INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.1' (ECDSA) to the list of known hosts. 2018/04/09 08:56:58 fuzzer started 2018/04/09 08:56:59 dialing manager at 10.128.0.26:38911 2018/04/09 08:57:05 kcov=true, comps=false 2018/04/09 08:57:07 executing program 0: 2018/04/09 08:57:07 executing program 1: 2018/04/09 08:57:07 executing program 7: 2018/04/09 08:57:07 executing program 4: 2018/04/09 08:57:07 executing program 2: 2018/04/09 08:57:07 executing program 3: 2018/04/09 08:57:08 executing program 5: 2018/04/09 08:57:08 executing program 6: syzkaller login: [ 44.789203] ip (3793) used greatest stack depth: 54312 bytes left [ 45.950892] ip (3901) used greatest stack depth: 54296 bytes left [ 46.161306] ip (3918) used greatest stack depth: 53656 bytes left [ 47.951687] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.126851] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.154707] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.226179] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.260740] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.288881] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.420824] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.447739] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 57.000684] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.221531] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.411008] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.433833] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.592470] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.625649] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.751421] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.763217] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.769545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.778860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.812221] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.021257] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.027932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.035696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.216622] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.229518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.238831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.273875] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.290865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.316867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.410874] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.417263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.436678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.476797] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.485114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.500669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.542112] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.553211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.566775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.788944] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.797253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.807738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/09 08:57:25 executing program 1: 2018/04/09 08:57:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000142ff0)={0x2, 0x4e22}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f00000001c0)={'HL\x00'}, &(0x7f0000000280)=0x1e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000081000000990cae9cea3c3f2541f2617dcc9c765a470befcd1f8dfcfa0ad201f96927cc3a9aa6ee93aa3c003f862f539d9a558df950b774250a85d200080b25ffc464ca5f7ad8892405001ae319d031c5f36b2d28666e7c98fd32efa48139bdad58586f8a73a8960700000081709602c437b2da53fc3eeb256a0257e08bda24e08776e3f88d00000000010000000000000000000000308d3ad57cfb0d5868534cca9f58af3a8b3554001010adf3aec9b2062927db465146da9b5e7015fdc920697d2945f0a5f6af"], &(0x7f0000000180)=0x1) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000000000003}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3a, &(0x7f0000000240), &(0x7f0000000200)=0x3d1) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000440)) sendto$inet(r0, &(0x7f0000243fca), 