INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.61' (ECDSA) to the list of known hosts. 2018/04/07 02:31:47 fuzzer started 2018/04/07 02:31:47 dialing manager at 10.128.0.26:38639 2018/04/07 02:31:53 kcov=true, comps=false 2018/04/07 02:31:56 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000480)={@random="b100485caa2a", @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x11, 0xfffffffffffffffc, 0x0, @multicast1=0xe0000001, '\b\a\x00\x00'}}}}}, &(0x7f00000004c0)) 2018/04/07 02:31:56 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') sendfile(r0, r1, &(0x7f0000000180)=0x3ffffd, 0xfffffffffffffffe) 2018/04/07 02:31:56 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000025bfc8)={&(0x7f0000b9343a)={0x10}, 0xc, &(0x7f00005a1000)={&(0x7f0000f7ffa8)=ANY=[@ANYBLOB="3400000019000100ffffffffffffffff02200000ff40fe000000000008000600ab00000008000400", @ANYBLOB="080001007f000001"], 0x2}, 0x1, 0x0, 0x0, 0x4006}, 0x4000000) 2018/04/07 02:31:56 executing program 3: r0 = syz_open_dev$tun(&(0x7f0000a9dff3)='/dev/net/tun\x00', 0x0, 0x6) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={"697036746e6c300000000000fbfffff0", 0xffffffffffffffff}) io_setup(0x100000002, &(0x7f000044bff8)=0x0) io_submit(r1, 0x1, &(0x7f000052afd8)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x400000001, 0x0, r0, &(0x7f0000000280)="00990b0000000026baa5174a4d25adb439c551530c", 0x15}]) 2018/04/07 02:31:56 executing program 4: r0 = socket(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x320, [0x200004c0, 0x0, 0x0, 0x200005b8, 0x200007d8], 0x0, &(0x7f0000000000), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x63, 0x806, 'ip6_vti0\x00', 'ipddp0\x00', 'erspan0\x00', 'syz_tun\x00', @random="6be1019961c6", [], @empty, [], 0x70, 0x70, 0xa0}}, @arpreply={'arpreply\x00', 0xc, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'ip_vti0\x00', 'gre0\x00', 'teql0\x00', 'bcsf0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0xffffffffffffffff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x70, 0xc8, 0xf0}, [@arpreply={'arpreply\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0xfffffffffffffffc}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x6}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4}}, {{{0xd, 0x0, 0x0, 'teql0\x00', 'gretap0\x00', 'teql0\x00', 'syzkaller1\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xd0, 0xd0, 0x100, [@rateest={'rateest\x00', 0x3c, {{'teql0\x00', 'ip6_vti0\x00'}}}]}}, @arpreply={'arpreply\x00', 0xc, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}]}, 0x3d0) 2018/04/07 02:31:56 executing program 6: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='cpuset\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/99, 0x63}], 0x1, 0x0) 2018/04/07 02:31:56 executing program 5: perf_event_open(&(0x7f0000d2af88)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x10001, &(0x7f000087d000/0x1000)=nil, 0x3) 2018/04/07 02:31:56 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f000098cfe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) syzkaller login: [ 43.490619] ip (3768) used greatest stack depth: 54688 bytes left [ 43.593861] ip (3775) used greatest stack depth: 54408 bytes left [ 44.791425] ip (3895) used greatest stack depth: 54200 bytes left [ 46.180236] ip (4019) used greatest stack depth: 53976 bytes left [ 46.861978] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.927950] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.945726] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.981784] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.046510] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.180907] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.226208] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.264732] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.508759] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.543728] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.620765] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.639210] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.744099] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.939246] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.013780] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.156440] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.241947] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.248224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.258536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.303937] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.313397] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.319642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.340513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.369077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.386117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.407775] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.421967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.447108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.486079] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.492279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.513464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.736240] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.742521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.755363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.786650] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.795310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.821116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.995422] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.001747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.010608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/07 02:32:12 executing program 0: 2018/04/07 02:32:12 executing program 7: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)="627269646765300000000000000002b4", 0x10) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x6, 0x4) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/143, &(0x7f00000000c0)=0x342) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/07 02:32:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0x9d}]}, 0x10) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000040)="d9a4583955120c6b174785a5614c351905e4da720c4d3ac4edb9e16ad23771703efbc7d59ce0b35e8831e0520e58491c7e192e3e885af3b8b47e51efca3045439b750c347932d8965e1caf19fd1e678e9e261218483055c30f7f71baea32b8c8026c741e6041ad516bc61a56c7a645644d459a6de385c972390e1397bff6", 0x7e, 0x0, &(0x7f0000000180)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) sendto$inet(r0, &(0x7f00004c3000)='$', 0x1, 0x101, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000140)='&', 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) close(r0) 2018/04/07 02:32:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps\x00') readv(r0, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0xa08}], 0x1) readv(r0, &(0x7f0000d3bff0)=[{&(0x7f00003ce000)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000002200)=[{&(0x7f0000000000)=""/180, 0xb4}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001140)=""/4096, 0x1000}], 0x3) readv(r0, &(0x7f0000002180)=[{&(0x7f0000002340)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000002140)=[{&(0x7f0000002240)=""/175, 0xaf}], 0x1) 2018/04/07 02:32:12 executing program 3: 2018/04/07 02:32:12 executing program 5: 2018/04/07 02:32:12 executing program 6: 2018/04/07 02:32:12 executing program 1: 2018/04/07 02:32:13 executing program 1: 2018/04/07 02:32:13 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000039ff8)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000801ff8)=@abs={0x1}, 0x6) 2018/04/07 02:32:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003300)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)}}, {{&(0x7f0000001300)=@un=@abs={0x1}, 0x8, &(0x7f0000001440), 0x0, &(0x7f0000001480)}}], 0x2, 0x0) 2018/04/07 02:32:13 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') 2018/04/07 02:32:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f000070e000)="2700000014000707060e00f4110f5e00010000930d00000000000000077f001f05ff0300007500", 0x27) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x22011, r1, 0xfffffffffffffffc) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000ed4000)=0x7b, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000d26000)={0x1, &(0x7f0000818000)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) sendto$inet(r2, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x3, &(0x7f000067affc)=0x3, 