INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.4' (ECDSA) to the list of known hosts. 2018/04/10 20:32:02 fuzzer started 2018/04/10 20:32:02 dialing manager at 10.128.0.26:40599 2018/04/10 20:32:08 kcov=true, comps=false 2018/04/10 20:32:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) 2018/04/10 20:32:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)) close(r0) 2018/04/10 20:32:11 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:11 executing program 3: r0 = getpid() prctl$setptracer(0x59616d61, r0) 2018/04/10 20:32:11 executing program 5: 2018/04/10 20:32:11 executing program 6: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000003500), 0x0, &(0x7f0000003600)={[{@type={'type', 0x3d, "b870a4af"}, 0x2c}]}) 2018/04/10 20:32:11 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup2(r0, r1) 2018/04/10 20:32:11 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x0) syzkaller login: [ 42.851924] ip (3684) used greatest stack depth: 54688 bytes left [ 43.174725] ip (3715) used greatest stack depth: 54672 bytes left [ 43.934438] ip (3785) used greatest stack depth: 53960 bytes left [ 46.574348] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.602792] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.653616] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.798331] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.826018] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.844265] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.858111] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.878018] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.566843] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.714532] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.780013] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.836335] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.875248] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.928006] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.037216] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.050700] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.338017] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.344359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.355879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.549928] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.556223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.569604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.593563] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.608133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.632394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.657858] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.665801] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.674202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.686885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.728534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.751750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.775852] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.785318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.811655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.839179] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.850122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.883837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.937429] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.944008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.955656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/10 20:32:28 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000001540), 0x0) 2018/04/10 20:32:29 executing program 0: 2018/04/10 20:32:29 executing program 5: 2018/04/10 20:32:29 executing program 4: 2018/04/10 20:32:29 executing program 3: 2018/04/10 20:32:29 executing program 2: 2018/04/10 20:32:29 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:29 executing program 6: 2018/04/10 20:32:29 executing program 1: 2018/04/10 20:32:29 executing program 2: 2018/04/10 20:32:29 executing program 5: 2018/04/10 20:32:29 executing program 4: 2018/04/10 20:32:29 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:29 executing program 0: 2018/04/10 20:32:29 executing program 3: 2018/04/10 20:32:29 executing program 6: 2018/04/10 20:32:29 executing program 1: 2018/04/10 20:32:29 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:29 executing program 4: 2018/04/10 20:32:29 executing program 6: 2018/04/10 20:32:29 executing program 2: 2018/04/10 20:32:29 executing program 5: 2018/04/10 20:32:29 executing program 0: 2018/04/10 20:32:29 executing program 3: 2018/04/10 20:32:29 executing program 3: 2018/04/10 20:32:29 executing program 4: 2018/04/10 20:32:29 executing program 1: 2018/04/10 20:32:29 executing