INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.19' (ECDSA) to the list of known hosts. 2018/04/07 05:33:08 fuzzer started 2018/04/07 05:33:09 dialing manager at 10.128.0.26:38639 2018/04/07 05:33:15 kcov=true, comps=false 2018/04/07 05:33:18 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a3c000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f00003efff4)={0x10, 0x0, 0x0, 0x808000}, 0xc) 2018/04/07 05:33:18 executing program 2: mkdir(&(0x7f0000b7cff8)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000d35ff9)='mqueue\x00', 0x0, &(0x7f000000a000)) keyctl$session_to_parent(0x12) symlink(&(0x7f000085fff4)='./file0/bus\x00', &(0x7f0000e17ff2)='./file0/file0\x00') 2018/04/07 05:33:18 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000449000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000480)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f00000002c0)=0x2) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c05, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000280)) 2018/04/07 05:33:18 executing program 3: r0 = perf_event_open(&(0x7f0000001700)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xf, 0x18, &(0x7f0000000340)="0aac1ac22028f176e0e5504088ca6b", &(0x7f0000000140)=""/24, 0x0, 0x1000000008}, 0x28) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000300)) gettid() setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) r2 = gettid() perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xfffffffffffff514, 0x8, 0x1, 0x1, 0x0, 0xee15e3d, 0x40000, 0x6, 0x1e, 0x4, 0xe2e, 0xfffffffffffffa62, 0x10001, 0x80000000, 0x1, 0x7, 0x7, 0x6058, 0x1, 0x3, 0x7, 0x4, 0x1ff, 0xce26, 0xf348, 0x3, 0x6, 0x3, 0x1, 0x9, 0xff, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x4000000000000, 0x1, @perf_config_ext={0x6, 0x4427}, 0x1, 0x8, 0x5, 0x7, 0x0, 0xffffffffffffff01, 0x10000}, r2, 0xd, r0, 0xa) 2018/04/07 05:33:18 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r1, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) write(r0, &(0x7f0000000040), 0x0) close(r0) 2018/04/07 05:33:18 executing program 5: mlock2(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f0000000ff8), 0x0) mremap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0xe000, 0x3, &(0x7f0000b18000/0xe000)=nil) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, &(0x7f0000b1d000)={&(0x7f0000a93000/0x3000)=nil, 0x20000002, 0x0, 0x0, &(0x7f0000b1c000/0x4000)=nil}) munlock(&(0x7f0000b1e000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000b1d000/0x2000)=nil, 0x2000, 0x5) add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000280)="4a950264658cd1107550b3710e6382cbc21eba9e8be275d2fb5a0068519eb735ba3606e51c1820347147ffc3c328c2a50d997c54ba938b2dc4d9f45d67c05983db900c98d2a0f9b6709224660a27e65d657fef60a74a08a3b2a19284faaa49a66ce49b92ec97632de462747c4b62d9bee0fca959cbb3da7c3c4d995096b65cb015711479c07a04aea699a6644946d25d06f352c15694d9d3f8a345f4c7797a3f21b52a04315685c479bb7868f74c014e18a82e24c044ac", 0xb7, 0xfffffffffffffffd) 2018/04/07 05:33:18 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000040)='-\x00') ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xfff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) 2018/04/07 05:33:18 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000340)={0x0, 0x4, 0x6, 0x0, 0x81, 0x8, 0x6, 0x77e, 0x0, 0x0, 0x2}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000001000)={0x0, {{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}}}, 0x108) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, 0x0, 0x9, 0x70bd25, 0x25dfdbfe, {0xe}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x20004840) writev(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)="1e5b7b1d30859a82aa0b7eb4ad6ebf0634b21e3b0fbbf9b86bbbf64f4ca8d1e3f171e7ec690d308028b3b56716", 0x2d}], 0x1) ioctl$sock_ifreq(r1, 0x8922, &(0x7f0000000400)={'lo\x00', @ifru_ivalue}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000440)=""/173) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000001c0)={@multicast1}, &(0x7f0000000200)=0xc) ioctl$KIOCSOUND(r2, 0x4b2f, 0x100000001) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000000), 0x4) syzkaller login: [ 43.775474] ip (3797) used greatest stack depth: 54672 bytes left [ 44.446681] ip (3860) used greatest stack depth: 54200 bytes left [ 