0xfffffffffffffd2d, 0x200080c4, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x40001ff8, 0xd5) getsockname$inet(r0, &(0x7f0000000040)={0x0, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) sendto(r0, &(0x7f0000000780)="b6a29472d7e60c80a3c986ce40842b98d14dafad58bc4b0dc4f54843d9dbda07d3e2d773f80bf01981ab4f72e1f2554ba6a93185acf11360336f9b07dc8bd85a7aa76805fa6c137a4f0a1e09ee6f3d139adfbfc080f3a343020b9166885367611038f335ca", 0x65, 0x20044085, &(0x7f0000000800)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @broadcast=0xffffffff}, 0x3, 0x3, 0x4, 0x3}}, 0x80) close(r0) 2018/04/09 08:57:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00003ad000)=ANY=[], &(0x7f00008f1ffc), 0x0) recvfrom$llc(r2, &(0x7f0000000180)=""/171, 0xab, 0x60, 0x0, 0x0) [ 59.522921] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/09 08:57:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x9, 0x800000209e1f, 0x8000000001, 0x1}, 0x2c) 2018/04/09 08:57:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000142ff0)={0x2, 0x4e22}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f00000001c0)={'HL\x00'}, &(0x7f0000000280)=0x1e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000081000000990cae9cea3c3f2541f2617dcc9c765a470befcd1f8dfcfa0ad201f96927cc3a9aa6ee93aa3c003f862f539d9a558df950b774250a85d200080b25ffc464ca5f7ad8892405001ae319d031c5f36b2d28666e7c98fd32efa48139bdad58586f8a73a8960700000081709602c437b2da53fc3eeb256a0257e08bda24e08776e3f88d00000000010000000000000000000000308d3ad57cfb0d5868534cca9f58af3a8b3554001010adf3aec9b2062927db465146da9b5e7015fdc920697d2945f0a5f6af"], &(0x7f0000000180)=0x1) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000000000003}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3a, &(0x7f0000000240), &(0x7f0000000200)=0x3d1) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000440)) sendto$inet(r0, &(0x7f0000243fca), 0xfffffffffffffd2d, 0x200080c4, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x40001ff8, 0xd5) getsockname$inet(r0, &(0x7f0000000040)={0x0, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) sendto(r0, &(0x7f0000000780)="b6a29472d7e60c80a3c986ce40842b98d14dafad58bc4b0dc4f54843d9dbda07d3e2d773f80bf01981ab4f72e1f2554ba6a93185acf11360336f9b07dc8bd85a7aa76805fa6c137a4f0a1e09ee6f3d139adfbfc080f3a343020b9166885367611038f335ca", 0x65, 0x20044085, &(0x7f0000000800)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @broadcast=0xffffffff}, 0x3, 0x3, 0x4, 0x3}}, 0x80) close(r0) 2018/04/09 08:57:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000142ff0)={0x2, 0x4e22}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f00000001c0)={'HL\x00'}, &(0x7f0000000280)=0x1e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000081000000990cae9cea3c3f2541f2617dcc9c765a470befcd1f8dfcfa0ad201f96927cc3a9aa6ee93aa3c003f862f539d9a558df950b774250a85d200080b25ffc464ca5f7ad8892405001ae319d031c5f36b2d28666e7c98fd32efa48139bdad58586f8a73a8960700000081709602c437b2da53fc3eeb256a0257e08bda24e08776e3f88d00000000010000000000000000000000308d3ad57cfb0d5868534cca9f58af3a8b3554001010adf3aec9b2062927db465146da9b5e7015fdc920697d2945f0a5f6af"], &(0x7f0000000180)=0x1) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000000000003}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3a, &(0x7f0000000240), &(0x7f0000000200)=0x3d1) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000440)) sendto$inet(r0, &(0x7f0000243fca), 0xfffffffffffffd2d, 0x200080c4, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x40001ff8, 0xd5) getsockname$inet(r0, &(0x7f0000000040)={0x0, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) sendto(r0, &(0x7f0000000780)="b6a29472d7e60c80a3c986ce40842b98d14dafad58bc4b0dc4f54843d9dbda07d3e2d773f80bf01981ab4f72e1f2554ba6a93185acf11360336f9b07dc8bd85a7aa76805fa6c137a4f0a1e09ee6f3d139adfbfc080f3a343020b9166885367611038f335ca", 0x65, 0x20044085, &(0x7f0000000800)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @broadcast=0xffffffff}, 0x3, 0x3, 0x4, 0x3}}, 0x80) close(r0) 2018/04/09 08:57:25 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) sendmmsg(r0, &(0x7f0000005b40)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000440)='w', 0x1}], 