program 5: 2018/04/10 20:32:29 executing program 2: 2018/04/10 20:32:29 executing program 0: 2018/04/10 20:32:29 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:29 executing program 6: 2018/04/10 20:32:29 executing program 4: 2018/04/10 20:32:30 executing program 5: 2018/04/10 20:32:30 executing program 1: 2018/04/10 20:32:30 executing program 3: 2018/04/10 20:32:30 executing program 2: 2018/04/10 20:32:30 executing program 0: 2018/04/10 20:32:30 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:30 executing program 4: 2018/04/10 20:32:30 executing program 6: 2018/04/10 20:32:30 executing program 1: 2018/04/10 20:32:30 executing program 5: 2018/04/10 20:32:30 executing program 3: 2018/04/10 20:32:30 executing program 0: 2018/04/10 20:32:30 executing program 2: 2018/04/10 20:32:30 executing program 5: 2018/04/10 20:32:30 executing program 6: 2018/04/10 20:32:30 executing program 1: 2018/04/10 20:32:30 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:30 executing program 4: 2018/04/10 20:32:30 executing program 3: 2018/04/10 20:32:30 executing program 0: 2018/04/10 20:32:30 executing program 5: 2018/04/10 20:32:30 executing program 2: 2018/04/10 20:32:30 executing program 6: 2018/04/10 20:32:30 executing program 0: 2018/04/10 20:32:30 executing program 3: 2018/04/10 20:32:30 executing program 2: 2018/04/10 20:32:30 executing program 5: 2018/04/10 20:32:30 executing program 4: 2018/04/10 20:32:30 executing program 1: 2018/04/10 20:32:30 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:31 executing program 5: 2018/04/10 20:32:31 executing program 4: 2018/04/10 20:32:31 executing program 3: 2018/04/10 20:32:31 executing program 6: 2018/04/10 20:32:31 executing program 0: 2018/04/10 20:32:31 executing program 2: 2018/04/10 20:32:31 executing program 1: 2018/04/10 20:32:31 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:31 executing program 4: 2018/04/10 20:32:31 executing program 5: 2018/04/10 20:32:31 executing program 3: 2018/04/10 20:32:31 executing program 6: 2018/04/10 20:32:31 executing program 4: 2018/04/10 20:32:31 executing program 0: 2018/04/10 20:32:31 executing program 1: 2018/04/10 20:32:31 executing program 2: 2018/04/10 20:32:31 executing program 6: 2018/04/10 20:32:31 executing program 3: 2018/04/10 20:32:31 executing program 5: 2018/04/10 20:32:31 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:31 executing program 1: 2018/04/10 20:32:31 executing program 0: 2018/04/10 20:32:31 executing program 2: 2018/04/10 20:32:31 executing program 6: 2018/04/10 20:32:31 executing program 3: 2018/04/10 20:32:31 executing program 4: 2018/04/10 20:32:31 executing program 6: 2018/04/10 20:32:31 executing program 5: 2018/04/10 20:32:31 executing program 1: 2018/04/10 20:32:31 executing program 0: 2018/04/10 20:32:31 executing program 4: 2018/04/10 20:32:31 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:31 executing program 1: 2018/04/10 20:32:31 executing program 6: 2018/04/10 20:32:31 executing program 3: 2018/04/10 20:32:31 executing program 5: 2018/04/10 20:32:31 executing program 0: 2018/04/10 20:32:31 executing program 2: 2018/04/10 20:32:32 executing program 0: 2018/04/10 20:32:32 executing program 5: 2018/04/10 20:32:32 executing program 3: 2018/04/10 20:32:32 executing program 4: 2018/04/10 20:32:32 executing program 2: 2018/04/10 20:32:32 executing program 6: 2018/04/10 20:32:32 executing program 1: 2018/04/10 20:32:32 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:32 executing program 5: 2018/04/10 20:32:32 executing program 0: 2018/04/10 20:32:32 executing program 3: 2018/04/10 20:32:32 executing program 4: 2018/04/10 20:32:32 executing program 6: 2018/04/10 20:32:32 executing program 1: 2018/04/10 20:32:32 executing program 2: 2018/04/10 20:32:32 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:32 executing program 0: 2018/04/10 20:32:32 executing program 3: 2018/04/10 20:32:32 executing program 5: 2018/04/10 20:32:32 executing program 4: 2018/04/10 20:32:32 executing program 0: 2018/04/10 20:32:32 executing program 2: 2018/04/10 20:32:32 executing program 6: 2018/04/10 20:32:32 executing program 1: 2018/04/10 20:32:32 executing program 5: 2018/04/10 20:32:32 executing program 3: 2018/04/10 20:32:32 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:32 executing program 6: 2018/04/10 20:32:32 executing program 2: 2018/04/10 20:32:33 executing program 4: 2018/04/10 20:32:33 executing program 0: 2018/04/10 20:32:33 executing program 1: 2018/04/10 20:32:33 executing program 3: 2018/04/10 20:32:33 executing program 5: 2018/04/10 20:32:33 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:33 executing program 2: 2018/04/10 20:32:33 executing program 6: 2018/04/10 20:32:33 executing program 5: 2018/04/10 20:32:33 executing program 