46.881957] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.015582] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.050368] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.078195] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.154205] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.170265] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.274201] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.318139] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.715474] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.832928] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.944333] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.009936] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.031101] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.101944] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.306583] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.396522] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.488954] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.495198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.509924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.538355] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.554243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.574098] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.751884] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.758177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.771720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.811579] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.827270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.848444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.882542] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.889323] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.907394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.945950] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.952218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.963715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.058682] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.065116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.079918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.238341] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.244586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.255141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/07 05:33:35 executing program 0: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0xbffffffffffffffd}], 0x2aaaad81) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x9]) r1 = socket$inet6(0xa, 0x5, 0x0) sched_yield() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000d74000)={@dev={0xfe, 0x80}, 0x0, 0x0, 0x3, 0x9}, 0x20) dup3(r1, r1, 0x4) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x3, r2}) 2018/04/07 05:33:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x1, 0x8972, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000002c0)=0xfea6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa}, 0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000015c0), 0x14) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB]}, 0x1}, 0x0) signalfd4(r0, &(0x7f0000000280)={0x551}, 0x8, 0x80000) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) fchmodat(0xffffffffffffffff, &(0x7f000058f000)='./file0\x00', 0x0) mprotect(&(0x7f000072d000/0x2000)=nil, 0x2000, 0x1000008) sendto$inet6(r2, &(0x7f0000000180)="16ec48b8ef2877bdd6251e22ca0e08b1c5c9b93ae32c55af2448041aedeb3f664d434ca4dca58266fc9ebabdd19f215c045b92b3ff098c6913172aa94a4acb025b29a85cc49ba3eba1e9e127166cde0ead2c3b4348c9f0ba7791dbb2bd46c84d370fb2abac7748e3d81dbbf6385a6015f640790991834b3fb8195e95f9b701a1164e05578e0eacb731dad429d10f65eca9f534f82b04dd5d65", 0x99, 0x4001, &(0x7f0000000240)={0xa, 0x4e24, 0x400, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x80}, 0x1c) mremap(&(0x7f0000676000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000590000/0x4000)=nil) 2018/04/07 05:33:35 executing program 2: mkdir(&(0x7f0000b7cff8)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000d35ff9)='mqueue\x00', 0x0, &(0x7f000000a000)) keyctl$session_to_parent(0x12) symlink(&(0x7f000085fff4)='./file0/bus\x00', &(0x7f0000e17ff2)='./file0/file0\x00') 2018/04/07 05:33:35 executing program 7: socketpair(0x0, 0x0, 0x100000000, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000003000)={0x0, 0x7ffd}, &(0x7f0000001ffc)=0xc) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) ftruncate(r1, 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x11, r1, 0x0) prctl$getreaper(0x66, &(0x7f0000002ffc)) 2018/04/07 05:33:35 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000040)='-\x00') ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xfff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) 2018/04/07 05:33:35 