INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.17' (ECDSA) to the list of known hosts. 2018/04/07 01:42:08 fuzzer started 2018/04/07 01:42:08 dialing manager at 10.128.0.26:38639 2018/04/07 01:42:14 kcov=true, comps=false 2018/04/07 01:42:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) recvfrom$inet(r0, &(0x7f0000000040)=""/149, 0xfffffffffffffef3, 0x0, 0x0, 0xfd69) 2018/04/07 01:42:17 executing program 1: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@generic={0x0, "f07418eb11dd25792616f1e89da489a89f12436d6a6950b1bd1552d0f6452e0e00d99064a07e2487565703c0db63ddcd9fb6055b227ea412c11b17e78b547248b1c0da4568dcb4cf71cd0328cc9bdee5d592e16a4f7468948bf37c3554291a9540e0c63f30f2d7c5175d2879a089284a77e2e2ec9361db88b8a9a4ec17e4"}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000004440)=[{0x10, 0x0, 0x8}], 0x10}}], 0x2, 0x0) 2018/04/07 01:42:17 executing program 7: mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f00000000c0)='./control\x00', 0x1000000) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='./control\x00', 0x81000000) inotify_add_watch(r0, &(0x7f00000001c0)='./control\x00', 0x80000000) 2018/04/07 01:42:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}}}}, &(0x7f0000000040)) 2018/04/07 01:42:17 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xc34, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000ec3ff4)) 2018/04/07 01:42:17 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)=""/183, 0xb7}, 0x0) recvmsg(r0, &(0x7f0000002ec0)={&(0x7f0000000080)=@pppoe={0x0, 0x0, {0x0, @random}}, 0x80, &(0x7f0000001e40), 0x0, &(0x7f0000001ec0)=""/4096, 0xfffffffffffffe5a}, 0x0) recvmsg(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001780)=""/254, 0xfe}, 0x0) 2018/04/07 01:42:17 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x3, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x18}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x78}, 0x1}, 0x0) 2018/04/07 01:42:17 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x3, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x18}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_sa={0x2, 0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x78}, 0x1}, 0x0) syzkaller login: [ 45.437272] ip (3750) used greatest stack depth: 53976 bytes left [ 46.546826] ip (3859) used greatest stack depth: 53960 bytes left [ 48.997496] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.058368] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.067652] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.183497] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.231596] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.273168] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.307990] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 49.369603] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 57.869484] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.952840] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.016213] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.173743] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.252831] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.262886] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.318333] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.368835] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 58.558231] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.564468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.574800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.720221] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.726437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.739556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.797873] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.804635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.814942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.955989] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.962238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.975572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.030748] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.036980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.047559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.080769] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.089792] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.100364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.128943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.146610] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.160329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.182560] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 59.204113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.240945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.805949] raw_sendmsg: syz-executor1 forgot to set AF_INET. Fix it! 2018/04/07 01:42:33 executing program 1: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@generic={0x0, "f07418eb11dd25792616f1e89da489a89f12436d6a6950b1bd1552d0f6452e0e00d99064a07e2487565703c0db63ddcd9fb6055b227ea412c11b17e78b547248b1c0da4568dcb4cf71cd0328cc9bdee5d592e16a4f7468948bf37c3554291a9540e0c63f30f2d7c5175d2879a089284a77e2e2ec9361db88b8a9a4ec17e4"}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000004440)=[{0x10, 0x0, 0x8}], 0x10}}], 0x2, 0x0) 2018/04/07 01:42:34 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="98", 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, 