4: 2018/04/10 20:32:33 executing program 1: 2018/04/10 20:32:33 executing program 0: 2018/04/10 20:32:33 executing program 3: 2018/04/10 20:32:33 executing program 6: 2018/04/10 20:32:33 executing program 2: 2018/04/10 20:32:33 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:33 executing program 5: 2018/04/10 20:32:33 executing program 1: 2018/04/10 20:32:33 executing program 4: 2018/04/10 20:32:33 executing program 3: 2018/04/10 20:32:33 executing program 6: 2018/04/10 20:32:33 executing program 0: 2018/04/10 20:32:33 executing program 1: 2018/04/10 20:32:33 executing program 0: 2018/04/10 20:32:33 executing program 2: 2018/04/10 20:32:33 executing program 3: 2018/04/10 20:32:33 executing program 5: 2018/04/10 20:32:33 executing program 4: 2018/04/10 20:32:33 executing program 7: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:33 executing program 6: 2018/04/10 20:32:33 executing program 2: 2018/04/10 20:32:33 executing program 3: 2018/04/10 20:32:34 executing program 1: 2018/04/10 20:32:34 executing program 7: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:34 executing program 5: 2018/04/10 20:32:34 executing program 0: 2018/04/10 20:32:34 executing program 4: 2018/04/10 20:32:34 executing program 3: 2018/04/10 20:32:34 executing program 6: 2018/04/10 20:32:34 executing program 2: 2018/04/10 20:32:34 executing program 4: 2018/04/10 20:32:34 executing program 2: 2018/04/10 20:32:34 executing program 0: 2018/04/10 20:32:34 executing program 1: 2018/04/10 20:32:34 executing program 5: 2018/04/10 20:32:34 executing program 7: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:34 executing program 6: 2018/04/10 20:32:34 executing program 3: 2018/04/10 20:32:34 executing program 4: 2018/04/10 20:32:34 executing program 2: 2018/04/10 20:32:34 executing program 1: 2018/04/10 20:32:34 executing program 0: 2018/04/10 20:32:34 executing program 5: 2018/04/10 20:32:34 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000), 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:34 executing program 6: 2018/04/10 20:32:34 executing program 4: 2018/04/10 20:32:34 executing program 1: 2018/04/10 20:32:34 executing program 5: 2018/04/10 20:32:34 executing program 0: 2018/04/10 20:32:34 executing program 3: 2018/04/10 20:32:34 executing program 2: 2018/04/10 20:32:34 executing program 6: 2018/04/10 20:32:34 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000), 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:34 executing program 4: 2018/04/10 20:32:34 executing program 1: 2018/04/10 20:32:34 executing program 5: 2018/04/10 20:32:34 executing program 0: 2018/04/10 20:32:34 executing program 3: 2018/04/10 20:32:34 executing program 2: 2018/04/10 20:32:35 executing program 6: 2018/04/10 20:32:35 executing program 4: 2018/04/10 20:32:35 executing program 5: 2018/04/10 20:32:35 executing program 2: 2018/04/10 20:32:35 executing program 1: 2018/04/10 20:32:35 executing program 3: 2018/04/10 20:32:35 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f00000000c0)=0x2, 0x4) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x4, 0x0, @loopback={0x4, 0x1}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, [], "802a08000000006b"}}}}}}}, 0x0) recvfrom$inet6(r0, &(0x7f0000000080)=""/49, 0x31, 0x40002040, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/10 20:32:35 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000), 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:35 executing program 6: r0 = socket$inet(0x2, 0x200000000003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x3, 0x330, [0x0, 0x20000100, 0x200002f8, 0x20000488], 0x0, &(0x7f0000000000), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, '\x00', 'eql\x00', '\x00', 'yam0\x00', @link_local={0x1, 0x80, 0xc2}, [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x108, 0x180, 0x1c8, [@physdev={'physdev\x00', 0x70, {{'ip6gre0\x00', {}, 'ip_vti0\x00'}}}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}, @common=@ERROR={'ERROR\x00', 0x20, {"27ef05fb4d1e0a9b3e1ff1b4bd1cb4f9b64edfbb72c94680d2549fcca849"}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x8, 0x0, 'erspan0\x00', 'ip_vti0\x00', 'ip6_vti0\x00', 'ifb0\x00', @random="cd260d6e19ae", [0x0, 0x0, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0x0, 0xff], 0x70, 0xa8, 0xd8}, [@common=@dnat={'dnat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0xfffffffffffffffd}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x3a8) 2018/04/10 20:32:35 executing program 4: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffe) 2018/04/10 20:32:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000000)="deb2ea0931", 0x5, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22, 0x0, @empty, 0x20}, 0x1c) accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f0000db4ffc)=0x214, 