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r1, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) write(r0, &(0x7f0000000040), 0x0) close(r0) 2018/04/07 05:33:35 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='../file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sockfs\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000780), &(0x7f00000007c0)=0x18) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000004e80), &(0x7f0000004ec0)=0x8) 2018/04/07 05:33:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4543(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) 2018/04/07 05:33:35 executing program 0: unshare(0x8000400) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@ipv6_getaddr={0x20, 0x16, 0x820, 0x0, 0x0, {0xa}, [@IFA_FLAGS={0x8, 0x8}]}, 0x20}, 0x1}, 0x800) 2018/04/07 05:33:35 executing program 2: unshare(0x8000400) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000016fe0)={{0x77359400}}, &(0x7f0000000040)) 2018/04/07 05:33:35 executing program 6: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}}, 0x0, {0x2, 0x0, @rand_addr}}) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x41) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b20000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2}]}, 0x10) shutdown(r1, 0x1) 2018/04/07 05:33:35 executing program 7: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000340)={@mcast1={0xff, 0x1, [], 0x1}}, &(0x7f00000000c0)=0x20) 2018/04/07 05:33:35 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00002e8f1e)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d6696b208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8040705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x0, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendto$inet(r1, &(0x7f0000386fa0)='\x00', 0x1, 0x1, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @loopback=0x7f000001}}, 0x0, 0x7, 0x0, "f52ad706f56d0396cd21b3c7dc2d7f20845ac41190a65216ac7d4bb134d03f4b5c72c907ebd37a54061f01c47384d91dd86e97da94655976d59966cbfe35a075156dcd76e80c1ceed7eba92db81434f3"}, 0xd8) mq_getsetattr(r1, &(0x7f0000000000)={0x0, 0x0, 0x9}, 0x0) sendto$inet(r1, &(0x7f00002bff1e)="f9", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) 2018/04/07 05:33:35 executing program 1: r0 = epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0xde5) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000e40)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, &(0x7f0000000ec0)=0x80, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000f00), 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r2, &(0x7f0000000740)={&(0x7f0000000540)=@alg, 0x58, &(0x7f0000000700)=[{&(0x7f00000005c0)=""/31, 0x1f}, {&(0x7f0000000600)=""/193, 0xc1}], 0x349, 0x0, 0x0, 0x803}, 0x20) bind$inet(r2, &(0x7f0000142ff0)={0x2, 0x4e22}, 0x10) sendto$inet(r2, &(0x7f0000000e40), 0xfffffd23, 0x200080c1, &(0x7f0000000000)={0x2, 0x10000000004e22, @loopback=0x7f000001}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x5, 0x5af, [0x0, 0x20000a00, 0x20000b20, 0x20000cf8], 0x0, &(0x7f0000000080), &(0x7f0000002e80)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffcdb92e010000000b000000000000000000697036677265746170300000000000006970366772657461703000000000000000000000000000000000000000000000dec3d32d0f2d0000ff000000aaaaaaaaaabb00ff0000000000007000000070000000c000000049444c4554494d4552000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000001000000ffffffff01000000050000004000000000f87663616e30000000000000000800000065716c00000000000000000000000000697036e40ff390746e6c3000000000000000000064756d6d793000000000000000000000aaaaaa01bc4affaaaaaa00ffff00ffffaaaaaaaaaa0fffff0000ffff00007000fe8f70000000b80000004552524f5200000000000000000000000000000000000000000000000000000020000000000000004f1c94f739bbd96a663e970f8d4891a99dd7ebec6f9ea1fd1943950be120efffffff2100000000000000000000000000000000000000000000000000000000000000000003000000feffffff0000005400000000000000000000000000000000000000000000000000000000000000000000000003000000fcffffff020000000900000004000000080069705f167469300000000000000000006c6f00000000000000000000000000006772653000000000000000001a00000069706464703000000010000000000000aaaaaaaaaabbffffffffffff0180c2200000000000db00ff0000173000cfcde8b30f1b84deb20070000000a0000000434c4153536a4659000000000000250000000000000000000000000000000000080000000000000040010000000000000300000021000000891f73797a6b616c6c65723100000000000073697430040000000000000000ddffff73756e6c3000000000000000000000007663616e300000000000000000000000aaaaaaaaaabbffffaaaaaac6aabb00ff069e5472d1780cf1116aa1c0584eff00ffff0000a0000000d000000000