0x4) write(r2, &(0x7f000026d000)="e94ea623dfe664642daeb133b1f306c9e3ddcb22b357cb0dc5f2b7103a3c05b35f26c57a7ecb3ecc4e8dca2a6af55b6ac02a98f45926e4884ef077ddfe0ab4afe5241aa1b3f7f88eba96a1c08275a27217e1182993530ef1a4d03851a4e619ae69fff6f371c86f03d81a620c5a7a1a8f", 0x70) 2018/04/07 02:32:13 executing program 7: timer_getoverrun(0x0) 2018/04/07 02:32:13 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000200)=[&(0x7f0000ffb000/0x2000)=nil], 0x0, &(0x7f00000004c0)=[0x0], 0x2) 2018/04/07 02:32:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps\x00') readv(r0, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0xa08}], 0x1) readv(r0, &(0x7f0000d3bff0)=[{&(0x7f00003ce000)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000002200)=[{&(0x7f0000000000)=""/180, 0xb4}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001140)=""/4096, 0x1000}], 0x3) readv(r0, &(0x7f0000002180)=[{&(0x7f0000002340)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000002140)=[{&(0x7f0000002240)=""/175, 0xaf}], 0x1) 2018/04/07 02:32:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x400080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000840)) 2018/04/07 02:32:13 executing program 7: r0 = memfd_create(&(0x7f0000000ffe)='$\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r1, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/04/07 02:32:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003300)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)}}, {{&(0x7f0000001300)=@un=@abs={0x1}, 0x8, &(0x7f0000001440), 0x0, &(0x7f0000001480)}}], 0x2, 0x0) 2018/04/07 02:32:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x3}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'ip6gretap0\x00'}) 2018/04/07 02:32:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f000070e000)="2700000014000707060e00f4110f5e00010000930d00000000000000077f001f05ff0300007500", 0x27) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x22011, r1, 0xfffffffffffffffc) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000ed4000)=0x7b, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000d26000)={0x1, &(0x7f0000818000)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) sendto$inet(r2, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x3, &(0x7f000067affc)=0x3, 0x4) write(r2, &(0x7f000026d000)="e94ea623dfe664642daeb133b1f306c9e3ddcb22b357cb0dc5f2b7103a3c05b35f26c57a7ecb3ecc4e8dca2a6af55b6ac02a98f45926e4884ef077ddfe0ab4afe5241aa1b3f7f88eba96a1c08275a27217e1182993530ef1a4d03851a4e619ae69fff6f371c86f03d81a620c5a7a1a8f", 0x70) 2018/04/07 02:32:13 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000039ff8)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000801ff8)=@file={0x1, './file0\x00'}, 0x6e) r2 = fcntl$dupfd(r0, 0x0, r1) dup2(r2, r1) getsockname$llc(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 2018/04/07 02:32:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x8) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00003d1ffc)='bbr\x00', 0x4) sendmmsg(r0, &(0x7f00000025c0)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000010c0)="9421e5271f45907f567d604a09fe27abfa55e2aebecfe4a0aeda13b3d2418870405797686467855ad166a77fa809f72ab92d438b38975596f98c0c03126989f5a4a3fe4878335988dfb98b11d880cc928c21fccdcf2086d98e2ac4ab265ff234ba0a86ee14bbb2bf4cc210f6ca6a5d3d18d3110ac82704ac8a979bebe6ea1a803cb5a21babf0a28c6741f5493a7189c764564aa039257ce92830f1a25bb6fb553231195be0ff72269d4b8503dbb0bc6c23f0341aa626735a002006f6c2b036efa5d1e087ee6181ff", 0xc8}], 0x1}}], 0x1, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) recvfrom$inet(r0, &(0x7f00000000c0)=""/206, 0xce, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f00000001c0)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r0, 0x1) 2018/04/07 02:32:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x4) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000a57fe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) 2018/04/07 02:32:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f657865000000000000959ea0") fsetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f0000002140)='selinux\x00', 0xfd0, 0x0) 2018/04/07 02:32:13 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") flistxattr(r0, &(0x7f0000000040), 0x0) 2018/04/07 