9, 0x0, 0x7, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000380)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a402f1265047502f6c2dd9f655a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb050000000000000000000000000044b800e87953ed64ae2f3f5f53c78f80293abf2a8486bd65d593cea221df08495ace8ea1f739deb9394733c7f2a8bc8469c6ab2ec67eeec0f89c726db45b9fbf07b5e70840d3520ab33cd4619123cbd3b6246e1c0fb86835c5a2d52e02d7f8da762ba15a81fafeb2c9549175") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='.', &(0x7f0000000240)='ubifs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@int=0xfe00000000000000, 0x4) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") 2018/05/08 19:18:50 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000caf000)="9c", 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$TCXONC(r0, 0x540a, 0x1) 2018/05/08 19:18:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x10) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) shutdown(r2, 0x1) sendto$inet6(r2, &(0x7f0000000040)="97", 0x1, 0x0, 0x0, 0x0) [ 99.019962] ? sctp_inet6_af_supported+0xf0/0xf0 [ 99.025246] sctp_bind_addr_match+0x18b/0x2f0 [ 99.029757] sctp_addrs_lookup_transport+0x904/0xa20 [ 99.034872] sctp_rcv+0x15e6/0x4d30 [ 99.038510] ? raw_local_deliver+0x63/0x1660 [ 99.042923] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 99.048294] ? raw_local_deliver+0xe2/0x1660 [ 99.052709] ? iptable_nat_ipv4_fn+0xb0/0xb0 [ 99.057125] ? kmsan_set_origin_inline+0x6b/0x120 [ 99.061976] ? sctp_v4_cmp_addr+0x250/0x250 [ 99.066310] ? sctp_csum_combine+0xa0/0xa0 [ 99.070556] ip_local_deliver_finish+0x874/0xec0 [ 99.075324] ip_local_deliver+0x43c/0x4e0 [ 99.079476] ? ip_local_deliver+0x4e0/0x4e0 [ 99.083805] ? ip_call_ra_chain+0x7c0/0x7c0 [ 99.088133] ip_rcv_finish+0xa36/0x1d00 [ 99.092119] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 99.097489] ? nf_hook_slow+0x36f/0x3d0 [ 99.101564] ip_rcv+0x118f/0x16d0 [ 99.105024] ? ip_rcv+0x16d0/0x16d0 [ 99.108672] __netif_receive_skb_core+0x47df/0x4a90 [ 99.113705] ? kmsan_set_origin_inline+0x40/0x120 [ 99.118568] ? ip_local_deliver_finish+0xec0/0xec0 [ 99.123513] process_backlog+0x62d/0xe20 [ 99.127574] ? rps_trigger_softirq+0x2f0/0x2f0 [ 99.132139] net_rx_action+0x7c1/0x1a70 [ 99.136112] ? net_tx_action+0xab0/0xab0 [ 99.140156] __do_softirq+0x56d/0x93d [ 99.143947] ? ksoftirqd_should_run+0x30/0x30 [ 99.148425] run_ksoftirqd+0x1f/0x40 [ 99.152127] smpboot_thread_fn+0x488/0x970 [ 99.156352] ? cpu_report_death+0x1e0/0x1e0 [ 99.160657] kthread+0x539/0x720 [ 99.164008] ? cpu_report_death+0x1e0/0x1e0 [ 99.168318] ? kthread_blkcg+0xf0/0xf0 [ 99.172193] ret_from_fork+0x35/0x40 [ 99.176393] Dumping ftrace buffer: [ 99.179917] (ftrace buffer empty) [ 99.183602] Kernel Offset: disabled [ 99.187227] Rebooting in 86400 seconds..