0x1c) sendto$inet6(r0, &(0x7f00008c4fac)='g', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}}}, 0x90) 2018/04/07 01:42:34 executing program 1: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@generic={0x0, "f07418eb11dd25792616f1e89da489a89f12436d6a6950b1bd1552d0f6452e0e00d99064a07e2487565703c0db63ddcd9fb6055b227ea412c11b17e78b547248b1c0da4568dcb4cf71cd0328cc9bdee5d592e16a4f7468948bf37c3554291a9540e0c63f30f2d7c5175d2879a089284a77e2e2ec9361db88b8a9a4ec17e4"}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000004440)=[{0x10, 0x0, 0x8}], 0x10}}], 0x2, 0x0) 2018/04/07 01:42:34 executing program 5: syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001280), 0x0, &(0x7f00000012c0)={[{@subvol={'subvol', 0x3d, [0x79]}, 0x2c}, {@subvol={'subvol', 0x3d, [0x7f]}, 0x2c}]}) 2018/04/07 01:42:34 executing program 1: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@generic={0x0, "f07418eb11dd25792616f1e89da489a89f12436d6a6950b1bd1552d0f6452e0e00d99064a07e2487565703c0db63ddcd9fb6055b227ea412c11b17e78b547248b1c0da4568dcb4cf71cd0328cc9bdee5d592e16a4f7468948bf37c3554291a9540e0c63f30f2d7c5175d2879a089284a77e2e2ec9361db88b8a9a4ec17e4"}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000004440)=[{0x10, 0x0, 0x8}], 0x10}}], 0x2, 0x0) [ 60.334447] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 60.342119] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 2018/04/07 01:42:34 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000640)=""/183}, 0x48) dup2(r0, r1) 2018/04/07 01:42:34 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f0000000a80)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f0000001bc0), 0x0, &(0x7f0000000040)}}], 0x2, 0x41) 2018/04/07 01:42:34 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)="17", 0x0) write$binfmt_elf32(r0, &(0x7f00000016c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{0x3, 0x0, 0x0, 0x0, 0x7f}]}, 0x58) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f0000000580), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) [ 60.511654] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 60.519231] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 60.629240] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 60.636831] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 60.726636] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 60.734195] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 60.784620] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 60.792254] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 60.824925] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 60.832722] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 60.858674] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 60.866245] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 60.875146] netlink: 'syz-executor4': attribute type 29 has an invalid length. [ 60.882744] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 2018/04/07 01:42:34 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(tnepres)\x00'}, 0x35) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x24, 0x21, 0x2ff, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, @u32}, @typed={0x8, 0x17, @str='^\x00'}]}, 0x24}, 0x1}, 0x0) 2018/04/07 01:42:34 executing program 1: sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@generic={0x0, "f07418eb11dd25792616f1e89da489a89f12436d6a6950b1bd1552d0f6452e0e00d99064a07e2487565703c0db63ddcd9fb6055b227ea412c11b17e78b547248b1c0da4568dcb4cf71cd0328cc9bdee5d592e16a4f7468948bf37c3554291a9540e0c63f30f2d7c5175d2879a089284a77e2e2ec9361db88b8a9a4ec17e4"}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000004440)=[{0x10, 0x0, 0x8}], 0x10}}], 0x2, 0x0) 2018/04/07 01:42:34 executing program 7: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e23}], 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x2c, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}]}, &(0x7f00000001c0)=0x10) 2018/04/07 01:42:34 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0xb}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000002c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000040)) 2018/04/07 01:42:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000001480)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1) r1 = gettid() unshare(0x28060400) exit(0x0) syz_open_procfs(r1, &(0x7f0000000040)='ns/ipc\x00') 2018/04/07 01:42:34 executing program 3: r0 = socket(0x10, 0x80000000802, 0x0) write(r0, &(0x7f0000021000)="240000001a0025ffff00000418edfc0e0a0b00000004dc0202ffff0e0800100048186be0", 0x24) 2018/04/07 01:42:34 executing program 2: rt_sigaction(0x24, &(0x7f0000000000), 0x0, 0x8, &(0x7f0000000080)) 2018/04/07 01:42:34 executing program 4: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000500)) 2018/04/07 01:42:35 executing program 6: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) mremap(&(0x7f0000bae000/0x1000)=nil, 0x1000, 0x200000, 0x3, &(0x7f0000dfe000/0x200000)=nil) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) mlock(&(0x7f00007ac000/0x800000)=nil, 0x800000) 2018/04/07 01:42:35 executing program 1: r0 = socket$inet(0x2, 0x0, 0xdc) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@generic={0x0, "f07418eb11dd25792616f1e89da489a89f12436d6a6950b1bd1552d0f6452e0e00d99064a07e2487565703c0db63ddcd9fb6055b227ea412c11b17e78b547248b1c0da4568dcb4cf71cd0328cc9bdee5d592e16a4f7468948bf37c3554291a9540e0c63f30f2d7c5175d2879a089284a77e2e2ec9361db88b8a9a4ec17e4"}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000004440)=[{0x10, 0x0, 0x8}], 0x10}}], 0x2, 0x0) 2018/04/07 01:42:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'gretap0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_deladdr={0x3c, 0x15, 0x613, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LABEL={0x14, 0x3, 'bcsf0\x00'}, @IFA_FLAGS={0x8, 0x8}, @IFA_FLAGS={0x8, 0x8, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x4000004) 2018/04/07 01:42:35 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x11, 0x0, 0x8001) 2018/04/07 01:42:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000000)='.