0x1, &(0x7f0000000580)}}], 0x1, 0x0) 2018/04/09 08:57:27 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @empty=0x2000000, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={0xac, 0x14, 0x14}}}}}, &(0x7f00000000c0)) 2018/04/09 08:57:27 executing program 7: 2018/04/09 08:57:27 executing program 5: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60110c1100383a00fe80000000000000000000000000004fad3e107e3012a72e34c2edc4ba46a6ffff020000000000000000000000000001010090780000000060cb155d00002f00ff020000000000000000000000000001fe8000000000000000000000000000008df06558eb6a17d18158aff950b672ba436664547d5039fe1c290e613b670cfa3a4fbf3a4daf6e2a0fe2e9c4574e75b8006bab4d0246d5df6a504ceadad9440cbf36f191d8ddc4a48f4d7fbdea8506594fc4e1ac061a2d62ea6642fcc3c5858ac11d1975e231d9c3fd18a6c2baa50c0793a9323787dd0bcdc83afca0"], 0x0) 2018/04/09 08:57:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00003ad000)=ANY=[], &(0x7f00008f1ffc), 0x0) recvfrom$llc(r2, &(0x7f0000000180)=""/171, 0xab, 0x60, 0x0, 0x0) 2018/04/09 08:57:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_GROUP={0x8, 0x1b}, @IFLA_MASTER={0x8, 0xa, 0x9}]}, 0x30}, 0x1}, 0x0) 2018/04/09 08:57:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000142ff0)={0x2, 0x4e22}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f00000001c0)={'HL\x00'}, &(0x7f0000000280)=0x1e) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="6e61740000000000000000000000000081000000990cae9cea3c3f2541f2617dcc9c765a470befcd1f8dfcfa0ad201f96927cc3a9aa6ee93aa3c003f862f539d9a558df950b774250a85d200080b25ffc464ca5f7ad8892405001ae319d031c5f36b2d28666e7c98fd32efa48139bdad58586f8a73a8960700000081709602c437b2da53fc3eeb256a0257e08bda24e08776e3f88d00000000010000000000000000000000308d3ad57cfb0d5868534cca9f58af3a8b3554001010adf3aec9b2062927db465146da9b5e7015fdc920697d2945f0a5f6af"], &(0x7f0000000180)=0x1) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1000000000003}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3a, &(0x7f0000000240), &(0x7f0000000200)=0x3d1) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000440)) sendto$inet(r0, &(0x7f0000243fca), 0xfffffffffffffd2d, 0x200080c4, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x40001ff8, 0xd5) getsockname$inet(r0, &(0x7f0000000040)={0x0, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) sendto(r0, &(0x7f0000000780)="b6a29472d7e60c80a3c986ce40842b98d14dafad58bc4b0dc4f54843d9dbda07d3e2d773f80bf01981ab4f72e1f2554ba6a93185acf11360336f9b07dc8bd85a7aa76805fa6c137a4f0a1e09ee6f3d139adfbfc080f3a343020b9166885367611038f335ca", 0x65, 0x20044085, &(0x7f0000000800)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @broadcast=0xffffffff}, 0x3, 0x3, 0x4, 0x3}}, 0x80) close(r0) 2018/04/09 08:57:27 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x20220003, &(0x7f0000000100)={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/04/09 08:57:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00003ad000)=ANY=[], &(0x7f00008f1ffc), 0x0) recvfrom$llc(r2, &(0x7f0000000180)=""/171, 0xab, 0x60, 0x0, 0x0) [ 61.139558] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 61.160144] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/09 08:57:27 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'ip6gre0\x00'}) [ 61.184454] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 61.188931] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 2018/04/09 08:57:27 executing program 7: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x3f) r1 = socket$inet6(0xa, 0x802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000557fc8)={&(0x7f0000e3aff0)=@in={0x2, 0x4e23}, 0x10, &(0x7f0000b03000)}, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/8, 0x8}, 0x0) 2018/04/09 08:57:27 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x3}, 0x1c) sendmsg(r0, &(0x7f0000007000)={0x0, 0x0, &(0x7f0000000ff0)=[{&(0x7f0000013ffe)="0600", 0x2}], 0x1, &(0x7f0000026000)}, 0x2000c080) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) write(r0, &(0x7f00000001c0)="d09f", 0x2) 2018/04/09 08:57:27 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffff4, 0x800001120000801, &(0x7f0000e45ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/09 