010000737461746500000000000000000000000000000000000000000000000000000008000000000000000700000000000000434c41535349465900000000000000ec00000000000000000000000000000000080000000000000003000000000000007265646972656374000000000000000000000000000000000000000000000000080000faff00000000000000000000009b7f4a5450450ad58151cee99592aa82f9c5d74bb3bfba8fe48699d0598b85c932d5c80fb5f532c5b95e16c0f5aa48cc8200000000f1d2b772a7e93389438085db03b1efe81874534f8174b9b62dbf14ce9fa89d5ab7c5c3e32f02f159b999d8f2e6d052dea4a212eb8f31930539c4850a826409542894c7b587d05a0321cae831669070be4c7726c761ad5045fb44cec7bf182c3dc5720f6a8622844768f552cea3d94f7ff6f987e26ed1136ed4abef041ff88ab2b6ce57e6aa50736e59572d2c53fd93ebbf7b8433a0ed000000000000000000000000000000008224a921f76836f9847ce46cbb3d4023892ef9e28bb92a87cd104b811fc91ca1a5f35310f7dfdbdca70f8b95e2fc2f12eaa9fca0e8f5328e7554d50867c995227f5ebf8d7922b083c589d0b4586268102ab5269623bb590e8038da5adf9e2f68469d12adad703c5df9a10590e39d5605acaab9297f3afb32b028b70057d87dcc2ad6dc35398d4ba1fac6930e2f8f6b12a579c4c6608ddc11d17ce3d737fce9852793b11a4b00a10fdb4a0edfc9be3915dbbc3aa7102505ca465a8e65f9615afaf44ab1bf141148944d524ab6b37d039d404b5d2e17f0cdad6c1f2ff1906e40a978fae60b51cdd493c9e7439f08af3fc4ebfbf3309f18dacf6e92e7777f01186948c2df34225f22d5412ad7e2"]}, 0x627) recvfrom(r2, &(0x7f0000002280)=""/140, 0x8c, 0x100, &(0x7f00000004c0)=@vsock={0x28, 0x0, 0xffffffff, @my=0x1}, 0x80) pipe(&(0x7f0000000a80)) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x40001ff8, 0xd5) recvmsg(r2, &(0x7f0000000a00)={&(0x7f0000000440)=@nfc_llcp, 0x80, &(0x7f0000002200)=[{&(0x7f0000000880)=""/134, 0x86}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000000940)=""/107, 0x14a}, {&(0x7f0000000b40)=""/236, 0xec}, {&(0x7f0000000c40)=""/173, 0xad}, {&(0x7f00000009c0), 0x2db}, {&(0x7f0000000d00)=""/176, 0xb0}, {&(0x7f0000000dc0)=""/13, 0xd}], 0x8, &(0x7f0000000780)=""/248, 0xf8, 0x1}, 0x40000022) sendto$inet(r2, &(0x7f0000000100)="7c5538c256e5a7ec66e5b0885c53f33d52dfaa5059364a62ac9a1815215caf0a6903b23aee21267308dbbdcc9ae0716a468ffb0b566c96d5e63550cc56cf13edfa0f36e52092a40e2f2f4baf6ed2ffc6ada661fff7d4d373b15f438248e99f08fc8eacf93f5fbd5d5c3f11c4d63d3193fae8fa447381f9b77ed8220d177488e3b76493387b4d7b86e7782b7a0fe89373d094db9e5fb79a6c1b685f3cb79fffe59bf8a437f80ead010905bdc27722232aab1f54367d94c0353b09bae5b17564f3d984de2b", 0xc4, 0xd0, &(0x7f0000000200)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/04/07 05:33:35 executing program 3: seccomp(0x1, 0x0, &(0x7f00008c1ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = gettid() timer_create(0x0, &(0x7f00005b6000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f000000b000)={0x77359400}, &(0x7f0000000040), 0x0) 2018/04/07 05:33:35 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x4, 0x610, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000cc0], 0x0, &(0x7f0000000240), &(0x7f0000000cc0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x5, 0x0, 0x0, 'lo\x00', 'bcsf0\x00', 'irlan0\x00', 'ip_vti0\x00', @empty, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x120, 0x120, 0x158, [@statistic={'statistic\x00', 0x18}, @stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2}, [], 0x0, 0x0, 0x0, 0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x680}}}]}}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xffffffffffffffff}}}}, {{{0x5, 0x0, 0x0, 'ifb0\x00', 'erspan0\x00', 'ifb0\x00', 'rose0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x70, 0xd0, 0x120}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', 'bond0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xa0, 0x138, 0x188, [@pkttype={'pkttype\x00', 0x8}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x130, 0x130, 0x180, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @limit={'limit\x00', 0x20}]}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x688) [ 58.775122] audit: type=1326 audit(1523079215.773:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5135 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455259 code=0xffff0000 [ 58.806141] ================================================================== [ 58.813553] BUG: KMSAN: uninit-value in tcp_parse_options+0xd74/0x1a30 2018/04/07 05:33:35 executing program 2: r0 = socket(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0), &(0x7f0000001040)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000e14ff8), &(0x7f00005d8000)=0x8) connect$ipx(r0, &(0x7f0000fb4ff0)={0x4, 0x0, 0x0, "b883805ea817"}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000fb1fa5)="480000001400197f09004b01fd0d8c560a88fffffff7e0060000000000a800a2bc5603ca8164643e8900000028213ee20600d400000000ffff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 