\x00', 0x0, 0x0, &(0x7f0000000040)) 2018/04/07 01:42:36 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x2, 0x4000020030}, 0xc) sendto$inet6(r0, &(0x7f00000002c0)="9526", 0x2, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000280)='h', 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240), 0x20) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000f0cffc), 0x4) write$binfmt_elf64(r0, &(0x7f0000000b40)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) sendto$inet6(r0, &(0x7f00000000c0)='t', 0x1, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000001500)=[{&(0x7f0000000500)="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", 0x3eb}], 0x1) 2018/04/07 01:42:36 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000002900)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000489ff8)={0x9, 0x7fff}, 0x31a) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 2018/04/07 01:42:36 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000380)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000005c0)={0x14, 0x8000026, 0x1ff307543bf68123, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 2018/04/07 01:42:36 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@generic={0x0, "f07418eb11dd25792616f1e89da489a89f12436d6a6950b1bd1552d0f6452e0e00d99064a07e2487565703c0db63ddcd9fb6055b227ea412c11b17e78b547248b1c0da4568dcb4cf71cd0328cc9bdee5d592e16a4f7468948bf37c3554291a9540e0c63f30f2d7c5175d2879a089284a77e2e2ec9361db88b8a9a4ec17e4"}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000004440)=[{0x10, 0x0, 0x8}], 0x10}}], 0x2, 0x0) 2018/04/07 01:42:36 executing program 4: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000500)) 2018/04/07 01:42:36 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000840)=[{0xc, 0x0, 0x8}], 0xc}}], 0x2, 0x0) 2018/04/07 01:42:36 executing program 5: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000500)) 2018/04/07 01:42:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000000)='.\x00', 0x0, 0x0, &(0x7f0000000040)) 2018/04/07 01:42:36 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000002900)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000489ff8)={0x9, 0x7fff}, 0x31a) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 2018/04/07 01:42:36 executing program 3: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)) 2018/04/07 01:42:37 executing program 4: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000500)) 2018/04/07 01:42:37 executing program 1: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@generic={0x0, "f07418eb11dd25792616f1e89da489a89f12436d6a6950b1bd1552d0f6452e0e00d99064a07e2487565703c0db63ddcd9fb6055b227ea412c11b17e78b547248b1c0da4568dcb4cf71cd0328cc9bdee5d592e16a4f7468948bf37c3554291a9540e0c63f30f2d7c5175d2879a089284a77e2e2ec9361db88b8a9a4ec17e4"}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000004440)=[{0x10, 0x0, 0x8}], 0x10}}], 0x2, 0x0) 2018/04/07 01:42:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000000)='.\x00', 0x0, 0x0, &(0x7f0000000040)) 2018/04/07 01:42:37 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000380)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000005c0)={0x14, 0x8000026, 0x1ff307543bf68123, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 2018/04/07 01:42:37 executing program 3: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000500)=[0x0]) 2018/04/07 01:42:37 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="120000000000000005c7e8f9e2b1001e76"]}) 2018/04/07 01:42:37 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000380)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000005c0)={0x14, 0x8000026, 0x1ff307543bf68123, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 2018/04/07 01:42:37 executing program 5: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000500)) 2018/04/07 01:42:37 executing program 1: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f00000002c0)=@generic={0x0, "f07418eb11dd25792616f1e89da489a89f12436d6a6950b1bd1552d0f6452e0e00d99064a07e2487565703c0db63ddcd9fb6055b227ea412c11b17e78b547248b1c0da4568dcb4cf71cd0328cc9bdee5d592e16a4f7468948bf37c3554291a9540e0c63f30f2d7c5175d2879a089284a77e2e2ec9361db88b8a9a4ec17e4"}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000004440)=[{0x10, 0x0, 0x8}], 0x10}}], 0x1, 0x0) 2018/04/07 01:42:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000000)='.