02:32:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000090d8b75e67e16b394342abb5158df87ea8984e79c93df7498b2b34796068700e29fbd789f9a031f23e16c96e30baed2961953b057f7a3222943acc4b8cfa4de553f8276731ddeb811efd44ea011e1a0db9074a28a826c88566b89c57cc3cca4aec41d37fa27c8daa19030d03139d0aea71d509d9a20ba7deceb656cc1308d9d1f111b6bd1595486f55e229923be4ed8cbfb78e86280b4cacf386bfa8840afb312a4c520a03b27f805d181bd09ea208931a36e888060a2d") ioctl$fiemap(r0, 0xc020660b, &(0x7f00000002c0)={0x0, 0x4, 0x2, 0x0, 0x1, [{}]}) 2018/04/07 02:32:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f0000000000)=0x3f, 0x4) 2018/04/07 02:32:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) recvmsg(r0, &(0x7f0000ec7000)={&(0x7f0000cf1ff0)=@nfc, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000240)=""/4096, 0x1000}, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r0, 0x8906, &(0x7f0000023ffc)) ioctl$sock_netrom_SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000000c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000080)) 2018/04/07 02:32:13 executing program 6: clone(0x200, &(0x7f0000000040), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000280)) r0 = accept(0xffffffffffffff9c, &(0x7f0000001e00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001e80)=0x80) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty, 0x9}}, 0x0, 0xa, 0x0, 0x7, 0x48}, &(0x7f0000000680)=0x179) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000006c0)={r1, @in={{0x2, 0x0, @loopback=0x7f000001}}}, 0x84) r2 = syz_open_procfs(0x0, &(0x7f000042cff4)='io\x00') read(r2, &(0x7f00000001c0)=""/229, 0xe5) fallocate(0xffffffffffffffff, 0x2, 0x0, 0xfffffffffffffc00) preadv(r2, &(0x7f0000000a00)=[{&(0x7f00000004c0)=""/44, 0x2c}, {&(0x7f0000000780)=""/223, 0xdf}, {&(0x7f0000000880)=""/37, 0x25}, {&(0x7f00000008c0)=""/77, 0x4d}, {&(0x7f0000000940)=""/84, 0x54}, {&(0x7f00000009c0)=""/37, 0x25}], 0x6, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0), 0x4) lseek(r2, 0x0, 0x4) open$dir(&(0x7f0000000080)='./file0\x00', 0x27e, 0x0) 2018/04/07 02:32:13 executing program 2: unshare(0x8000400) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) lseek(r0, 0x0, 0x2) [ 58.860912] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/07 02:32:14 executing program 1: clone(0x200, &(0x7f0000000040), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000280)) r0 = accept(0xffffffffffffff9c, &(0x7f0000001e00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001e80)=0x80) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty, 0x9}}, 0x0, 0xa, 0x0, 0x7, 0x48}, &(0x7f0000000680)=0x179) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000006c0)={r1, @in={{0x2, 0x0, @loopback=0x7f000001}}}, 0x84) r2 = syz_open_procfs(0x0, &(0x7f000042cff4)='io\x00') read(r2, &(0x7f00000001c0)=""/229, 0xe5) fallocate(0xffffffffffffffff, 0x2, 0x0, 0xfffffffffffffc00) preadv(r2, &(0x7f0000000a00)=[{&(0x7f00000004c0)=""/44, 0x2c}, {&(0x7f0000000780)=""/223, 0xdf}, {&(0x7f0000000880)=""/37, 0x25}, {&(0x7f00000008c0)=""/77, 0x4d}, {&(0x7f0000000940)=""/84, 0x54}, {&(0x7f00000009c0)=""/37, 0x25}], 0x6, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0), 0x4) lseek(r2, 0x0, 0x4) open$dir(&(0x7f0000000080)='./file0\x00', 0x27e, 0x0) 2018/04/07 02:32:14 executing program 7: r0 = socket(0x800000000002, 0x2, 0x0) r1 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x2, 0x4) fallocate(r1, 0x0, 0x0, 0x9) sendto$inet(r0, &(0x7f0000eb8000), 0x3bf, 0x8000, &(0x7f0000b1e000)={0x2, 0x4e20}, 0x10) sendfile(r0, r1, &(0x7f0000316ff8), 0x4) 2018/04/07 02:32:14 executing program 3: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) connect$netlink(r0, &(0x7f0000000080)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x4) sendto(r0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x100000001, 0x4) 2018/04/07 02:32:14 executing program 0: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x24, &(0x7f00003efff0)={0x0, 0x0, 0x10000}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(r2, &(0x7f0000df3fcb)=""/128, 0xfffffffffffffefc) 2018/04/07 02:32:14 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000febfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000fe9000)="f9", 0x1, 0x0, &(0x7f0000ef8000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000240), 0x8) 2018/04/07 02:32:14 