08:57:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x38, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x5}, @in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}}}, &(0x7f0000000200)=0x98) 2018/04/09 08:57:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00003ad000)=ANY=[], &(0x7f00008f1ffc), 0x0) recvfrom$llc(r2, &(0x7f0000000180)=""/171, 0xab, 0x60, 0x0, 0x0) 2018/04/09 08:57:27 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xe50) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/09 08:57:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='bond0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) writev(r0, &(0x7f00000046c0)=[{&(0x7f0000003540)="ac790564f61a3684afbf8286cc31d40c487913ac6039209a5f2196d2833d83c88669da92fb9482c87d902275bc639868a59f31758356d0f86b0ca0c29f3f4f2e0dd794dfe98a2504db19364ad236bc294ce4d6f5747a56354ed693e3e00299153229541fad48ba71092a97c47b2e943da0bf511fe83fb8cb8fe4dfb82beee41379cf43cdd6310649bdc9bcc7638f1f864a7be6adeda41f782d34c6a3abd73f90fc51740898954f146e8878260597377bb5f10cf57caf4a7634d93a1facb2499430f3de6c78a6653948afa5d7edc0e9411f26e1deccdf9149d1703d5a46c14d18cd94601ccd3c4076c9a307f076b2d53116842a0196d1cb58310b596b3155bbb849027e1523baedcb74fabcaaf78ae5c4400b39883d65c5a72cfb88e02c3f83f989e9fc352e26081d1fc9a0cad90e9afb9eea1c170c2e44aecf47e1968cc95249ee51b9023627363b927f6d1b8c0c7ea891f2c049839b9f32ac7ece5a77b96838d2a07429d3538e95fc017c62582a00f4e0c4ea9a1b595fd715e133cbbf2b7a55851620a99b7138a2c6be358d7f567b8d8fa331d8d410d3a740ee73a72f181ed727b383daff5b599d79ff843943d8566ec655c19bbe9387f1001c5da7220f9edf20a4f9b600d7fff466b96c0ff9add549995ac0b2d98ba04fb8a7f386b27b397a90f1f52a89af814b0dce9d8e060e58c23ddc1de1ba2f1840dc35173f1581ab73f5eed11a89aad4f12d586b85d7ce7af28579385d4ec8cac5b32da9346c713ec20bca1c4b237d4d3235beca0d74a8d0848e85b3890fbf8d16e6e4c5000f7a8d78dcd9c156edec5e4da80729da93f22e74537158e8b03c107e80de1266495fed2b219657b764ba1f4ff12e049a8c4bc6b1b1e54dd563f3eeedb692d3ff9fdcf3865dba57e62f9e21dd673856ef2e589320f5b78ca4006c6aa4af6781d5cccf85896423831b62fa14afc0763846deeb416abcfea8f8555590a7730ce2643bdced88981b746ee37904901c97e1d8d5b64c3f9e71c3e2f6b9a38fd8457198feddc04f18dc2796e3e0d55e19746e5715d10283f5779ee3cfa9", 0x2f6}, {&(0x7f0000004600)="7be075e4c7bc97de59a60e6d01df45efc6fa920254a93ec1a1c6063b41298dc3cbf4ce95a4eda58578a5c0baae90dc3834bd3180a275b23dd62886c291ad0443c7e8042b5e32c737ccddd7c9f5e96445b62f73ed5bcb6814fbe819399bbc70e32fb8c1129b341c9b59053b669504075796b4487ce5856d756f78986a37bb13bf8923c4", 0x83}], 0x2) 2018/04/09 08:57:27 executing program 4: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f00000002c0)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)=']', 0x1}], 0x1, &(0x7f0000000000)}}], 0x1, 0x1a933eb82a955ada) [ 61.495011] ================================================================== [ 61.496913] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 61.502452] BUG: KMSAN: uninit-value in rawv6_sendmsg+0x4bee/0x4cc0 [ 61.502468] CPU: 1 PID: 5137 Comm: syz-executor5 Not tainted 4.16.0+ #82 [ 61.502474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.502496] Call Trace: [ 61.537993] dump_stack+0x185/0x1d0 [ 61.541638] ? rawv6_sendmsg+0x4bee/0x4cc0 [ 61.545886] kmsan_report+0x142/0x240 [ 61.549701] __msan_warning_32+0x6c/0xb0 [ 61.553777] rawv6_sendmsg+0x4bee/0x4cc0 [ 61.557856] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 61.563329] ? futex_wait_queue_me+0x687/0x710 [ 61.567949] ? compat_rawv6_ioctl+0x30/0x30 [ 61.572280] inet_sendmsg+0x48d/0x740 [ 61.576091] ? security_socket_sendmsg+0x9e/0x210 [ 61.580959] ? inet_getname+0x500/0x500 [ 61.584949] sock_write_iter+0x3b9/0x470 [ 61.589020] ? sock_read_iter+0x480/0x480 [ 61.593183] __vfs_write+0x719/0x910 [ 61.596910] vfs_write+0x463/0x8d0 [ 61.600462] SYSC_write+0x172/0x360 [ 61.604096] SyS_write+0x55/0x80 [ 61.607463] do_syscall_64+0x309/0x430 [ 61.611355] ? SYSC_read+0x360/0x360 [ 61.615080] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 61.620293] RIP: 0033:0x455259 [ 61.623477] RSP: 002b:00007f7ff102dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 61.631185] RAX: ffffffffffffffda RBX: 00007f7ff102e6d4 RCX: 0000000000455259 [ 61.638625] RDX: 