\x00', 0x0, 0x0, &(0x7f0000000040)) 2018/04/07 01:42:37 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000cde000)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000780)='/dev/rfkill\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, &(0x7f0000fbf000), &(0x7f0000c53000), &(0x7f0000000180), &(0x7f000025e000)) getdents64(r0, &(0x7f00000000c0)=""/250, 0xfa) getdents64(r0, &(0x7f0000000a00)=""/209, 0xaf) getdents64(r0, &(0x7f0000000b00)=""/1679, 0x68f) 2018/04/07 01:42:37 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000cde000)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, &(0x7f0000fbf000), &(0x7f0000c53000), &(0x7f0000000180), &(0x7f000025e000)) getdents64(r0, &(0x7f00000000c0)=""/250, 0xfa) getdents64(r0, &(0x7f0000000a00)=""/209, 0xaf) getdents64(r0, &(0x7f0000000b00)=""/1679, 0x68f) 2018/04/07 01:42:37 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) r1 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000400), &(0x7f0000000440)=0x10) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0xff}, &(0x7f0000000b00)={0x92a, 0x0, 0x7fff}, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x37ef}, &(0x7f0000000bc0), &(0x7f0000000c40)={&(0x7f0000000c00), 0x8}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x3, [0x301, 0x894, 0x1]}, 0xa) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000008c0), &(0x7f0000000900)=0x8) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], &(0x7f0000000640)=""/224, 0xe0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000100), 0x4) r3 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r4, 0x0) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r0, 0x4c01) 2018/04/07 01:42:37 executing program 1: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) [ 64.154871] print_req_error: I/O error, dev loop0, sector 0 2018/04/07 01:42:38 executing program 0: mq_open(&(0x7f0000000000)='.\x00', 0x0, 0x0, &(0x7f0000000040)) 2018/04/07 01:42:38 executing program 1: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) 2018/04/07 01:42:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000cde000)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000780)='/dev/rfkill\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, &(0x7f0000fbf000), &(0x7f0000c53000), &(0x7f0000000180), &(0x7f000025e000)) getdents64(r0, &(0x7f00000000c0)=""/250, 0xfa) getdents64(r0, &(0x7f0000000a00)=""/209, 0xaf) getdents64(r0, &(0x7f0000000b00)=""/1679, 0x68f) 2018/04/07 01:42:38 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000cde000)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x0, &(0x7f0000fbf000), &(0x7f0000c53000), &(0x7f0000000180), &(0x7f000025e000)) getdents64(r0, &(0x7f00000000c0)=""/250, 0xfa) getdents64(r0, &(0x7f0000000a00)=""/209, 0xaf) getdents64(r0, &(0x7f0000000b00)=""/1679, 0x68f) 2018/04/07 01:42:38 executing program 5: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000500)) 2018/04/07 01:42:38 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='umask=32306162432']) 2018/04/07 01:42:38 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) r1 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000400), &(0x7f0000000440)=0x10) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0xff}, &(0x7f0000000b00)={0x92a, 0x0, 0x7fff}, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x37ef}, &(0x7f0000000bc0), &(0x7f0000000c40)={&(0x7f0000000c00), 0x8}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x3, [0x301, 0x894, 0x1]}, 0xa) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000008c0), &(0x7f0000000900)=0x8) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], &(0x7f0000000640)=""/224, 0xe0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000100), 0x4) r3 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r4, 0x0) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r0, 0x4c01) 2018/04/07 01:42:38 executing program 4: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000500)) 2018/04/07 01:42:38 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) r1 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000400), &(0x7f0000000440)=0x10) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0xff}, &(0x7f0000000b00)={0x92a, 0x0, 0x7fff}, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x37ef}, &(0x7f0000000bc0), &(0x7f0000000c40)={&(0x7f0000000c00), 0x8}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x3, [0x301, 0x894, 0x1]}, 0xa) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000008c0), &(0x7f0000000900)=0x8) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], &(0x7f0000000640)=""/224, 0xe0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000100), 0x4) r3 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r4, 0x0) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r0, 0x4c01) 2018/04/07 01:42:38 executing program 1: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) 2018/04/07 01:42:38 executing program 1: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@generic={0x0, "f07418eb11dd25792616f1e89da489a89f12436d6a6950b1bd1552d0f6452e0e00d99064a07e2487565703c0db63ddcd9fb6055b227ea412c11b17e78b547248b1c0da4568dcb4cf71cd0328cc9bdee5d592e16a4f7468948bf37c3554291a9540e0c63f30f2d7c5175d2879a089284a77e2e2ec9361db88b8a9a4ec17e4"}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000004440)}}], 0x2, 0x0) 2018/04/07 01:42:38 executing program 3: mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) setpgid(0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000001bc0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000540)=""/185, 0xb9}, {&(0x7f0000000600)=""/116, 0x74}, {&(0x7f0000000680)=""/83, 0x53}, {&(0x7f0000000240)=""/7, 0x7}, {&(0x7f0000000700)=""/4096, 0x1000}], 0x5, &(0x7f0000001780)=""/239, 0xef}}, {{&(0x7f0000001880)=@l2, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001900)=""/99, 0x63}, {&(0x7f0000001a80)=""/137, 0x89}], 0x2, &(0x7f0000001b80)=""/21, 0x15, 0x2}}], 0x2, 0x40, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000001c000)) chroot(&(0x7f000009a000)='./file0\x00') r2 = memfd_create(&(0x7f00000002c0)='%:\'vboxnet1\x00', 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r2, 0x28, &(0x7f0000000300)}, 0x10) chdir(&(0x7f0000cd2ff8)='..') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x6, 0x8ce, 0x201, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000400)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440)={r3, 0x4}, &(0x7f0000000480)=0x8) symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000272ff7)='../file0\x00') umount2(&(0x7f0000000180)='../file0\x00', 0x2) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0)={0x0, 0x7fff}, 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="a14b2074ba0bcc7b4630d771439a35065f3f56d03b6a2e480599ff499b3e4431e46c52fe"], 0x24}, 0x1, 0x0, 0x0, 0x91}, 0x0) fcntl$getown(r0, 0x9) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000001c40)=""/201) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fcntl$setflags(r2, 0x2, 0x1) r4 = memfd_create(&(0x7f0000000180)='NETMAP\x00', 0x3) exit(0x10000) openat$cgroup_type(r4, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000001980)=0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000001a00), &(0x7f0000001a40)=0x4) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000280)=0x8c, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'lo\x00', &(0x7f00000019c0)=@ethtool_perm_addr={0x20, 0x5, "28e4edbac6"}}) 2018/04/07 01:42:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00008f6ff9)='mounts\x00') clock_gettime(0x0, &(0x7f0000000080)={0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f00000000c0)={r1}, &(0x7f0000000100), 0x8) clock_gettime(0x0, &(0x7f0000d56000)={0x0, 0x0}) ppoll(&(0x7f0000a18000)=[{r0}], 0x1, &(0x7f000071d000)={0x0, r2+10000000}, &(0x7f0000e33000), 0x8) mount(&(0x7f0000a38ff8)='./file0\x00', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f00008a7000)) umount2(&(0x7f0000d5bfff)='.', 0x0) 2018/04/07 01:42:38 executing program 7: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='illinois\x00', 0x9) writev(r0, &(0x7f0000df9000)=[{&(0x7f0000354ff8)='\'', 0x1}], 0x1) 2018/04/07 01:42:38 executing program 1: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@generic={0x0, "f07418eb11dd25792616f1e89da489a89f12436d6a6950b1bd1552d0f6452e0e00d99064a07e2487565703c0db63ddcd9fb6055b227ea412c11b17e78b547248b1c0da4568dcb4cf71cd0328cc9bdee5d592e16a4f7468948bf37c3554291a9540e0c63f30f2d7c5175d2879a089284a77e2e2ec9361db88b8a9a4ec17e4"}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000004440)}}], 0x2, 0x0) 2018/04/07 01:42:38 executing program 1: r0 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@generic={0x0, "f07418eb11dd25792616f1e89da489a89f12436d6a6950b1bd1552d0f6452e0e00d99064a07e2487565703c0db63ddcd9fb6055b227ea412c11b17e78b547248b1c0da4568dcb4cf71cd0328cc9bdee5d592e16a4f7468948bf37c3554291a9540e0c63f30f2d7c5175d2879a089284a77e2e2ec9361db88b8a9a4ec17e4"}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000004440)}}], 0x2, 0x0) 2018/04/07 01:42:38 executing program 7: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00006a6fe4)=[@in6={0xa, 0x4e23}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0)=0x1, 0x4) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000359fff)="97", 0x1, 0x0, &(0x7f0000aaa000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/07 01:42:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={&(0x7f00000001c0)=@nl=@kern={0x10}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000040)="5500000018007fbdb72d1cb2a4a280930a06000000a8430891de0000390008000aa965866199f356000c00060000001900a30700000000000000dc1338d544009fe1f8aef7ff5afb83de448daa7227c43ab8220000", 0x55}], 0x1, &(0x7f00000000c0)}, 0x0) 2018/04/07 01:42:39 executing program 7: inotify_init1(0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x60000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000480)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000380)={'nat\x00'}, &(0x7f0000000280)=0x54) 2018/04/07 01:42:39 executing program 1: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x20000000000002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000880)='./file0\x00', 0x11) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4689020109ff07000000000000020003000300000c57020000d7004000accef1a111ae0849400000000100000001000000"], 0x34) uselib(&(0x7f0000000140)='./file0\x00') 2018/04/07 01:42:39 executing program 5: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) 2018/04/07 01:42:39 executing program 4: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000500)) 2018/04/07 01:42:39 executing program 6: inotify_init1(0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x60000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000480)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000380)={'nat\x00'}, &(0x7f0000000280)=0x54) 2018/04/07 01:42:39 executing program 1: r0 = add_key(&(0x7f0000943000)='keyring\x00', &(0x7f0000f02ffb)={0x73, 0x79, 0x7a}, &(0x7f00004defd8), 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) keyctl$revoke(0x3, r0) keyctl$get_security(0x11, r1, &(0x7f000027e000)=""/87, 0x7f07bdf4) 2018/04/07 01:42:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) r1 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000400), &(0x7f0000000440)=0x10) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0xff}, &(0x7f0000000b00)={0x92a, 0x0, 