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x1) write(r0, &(0x7f00000001c0)="79b762e12054b8720b87eedb9ce1d2a00ece922ea699e464e7baa19225fbbc74e39ebd5febb27ad9b6c70f482dd35951810f7f772832362bfae92bdef57fc1e5b5bad90bc880c2b10ae89f58f8f96081733559b768285ed57c52de8f70f9d7286c898f8d05c315c5dd9f1959ae1ae59a4c5ec9898cf840c6235df2dc85dff33fb95c9ec668b9c0372f0eb4b85f2686259a9a476acad5e52a9d15c854cfdab2b8d21248148e2f484c561b4cc15831a543f0caed4eb1a611668a53b6da45d19d43f2283ab98f4c4cc0e9f7bb14c0b33a0c143d6bbf45c6c7f645bfd564dd7867629f2ddaef2b4e816419c67d2608d92f727c77c645789e4f304f304b0926833568c909f7460bae36128bd4c469", 0x10c) shmget(0x3, 0x3000, 0x600, &(0x7f0000ffa000/0x3000)=nil) 2018/04/07 02:32:14 executing program 6: clone(0x200, &(0x7f0000000040), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000dacfc9)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000280)) r0 = accept(0xffffffffffffff9c, &(0x7f0000001e00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001e80)=0x80) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty, 0x9}}, 0x0, 0xa, 0x0, 0x7, 0x48}, &(0x7f0000000680)=0x179) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000006c0)={r1, @in={{0x2, 0x0, @loopback=0x7f000001}}}, 0x84) r2 = syz_open_procfs(0x0, &(0x7f000042cff4)='io\x00') read(r2, &(0x7f00000001c0)=""/229, 0xe5) fallocate(0xffffffffffffffff, 0x2, 0x0, 0xfffffffffffffc00) preadv(r2, &(0x7f0000000a00)=[{&(0x7f00000004c0)=""/44, 0x2c}, {&(0x7f0000000780)=""/223, 0xdf}, {&(0x7f0000000880)=""/37, 0x25}, {&(0x7f00000008c0)=""/77, 0x4d}, {&(0x7f0000000940)=""/84, 0x54}, {&(0x7f00000009c0)=""/37, 0x25}], 0x6, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0), 0x4) lseek(r2, 0x0, 0x4) open$dir(&(0x7f0000000080)='./file0\x00', 0x27e, 0x0) 2018/04/07 02:32:14 executing program 5: renameat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000b4efab)="5500000018007fafb7a41cb22da280000206000000a843096c37236939000900210003004b00ca8a9848a3090000006b7b31afdc1338d54400009b84136ef75afb83de4411006827c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000004000)}, 0x0) [ 59.903135] ================================================================== [ 59.910539] BUG: KMSAN: uninit-value in fib_create_info+0x554/0x8d20 [ 59.917033] CPU: 1 PID: 5197 Comm: syz-executor5 Not tainted 4.16.0+ #81 [ 59.923866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.933208] Call Trace: [ 59.935796] dump_stack+0x185/0x1d0 [ 59.939427] ? fib_create_info+0x554/0x8d20 [ 59.943746] kmsan_report+0x142/0x240 [ 59.947546] __msan_warning_32+0x6c/0xb0 2018/04/07 02:32:14 executing program 0: r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv6_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0xa, 0x10, 0x0, 0x0, 0xff}}, 0x1c}, 0x1}, 0x0) [ 59.951604] fib_create_info+0x554/0x8d20 [ 59.955758] ? save_stack_trace+0xa5/0xf0 [ 59.959905] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 59.965358] ? kmsan_set_origin_inline+0x6b/0x120 [ 59.970219] ? __msan_poison_alloca+0x15c/0x1d0 [ 59.974892] ? inet_rtm_newroute+0x210/0x340 [ 59.979303] ? fib_table_insert+0xbc/0x2820 [ 59.983627] fib_table_insert+0x3b6/0x2820 [ 59.987876] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 59.993244] ? fib_new_table+0x247/0x670 [ 59.997310] inet_rtm_newroute+0x210/0x340 [ 60.001553] ? fib_del_ifaddr+0x35c0/0x35c0 [ 60.005878] rtnetlink_rcv_msg+0xa32/0x1560 [ 60.010205] ? SyS_sendmsg+0x54/0x80 [ 60.013919] ? netlink_sendmsg+0x9a6/0x1310 [ 60.018241] ? ___sys_sendmsg+0xec0/0x1310 [ 60.022475] ? SYSC_sendmsg+0x2a3/0x3d0 [ 60.026446] ? SyS_sendmsg+0x54/0x80 [ 60.030159] ? do_syscall_64+0x309/0x430 [ 60.034223] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 60.039585] ? __msan_poison_alloca+0x15c/0x1d0 [ 60.044248] ? _raw_spin_unlock_bh+0x57/0x70 [ 60.048657] ? __local_bh_enable_ip+0x3b/0x140 2018/04/07 02:32:15 executing program 7: r0 = socket(0x800000000002, 0x2, 0x0) r1 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x2, 0x4) fallocate(r1, 0x0, 0x0, 0x9) sendto$inet(r0, &(0x7f0000eb8000), 0x3bf, 0x8000, &(0x7f0000b1e000)={0x2, 0x4e20}, 0x10) sendfile(r0, r1, &(0x7f0000316ff8), 0x4) [ 60.053231] ? _raw_spin_unlock_bh+0x57/0x70 [ 60.057636] ? kmsan_set_origin_inline+0x6b/0x120 [ 60.062481] ? kmsan_set_origin+0x9e/0x160 [ 60.066716] netlink_rcv_skb+0x355/0x5f0 [ 60.070781] ? rtnetlink_bind+0x120/0x120 [ 60.074932] rtnetlink_rcv+0x50/0x60 [ 60.078645] netlink_unicast+0x1672/0x1750 [ 60.082889] ? rtnetlink_net_exit+0xa0/0xa0 [ 60.087214] netlink_sendmsg+0x1048/0x1310 [ 60.091455] ? netlink_getsockopt+0xc80/0xc80 [ 60.095952] ___sys_sendmsg+0xec0/0x1310 [ 60.100019] ? __fdget+0x4e/0x60 [ 60.103406] SYSC_sendmsg+0x2a3/0x3d0 [ 60.107216] SyS_sendmsg+0x54/0x80 [ 60.110753] do_syscall_64+0x309/0x430 [ 60.114643] ? ___sys_sendmsg+0x1310/0x1310 [ 60.118972] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 60.124170] RIP: 0033:0x455259 [ 60.127368] RSP: 002b:00007f90bc389c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 60.135075] RAX: ffffffffffffffda RBX: 00007f90bc38a6d4 RCX: 0000000000455259 [ 60.142339] RDX: 0000000000000000 RSI: 000000002000bfc8 RDI: 0000000000000013 [ 60.149599] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 60.156864] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 60.164123] R13: 00000000000004cc R14: 00000000006fa3c0 R15: 0000000000000000 [ 60.171386] [ 60.173006] Uninit was created at: [ 60.176551] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 60.181656] kmsan_kmalloc+0x94/0x100 [ 60.185456] kmsan_slab_alloc+0x11/0x20 [ 60.189434] __kmalloc_node_track_caller+0xaed/0x11c0 [ 60.194622] __alloc_skb+0x2cf/0x9f0 [ 60.198333] netlink_sendmsg+0x9a6/0x1310 [ 60.202474] ___sys_sendmsg+0xec0/0x1310 [ 60.206533] SYSC_sendmsg+0x2a3/0x3d0 [ 60.210332] SyS_sendmsg+0x54/0x80 [ 60.213864] do_syscall_64+0x309/0x430 [ 60.217750] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 60.222923] ================================================================== [ 60.230265] Disabling lock debugging due to kernel taint [ 60.235700] Kernel panic - not syncing: panic_on_warn set ... [ 60.235700] [ 60.243062] CPU: 1 PID: 5197 Comm: syz-executor5 Tainted: G B 4.16.0+ #81 [ 60.251193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 60.260536] Call Trace: [ 60.263125] dump_stack+0x185/0x1d0 [ 60.266757] panic+0x39d/0x940 [ 60.269968] ? fib_create_info+0x554/0x8d20 [ 60.274282] kmsan_report+0x238/0x240 [ 60.278079] __msan_warning_32+0x6c/0xb0 [ 60.282145] fib_create_info+0x554/0x8d20 [ 60.286301] ? save_stack_trace+0xa5/0xf0 [ 60.290444] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 60.295892] ? kmsan_set_origin_inline+0x6b/0x120 [ 60.300735] ? __msan_poison_alloca+0x15c/0x1d0 [ 60.305410] ? inet_rtm_newroute+0x210/0x340 [ 60.309822] ? fib_table_insert+0xbc/0x2820 [ 60.314151] fib_table_insert+0x3b6/0x2820 [ 60.318379] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 60.323737] ? fib_new_table+0x247/0x670 [ 60.327793] inet_rtm_newroute+0x210/0x340 [ 60.332025] ? fib_del_ifaddr+0x35c0/0x35c0 [ 60.336341] rtnetlink_rcv_msg+0xa32/0x1560 [ 60.340659] ? SyS_sendmsg+0x54/0x80 [ 60.344367] ? netlink_sendmsg+0x9a6/0x1310 [ 60.348688] ? ___sys_sendmsg+0xec0/0x1310 [ 60.352919] ? SYSC_sendmsg+0x2a3/0x3d0 [ 60.356876] ? SyS_sendmsg+0x54/0x80 [ 60.360570] ? do_syscall_64+0x309/0x430 [ 60.364627] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 60.369980] ? __msan_poison_alloca+0x15c/0x1d0 [ 60.374640] ? _raw_spin_unlock_bh+0x57/0x70 [ 60.379046] ? __local_bh_enable_ip+0x3b/0x140 [ 60.383622] ? _raw_spin_unlock_bh+0x57/0x70 [ 60.388024] ? kmsan_set_origin_inline+0x6b/0x120 [ 60.392868] ? kmsan_set_origin+0x9e/0x160 [ 60.397098] netlink_rcv_skb+0x355/0x5f0 [ 60.401152] ? rtnetlink_bind+0x120/0x120 [ 60.405290] rtnetlink_rcv+0x50/0x60 [ 60.409000] netlink_unicast+0x1672/0x1750 [ 60.413242] ? rtnetlink_net_exit+0xa0/0xa0 [ 60.417564] netlink_sendmsg+0x1048/0x1310 [ 60.421803] ? netlink_getsockopt+0xc80/0xc80 [ 60.426293] ___sys_sendmsg+0xec0/0x1310 [ 60.430353] ? __fdget+0x4e/0x60 [ 60.433724] SYSC_sendmsg+0x2a3/0x3d0 [ 60.437528] SyS_sendmsg+0x54/0x80 [ 60.441064] do_syscall_64+0x309/0x430 [ 60.444939] ? ___sys_sendmsg+0x1310/0x1310 [ 60.449249] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 60.454419] RIP: 0033:0x455259 [ 60.457596] RSP: 002b:00007f90bc389c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 60.465296] RAX: ffffffffffffffda RBX: 00007f90bc38a6d4 RCX: 0000000000455259 [ 60.472552] RDX: 0000000000000000 RSI: 000000002000bfc8 RDI: 0000000000000013 [ 60.479809] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 60.487066] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 60.494322] R13: 00000000000004cc R14: 00000000006fa3c0 R15: 0000000000000000 [ 60.502010] Dumping ftrace buffer: [ 60.505525] (ftrace buffer empty) [ 60.509207] Kernel Offset: disabled [ 60.512806] Rebooting in 86400 seconds..