58.820217] CPU: 1 PID: 5121 Comm: syz-executor4 Not tainted 4.16.0+ #81 [ 58.827043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.836387] Call Trace: [ 58.838978] dump_stack+0x185/0x1d0 [ 58.842608] ? tcp_parse_options+0xd74/0x1a30 [ 58.847099] kmsan_report+0x142/0x240 [ 58.850897] __msan_warning_32+0x6c/0xb0 [ 58.854964] tcp_parse_options+0xd74/0x1a30 [ 58.859304] tcp_validate_incoming+0x4f1/0x2790 [ 58.863984] tcp_rcv_established+0xf60/0x2bb0 [ 58.868487] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 58.873855] tcp_v4_do_rcv+0x6cd/0xd90 [ 58.877743] ? inet_sk_rx_dst_set+0x2c0/0x2c0 [ 58.882236] __release_sock+0x2d6/0x680 [ 58.886213] release_sock+0x97/0x2a0 [ 58.889935] tcp_sendmsg+0xd6/0x100 [ 58.893564] ? tcp_sendmsg_locked+0x6d20/0x6d20 [ 58.898231] inet_sendmsg+0x48d/0x740 [ 58.902031] ? security_socket_sendmsg+0x9e/0x210 [ 58.906879] ? inet_getname+0x500/0x500 [ 58.910857] SYSC_sendto+0x6c3/0x7e0 [ 58.914576] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 58.920025] ? prepare_exit_to_usermode+0x149/0x3a0 [ 58.925049] SyS_sendto+0x8a/0xb0 [ 58.928502] do_syscall_64+0x309/0x430 [ 58.932392] ? SYSC_getpeername+0x560/0x560 [ 58.936716] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 58.941920] RIP: 0033:0x455259 [ 58.945121] RSP: 002b:00007f0345679c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 58.952825] RAX: ffffffffffffffda RBX: 00007f034567a6d4 RCX: 0000000000455259 [ 58.960087] RDX: 0000000000000001 RSI: 00000000202bff1e RDI: 0000000000000014 [ 58.967350] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000010 [ 58.974619] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 58.981881] R13: 00000000000004f7 R14: 00000000006fa7c8 R15: 0000000000000000 [ 58.989152] [ 58.990771] Uninit was created at: [ 58.994311] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 58.999410] kmsan_kmalloc+0x94/0x100 [ 59.003208] kmsan_slab_alloc+0x11/0x20 [ 59.007180] __kmalloc_node_track_caller+0xaed/0x11c0 [ 59.012364] __alloc_skb+0x2cf/0x9f0 [ 59.016080] sk_stream_alloc_skb+0x17c/0xcf0 [ 59.020486] tcp_sendmsg_locked+0x2cc0/0x6d20 [ 59.024976] tcp_sendmsg+0xb2/0x100 [ 59.028589] inet_sendmsg+0x48d/0x740 [ 59.032366] SYSC_sendto+0x6c3/0x7e0 [ 59.036055] SyS_sendto+0x8a/0xb0 [ 59.039482] do_syscall_64+0x309/0x430 [ 59.043344] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 59.048501] ================================================================== [ 59.055845] Disabling lock debugging due to kernel taint [ 59.061273] Kernel panic - not syncing: panic_on_warn set ... [ 59.061273] [ 59.068612] CPU: 1 PID: 5121 Comm: syz-executor4 Tainted: G B 4.16.0+ #81 [ 59.076723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.086052] Call Trace: [ 59.088630] dump_stack+0x185/0x1d0 [ 59.092251] panic+0x39d/0x940 [ 59.095445] ? tcp_parse_options+0xd74/0x1a30 [ 59.099916] kmsan_report+0x238/0x240 [ 59.103696] __msan_warning_32+0x6c/0xb0 [ 59.107733] tcp_parse_options+0xd74/0x1a30 [ 59.112049] tcp_validate_incoming+0x4f1/0x2790 [ 59.116698] tcp_rcv_established+0xf60/0x2bb0 [ 59.121177] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 59.126517] tcp_v4_do_rcv+0x6cd/0xd90 [ 59.130386] ? inet_sk_rx_dst_set+0x2c0/0x2c0 [ 59.134857] __release_sock+0x2d6/0x680 [ 59.138811] release_sock+0x97/0x2a0 [ 59.142516] tcp_sendmsg+0xd6/0x100 [ 59.146130] ? tcp_sendmsg_locked+0x6d20/0x6d20 [ 59.150779] inet_sendmsg+0x48d/0x740 [ 59.154575] ? security_socket_sendmsg+0x9e/0x210 [ 59.159404] ? inet_getname+0x500/0x500 [ 59.163362] SYSC_sendto+0x6c3/0x7e0 [ 59.167064] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 59.172498] ? prepare_exit_to_usermode+0x149/0x3a0 [ 59.177496] SyS_sendto+0x8a/0xb0 [ 59.180925] do_syscall_64+0x309/0x430 [ 59.184795] ? SYSC_getpeername+0x560/0x560 [ 59.189100] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 59.194266] RIP: 0033:0x455259 [ 59.197433] RSP: 002b:00007f0345679c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 59.205126] RAX: ffffffffffffffda RBX: 00007f034567a6d4 RCX: 0000000000455259 [ 59.212377] RDX: 0000000000000001 RSI: 00000000202bff1e RDI: 0000000000000014 [ 59.219631] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000010 [ 59.226884] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 59.234135] R13: 00000000000004f7 R14: 00000000006fa7c8 R15: 0000000000000000 [ 59.241819] Dumping ftrace buffer: [ 59.245333] (ftrace buffer empty) [ 59.249016] Kernel Offset: disabled [ 59.252617] Rebooting in 86400 seconds..