0x7fff}, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x37ef}, &(0x7f0000000bc0), &(0x7f0000000c40)={&(0x7f0000000c00), 0x8}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x3, [0x301, 0x894, 0x1]}, 0xa) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000008c0), &(0x7f0000000900)=0x8) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], &(0x7f0000000640)=""/224, 0xe0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000100), 0x4) r3 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r4, 0x0) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r0, 0x4c01) 2018/04/07 01:42:39 executing program 7: inotify_init1(0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x60000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000480)=0x54) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000380)={'nat\x00'}, &(0x7f0000000280)=0x54) 2018/04/07 01:42:39 executing program 1: r0 = add_key(&(0x7f0000943000)='keyring\x00', &(0x7f0000f02ffb)={0x73, 0x79, 0x7a}, &(0x7f00004defd8), 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) keyctl$revoke(0x3, r0) keyctl$get_security(0x11, r1, &(0x7f000027e000)=""/87, 0x7f07bdf4) [ 66.601636] print_req_error: I/O error, dev loop0, sector 0 2018/04/07 01:42:40 executing program 3: mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) setpgid(0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000001bc0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000540)=""/185, 0xb9}, {&(0x7f0000000600)=""/116, 0x74}, {&(0x7f0000000680)=""/83, 0x53}, {&(0x7f0000000240)=""/7, 0x7}, {&(0x7f0000000700)=""/4096, 0x1000}], 0x5, &(0x7f0000001780)=""/239, 0xef}}, {{&(0x7f0000001880)=@l2, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001900)=""/99, 0x63}, {&(0x7f0000001a80)=""/137, 0x89}], 0x2, &(0x7f0000001b80)=""/21, 0x15, 0x2}}], 0x2, 0x40, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000001c000)) chroot(&(0x7f000009a000)='./file0\x00') r2 = memfd_create(&(0x7f00000002c0)='%:\'vboxnet1\x00', 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r2, 0x28, &(0x7f0000000300)}, 0x10) chdir(&(0x7f0000cd2ff8)='..') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x6, 0x8ce, 0x201, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000400)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000440)={r3, 0x4}, &(0x7f0000000480)=0x8) symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000272ff7)='../file0\x00') umount2(&(0x7f0000000180)='../file0\x00', 0x2) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0)={0x0, 0x7fff}, 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="a14b2074ba0bcc7b4630d771439a35065f3f56d03b6a2e480599ff499b3e4431e46c52fe"], 0x24}, 0x1, 0x0, 0x0, 0x91}, 0x0) fcntl$getown(r0, 0x9) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000001c40)=""/201) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fcntl$setflags(r2, 0x2, 0x1) r4 = memfd_create(&(0x7f0000000180)='NETMAP\x00', 0x3) exit(0x10000) openat$cgroup_type(r4, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000001980)=0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000001a00), &(0x7f0000001a40)=0x4) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000280)=0x8c, 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'lo\x00', &(0x7f00000019c0)=@ethtool_perm_addr={0x20, 0x5, "28e4edbac6"}}) 2018/04/07 01:42:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00008f6ff9)='mounts\x00') clock_gettime(0x0, &(0x7f0000000080)={0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f00000000c0)={r1}, &(0x7f0000000100), 0x8) clock_gettime(0x0, &(0x7f0000d56000)={0x0, 0x0}) ppoll(&(0x7f0000a18000)=[{r0}], 0x1, &(0x7f000071d000)={0x0, r2+10000000}, &(0x7f0000e33000), 0x8) mount(&(0x7f0000a38ff8)='./file0\x00', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f00008a7000)) umount2(&(0x7f0000d5bfff)='.', 0x0) 2018/04/07 01:42:40 executing program 1: r0 = add_key(&(0x7f0000943000)='keyring\x00', &(0x7f0000f02ffb)={0x73, 0x79, 0x7a}, &(0x7f00004defd8), 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) keyctl$revoke(0x3, r0) keyctl$get_security(0x11, r1, &(0x7f000027e000)=""/87, 0x7f07bdf4) 2018/04/07 01:42:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)={[{@subvolrootid={'subvolrootid', 0x3d, [0x2d]}, 0x2c}]}) 2018/04/07 01:42:40 executing program 4: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000500)) 2018/04/07 01:42:40 executing program 5: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f000002efe2)=[{0x0, 0x9}], 0x1) semop(r0, &(0x7f000001a000)=[{}, {}], 0x2) semop(r0, &(0x7f0000176ff5)=[{}, {}], 0x2) 2018/04/07 01:42:40 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) r1 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000400), &(0x7f0000000440)=0x10) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0xff}, &(0x7f0000000b00)={0x92a, 0x0, 0x7fff}, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x37ef}, &(0x7f0000000bc0), &(0x7f0000000c40)={&(0x7f0000000c00), 0x8}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x3, [0x301, 0x894, 0x1]}, 0xa) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000008c0), &(0x7f0000000900)=0x8) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], &(0x7f0000000640)=""/224, 0xe0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000100), 0x4) r3 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000d2af88)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r4, 0x0) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r0, 0x4c01) 2018/04/07 01:42:40 