0000000000000002 RSI: 00000000200001c0 RDI: 0000000000000013 [ 61.645897] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 61.653173] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 61.660458] R13: 00000000000006b6 R14: 00000000006fd1b0 R15: 0000000000000000 [ 61.667735] [ 61.669363] Uninit was stored to memory at: [ 61.673701] kmsan_internal_chain_origin+0x12b/0x210 [ 61.678818] kmsan_memcpy_origins+0x11d/0x170 [ 61.683325] __msan_memcpy+0x19f/0x1f0 [ 61.687230] skb_copy_bits+0x63a/0xdb0 [ 61.691128] rawv6_sendmsg+0x427e/0x4cc0 [ 61.695201] inet_sendmsg+0x48d/0x740 [ 61.699040] sock_write_iter+0x3b9/0x470 [ 61.703128] __vfs_write+0x719/0x910 [ 61.706851] vfs_write+0x463/0x8d0 [ 61.710396] SYSC_write+0x172/0x360 [ 61.714028] SyS_write+0x55/0x80 [ 61.715964] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 61.717402] do_syscall_64+0x309/0x430 [ 61.717422] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 61.717426] Uninit was created at: [ 61.717441] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 61.717451] kmsan_alloc_page+0x82/0xe0 [ 61.717468] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 61.717480] alloc_pages_current+0x6b5/0x970 [ 61.717490] skb_page_frag_refill+0x3ba/0x5e0 [ 61.717515] sk_page_frag_refill+0xa4/0x340 [ 61.767304] __ip6_append_data+0x1a20/0x4bb0 [ 61.771732] ip6_append_data+0x40e/0x6b0 [ 61.775811] rawv6_sendmsg+0x2787/0x4cc0 [ 61.779876] inet_sendmsg+0x48d/0x740 [ 61.783683] sock_write_iter+0x3b9/0x470 [ 61.787756] __vfs_write+0x719/0x910 [ 61.791476] vfs_write+0x463/0x8d0 [ 61.795020] SYSC_write+0x172/0x360 [ 61.798645] SyS_write+0x55/0x80 [ 61.802008] do_syscall_64+0x309/0x430 [ 61.805897] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 61.811075] ================================================================== [ 61.818424] Disabling lock debugging due to kernel taint [ 61.823870] Kernel panic - not syncing: panic_on_warn set ... [ 61.823870] [ 61.831237] CPU: 1 PID: 5137 Comm: syz-executor5 Tainted: G B 4.16.0+ #82 2018/04/09 08:57:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f00003ad000)=ANY=[], &(0x7f00008f1ffc), 0x0) recvfrom$llc(r2, &(0x7f0000000180)=""/171, 0xab, 0x60, 0x0, 0x0) 2018/04/09 08:57:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'hash\x00', 0x0, 0x0, 'vmac(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000007c0)="81081800001d000000010054409d0954", 0x10) r1 = accept(r0, 0x0, &(0x7f0000000140)) sendmsg$nl_crypto(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)=@upd={0xe0, 0x12, 0x0, 0x0, 0x0, {{'ctr(serpent)\x00'}}}, 0xe0}, 0x1}, 0x0) [ 61.839374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.848726] Call Trace: [ 61.851321] dump_stack+0x185/0x1d0 [ 61.854959] panic+0x39d/0x940 [ 61.858178] ? rawv6_sendmsg+0x4bee/0x4cc0 [ 61.862418] kmsan_report+0x238/0x240 [ 61.866225] __msan_warning_32+0x6c/0xb0 [ 61.870381] rawv6_sendmsg+0x4bee/0x4cc0 [ 61.874448] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 61.879910] ? futex_wait_queue_me+0x687/0x710 [ 61.884523] ? compat_rawv6_ioctl+0x30/0x30 [ 61.888846] inet_sendmsg+0x48d/0x740 [ 61.892654] ? security_socket_sendmsg+0x9e/0x210 [ 61.897504] ? inet_getname+0x500/0x500 [ 61.901490] sock_write_iter+0x3b9/0x470 [ 61.905561] ? sock_read_iter+0x480/0x480 [ 61.909716] __vfs_write+0x719/0x910 [ 61.913446] vfs_write+0x463/0x8d0 [ 61.916996] SYSC_write+0x172/0x360 [ 61.920634] SyS_write+0x55/0x80 [ 61.924002] do_syscall_64+0x309/0x430 [ 61.927899] ? SYSC_read+0x360/0x360 [ 61.931619] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 61.936806] RIP: 0033:0x455259 [ 61.939989] RSP: 002b:00007f7ff102dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 61.947704] RAX: ffffffffffffffda RBX: 00007f7ff102e6d4 RCX: 0000000000455259 [ 61.954977] RDX: 0000000000000002 RSI: 00000000200001c0 RDI: 0000000000000013 [ 61.962248] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 61.969524] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 61.976796] R13: 00000000000006b6 R14: 00000000006fd1b0 R15: 0000000000000000 [ 61.984524] Dumping ftrace buffer: [ 61.988056] (ftrace buffer empty) [ 61.991741] Kernel Offset: disabled [ 61.995348] Rebooting in 86400 seconds..