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@alu={0x7, 0x3, 0xb, 0x0, 0x0, 0x0, 0xfffffffffffffffc}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x9, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/07 01:42:40 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2881) 2018/04/07 01:42:40 executing program 6: syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f0000000180)='./file0/file0/file0\x00', 0x0, 0x0, &(0x7f0000003f40), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='iocharset=c']) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) 2018/04/07 01:42:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000017a000)=@abs, 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0xc0) recvfrom$unix(r1, &(0x7f0000000000)=""/47, 0x2f, 0x0, &(0x7f00000000c0)=@abs, 0x6e) close(r0) 2018/04/07 01:42:41 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000cab000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="5809d975bcf6eb30a5f0e327e0b1ac788e1db55ae055656cefece1b24e0db53d98057a35dbc03a2d7886bfb832e1ec53adaaede511aefa0f12791e50d48ecc6c06a87117c8f2c218be64718a3af8b043", 0x50}], 0x1, &(0x7f0000000040)}, 0x0) recvmsg(r1, &(0x7f000005efe4)={0x0, 0x0, &(0x7f0000304fe0)=[{&(0x7f00001a6000)=""/167, 0xa7}], 0x1, &(0x7f000084bfe8)=""/24, 0x18}, 0x0) 2018/04/07 01:42:41 executing program 7: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000000fac)={0x0, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) 2018/04/07 01:42:41 executing program 7: ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000000)="493394a91a5a860a229a7a2e0a3da9") r0 = socket$inet(0x2, 0x3, 0x84) sendto$inet(r0, &(0x7f000014cf2c), 0x0, 0x8000, &(0x7f0000000080)={0x2}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x1c, 0x0, &(0x7f00000000c0)={0x2}, 0x10) 2018/04/07 01:42:41 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ipv6_route\x00') r1 = syz_open_dev$urandom(&(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x6) sendfile(r1, r0, &(0x7f0000000000), 0x7fffffff) [ 67.255907] ================================================================== [ 67.263319] BUG: KMSAN: uninit-value in crc32c_pcl_intel_update+0x2af/0x500 [ 67.270417] CPU: 1 PID: 5447 Comm: syz-executor7 Not tainted 4.16.0+ #81 [ 67.277247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.286591] Call Trace: [ 67.289162] [ 67.291321] dump_stack+0x185/0x1d0 [ 67.294958] ? crc32c_pcl_intel_update+0x2af/0x500 [ 67.299885] kmsan_report+0x142/0x240 [ 67.303684] __msan_warning_32+0x6c/0xb0 [ 67.307747] crc32c_pcl_intel_update+0x2af/0x500 [ 67.312510] ? crc32c_intel_cra_init+0x80/0x80 [ 67.317088] crypto_shash_update+0x1e9/0x210 [ 67.321496] crc32c+0x155/0x210 [ 67.324775] sctp_csum_update+0x89/0xa0 [ 67.328748] __skb_checksum+0x234/0x1010 [ 67.332806] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 67.338165] ? __pskb_pull_tail+0x1154/0x22e0 [ 67.342656] ? kmsan_memcpy_origins+0xf1/0x170 [ 67.347231] ? sctp_has_association+0x160/0x160 [ 67.351890] sctp_rcv+0xf4e/0x4c90 [ 67.355428] ? raw_rcv+0x680/0x730 [ 67.358959] ? sctp_has_association+0x160/0x160 [ 67.363617] ? sctp_csum_update+0xa0/0xa0 [ 67.367765] ? sctp_csum_combine+0xa0/0xa0 [ 67.371993] ip_local_deliver_finish+0x6ed/0xd40 [ 67.376748] ip_local_deliver+0x43c/0x4e0 [ 67.380896] ? ip_local_deliver+0x4e0/0x4e0 [ 67.385212] ? ip_call_ra_chain+0x7b0/0x7b0 [ 67.389529] ip_rcv_finish+0x1253/0x16d0 [ 67.393588] ip_rcv+0x119d/0x16f0 [ 67.397037] ? ip_rcv+0x16f0/0x16f0 [ 67.400669] __netif_receive_skb_core+0x47cf/0x4a80 2018/04/07 01:42:41 executing program 6: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "bd3a25", 0x30, 0x11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "7be0cb", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}}}}}}}}, &(0x7f000007c000)) [ 67.405680] ? try_to_wake_up+0x1ab2/0x20a0 [ 67.410000] ? kmsan_internal_memset_shadow_inline+0xd0/0xd0 [ 67.415792] ? ip_local_deliver_finish+0xd40/0xd40 [ 67.420717] process_backlog+0x62d/0xe20 [ 67.424775] ? rps_trigger_softirq+0x2f0/0x2f0 [ 67.429348] net_rx_action+0x7c1/0x1a70 [ 67.433323] ? net_tx_action+0xab0/0xab0 [ 67.437381] __do_softirq+0x56d/0x93d [ 67.441186] do_softirq_own_stack+0x2a/0x40 [ 67.445492] [ 67.447730] __local_bh_enable_ip+0x114/0x140 [ 67.452223] local_bh_enable+0x36/0x40 [ 67.456105] ip_finish_output2+0x124e/0x1380 [ 67.460515] ip_finish_output+0xcb0/0xff0 [ 67.464659] ip_output+0x502/0x5c0 [ 67.468199] ? ip_mc_finish_output+0x3b0/0x3b0 [ 67.472781] ? ip_finish_output+0xff0/0xff0 [ 67.477099] ip_send_skb+0x5f3/0x820 [ 67.480810] ? __ip_local_out+0x5b0/0x5b0 [ 67.484957] ip_push_pending_frames+0x105/0x170 [ 67.489628] raw_sendmsg+0x2960/0x3ed0 [ 67.493526] ? __perf_event_task_sched_in+0x67/0xa40 [ 67.498628] ? perf_event_task_sched_in+0x257/0x2b0 [ 67.503642] ? __perf_event_task_sched_in+0x22d/0xa40 [ 67.508839] ? compat_raw_ioctl+0x100/0x100 [ 67.513160] inet_sendmsg+0x48d/0x740 [ 67.516962] ? security_socket_sendmsg+0x9e/0x210 [ 67.521806] ? inet_getname+0x500/0x500 [ 67.525777] SYSC_sendto+0x6c3/0x7e0 [ 67.529490] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 67.534933] ? prepare_exit_to_usermode+0x149/0x3a0 [ 67.539958] SyS_sendto+0x8a/0xb0 [ 67.543404] do_syscall_64+0x309/0x430 [ 67.547288] ? SYSC_getpeername+0x560/0x560 [ 67.551610] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 67.556786] RIP: 0033:0x455259 [ 67.559963] RSP: 002b:00007f88e31ebc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 67.567663] RAX: ffffffffffffffda RBX: 00007f88e31ec6d4 RCX: 0000000000455259 [ 67.574920] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000013 [ 67.582184] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000010 [ 67.589446] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 67.596706] R13: 00000000000004f7 R14: 00000000006fa7c8 R15: 0000000000000000 [ 67.603964] [ 67.605585] Uninit was stored to memory at: [ 67.609899] kmsan_internal_chain_origin+0x12b/0x210 [ 67.614994] kmsan_memcpy_origins+0x11d/0x170 [ 67.619476] __msan_memcpy+0x19f/0x1f0 [ 67.623352] skb_copy_bits+0x63a/0xdb0 [ 67.627228] __pskb_pull_tail+0x483/0x22e0 [ 67.631454] sctp_rcv+0x673/0x4c90 [ 67.634989] ip_local_deliver_finish+0x6ed/0xd40 [ 67.639736] ip_local_deliver+0x43c/0x4e0 [ 67.643869] ip_rcv_finish+0x1253/0x16d0 [ 67.647913] ip_rcv+0x119d/0x16f0 [ 67.651358] __netif_receive_skb_core+0x47cf/0x4a80 [ 67.656362] process_backlog+0x62d/0xe20 [ 67.660407] net_rx_action+0x7c1/0x1a70 [ 67.664372] __do_softirq+0x56d/0x93d [ 67.668150] Uninit was created at: [ 67.671682] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 67.676686] kmsan_alloc_page+0x82/0xe0 [ 67.680649] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 67.685393] alloc_pages_current+0x6b5/0x970 [ 67.689789] skb_page_frag_refill+0x3ba/0x5e0 [ 67.694270] sk_page_frag_refill+0xa4/0x340 [ 67.698582] __ip_append_data+0x107e/0x3d10 [ 67.702893] ip_append_data+0x2fb/0x440 [ 67.706860] raw_sendmsg+0x287b/0x3ed0 [ 67.710737] inet_sendmsg+0x48d/0x740 [ 67.714527] SYSC_sendto+0x6c3/0x7e0 [ 67.718229] SyS_sendto+0x8a/0xb0 [ 67.721668] do_syscall_64+0x309/0x430 [ 67.725546] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 67.730718] ================================================================== [ 67.738060] Disabling lock debugging due to kernel taint [ 67.743491] Kernel panic - not syncing: panic_on_warn set ... [ 67.743491] [ 67.750844] CPU: 1 PID: 5447 Comm: syz-executor7 Tainted: G B 4.16.0+ #81 [ 67.758972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.768312] Call Trace: [ 67.770884] [ 67.773027] dump_stack+0x185/0x1d0 [ 67.776650] panic+0x39d/0x940 [ 67.779856] ? crc32c_pcl_intel_update+0x2af/0x500 [ 67.784781] kmsan_report+0x238/0x240 [ 67.788577] __msan_warning_32+0x6c/0xb0 [ 67.792631] crc32c_pcl_intel_update+0x2af/0x500 [ 67.797386] ? crc32c_intel_cra_init+0x80/0x80 [ 67.801963] crypto_shash_update+0x1e9/0x210 [ 67.806368] crc32c+0x155/0x210 [ 67.809643] sctp_csum_update+0x89/0xa0 [ 67.813613] __skb_checksum+0x234/0x1010 [ 67.817667] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 67.823021] ? __pskb_pull_tail+0x1154/0x22e0 [ 67.827512] ? kmsan_memcpy_origins+0xf1/0x170 [ 67.832090] ? sctp_has_association+0x160/0x160 [ 67.836749] sctp_rcv+0xf4e/0x4c90 [ 67.840285] ? raw_rcv+0x680/0x730 [ 67.843820] ? sctp_has_association+0x160/0x160 [ 67.848480] ? sctp_csum_update+0xa0/0xa0 [ 67.852625] ? sctp_csum_combine+0xa0/0xa0 [ 67.856854] ip_local_deliver_finish+0x6ed/0xd40 [ 67.861605] ip_local_deliver+0x43c/0x4e0 [ 67.865744] ? ip_local_deliver+0x4e0/0x4e0 [ 67.870059] ? ip_call_ra_chain+0x7b0/0x7b0 [ 67.874372] ip_rcv_finish+0x1253/0x16d0 [ 67.878427] ip_rcv+0x119d/0x16f0 [ 67.881868] ? ip_rcv+0x16f0/0x16f0 [ 67.885492] __netif_receive_skb_core+0x47cf/0x4a80 [ 67.890498] ? try_to_wake_up+0x1ab2/0x20a0 [ 67.894817] ? kmsan_internal_memset_shadow_inline+0xd0/0xd0 [ 67.900608] ? ip_local_deliver_finish+0xd40/0xd40 [ 67.905523] process_backlog+0x62d/0xe20 [ 67.909568] ? rps_trigger_softirq+0x2f0/0x2f0 [ 67.914124] net_rx_action+0x7c1/0x1a70 [ 67.918083] ? net_tx_action+0xab0/0xab0 [ 67.922121] __do_softirq+0x56d/0x93d [ 67.925910] do_softirq_own_stack+0x2a/0x40 [ 67.930206] [ 67.932420] __local_bh_enable_ip+0x114/0x140 [ 67.936892] local_bh_enable+0x36/0x40 [ 67.940755] ip_finish_output2+0x124e/0x1380 [ 67.945157] ip_finish_output+0xcb0/0xff0 [ 67.949297] ip_output+0x502/0x5c0 [ 67.952811] ? ip_mc_finish_output+0x3b0/0x3b0 [ 67.957368] ? ip_finish_output+0xff0/0xff0 [ 67.961665] ip_send_skb+0x5f3/0x820 [ 67.965355] ? __ip_local_out+0x5b0/0x5b0 [ 67.969484] ip_push_pending_frames+0x105/0x170 [ 67.974130] raw_sendmsg+0x2960/0x3ed0 [ 67.978002] ? __perf_event_task_sched_in+0x67/0xa40 [ 67.983090] ? perf_event_task_sched_in+0x257/0x2b0 [ 67.988084] ? __perf_event_task_sched_in+0x22d/0xa40 [ 67.993257] ? compat_raw_ioctl+0x100/0x100 [ 67.997586] inet_sendmsg+0x48d/0x740 [ 68.001382] ? security_socket_sendmsg+0x9e/0x210 [ 68.006235] ? inet_getname+0x500/0x500 [ 68.010203] SYSC_sendto+0x6c3/0x7e0 [ 68.013912] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 68.019349] ? prepare_exit_to_usermode+0x149/0x3a0 [ 68.024365] SyS_sendto+0x8a/0xb0 [ 68.027821] do_syscall_64+0x309/0x430 [ 68.031710] ? SYSC_getpeername+0x560/0x560 [ 68.036032] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 68.041213] RIP: 0033:0x455259 [ 68.044394] RSP: 002b:00007f88e31ebc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 68.052088] RAX: ffffffffffffffda RBX: 00007f88e31ec6d4 RCX: 0000000000455259 [ 68.059334] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000013 [ 68.066576] RBP: 000000000072bea0 R08: 00000000200000c0 R09: 0000000000000010 [ 68.073820] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 68.081066] R13: 00000000000004f7 R14: 00000000006fa7c8 R15: 0000000000000000 [ 68.088726] Dumping ftrace buffer: [ 68.092244] (ftrace buffer empty) [ 68.095926] Kernel Offset: disabled [ 68.099521] Rebooting in 86400 seconds..