0x0) 2018/04/10 20:32:35 executing program 2: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) 2018/04/10 20:32:35 executing program 3: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 2018/04/10 20:32:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) write(r0, &(0x7f00000000c0)="f73bf99aaac609c43ad68f20be476489", 0x10) 2018/04/10 20:32:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x100000039) 2018/04/10 20:32:35 executing program 6: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:35 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e423", 0x97) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:35 executing program 5: r0 = userfaultfd(0x0) r1 = dup(r0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000280)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000000240)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) r2 = dup2(r0, r1) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000000)=0x100000000) [ 64.562927] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/10 20:32:35 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e423", 0x97) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040)=0x46, 0x4) socketpair$inet(0x2, 0x1, 0x5, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000280)={@empty, r2}, 0x14) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000100)=0x400, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}], 0x1, 0x0) sysinfo(&(0x7f00000002c0)=""/33) 2018/04/10 20:32:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000abdfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000100)=ANY=[@ANYBLOB="0203000016000000000000000000000004000300000000eeff00000000000000000000000000000000000000000000000598218b980000000a0000000000000000000000000000000000000000000000000000000000000004000400000000a05b1f00000029ac0000000000000000e10000000000000000020001000000000000009900004d0000050005000000000a00a14e00000000000000000000000000000000000000aa000000000000000087e510e3d9488c311e8958032e7b1cf4189fe0cf94d9d2491007310abd58a6ab5c60fec3bee30cee31694233b15ab7c49ce7872d216d5930fbcc2e177355c15472ff8b703074a400cf6477b91df30454500907ea760d1e53e7a56724b37e413b6920d9a8c6d4f1ed8f3ed48acffd297048969f4a0144c15829cce29a2488fe2628f11b464b909a8995061fa85c10485b309eab114207fdd9189d249623491fc4efb62fd7fc27747ac3821b7169b1070e8681a52d13440f831ac65d810f47344611dc9b85a431697ae0cb6a3206d83fbc8eb5fa1b7206f6e49b7c4080a735a45f79f67ff85c021e57d5b5cc"], 0xb0}, 0x1}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000c80ff4)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000304000)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x10000000}) clock_adjtime(0x1, &(0x7f0000000000)={0x80, 0x100, 0x200, 0x8000000, 0x7, 0xffff, 0x4, 0x23c9, 0x101, 0x8, 0xffffffff, 0x80000000, 0x1, 0x7, 0xfff, 0x3, 0x1, 0x3ff, 0x7, 0x8, 0x200, 0xf1d, 0x5, 0x1, 0x8, 0x9}) 2018/04/10 20:32:35 executing program 4: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffe) 2018/04/10 20:32:35 executing program 6: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00007a1ff6)='net/unix\x00') sendfile(r0, r2, &(0x7f00004db000)=0x1, 0x100) connect$llc(r2, &(0x7f0000000000)={0x1a, 0x339, 0x5, 0x8, 0x0, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) 2018/04/10 20:32:35 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000097000)='./file0\x00', &(0x7f0000939ff8)='./file0\x00', &(0x7f00006eb000)='ramfs\x00', 0x1, &(0x7f000002c000)) r0 = open(&(0x7f0000f04ff8)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00001d9000), 0x16a) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x75, 0x4) 2018/04/10 20:32:35 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e423", 0x97) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 2018/04/10 20:32:35 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000000640)='ubifs\x00', 0x1004, 0x0) 2018/04/10 20:32:35 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0xffff, 0x4) r1 = open(&(0x7f0000002000)='./bus\x00', 0x4002, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000001a80)=[{&(0x7f0000001980)=""/160, 0xa0}], 0x1, 0x0) sendfile(r1, r0, 0x0, 0x20000) 2018/04/10 20:32:36 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0x150, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000c00], 0x0, &(0x7f0000000bc0), &(0x7f0000000c00)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bcsh0\x00', 'syz_tun\x00', 'rose0\x00', 'ip6tnl0\x00', @empty, [], @random="de501b28aebc", [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz1\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1c8) 2018/04/10 20:32:36 executing program 3: perf_event_open(&(0x7f0000348f88)={0x0, 0xab}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/10 20:32:36 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0), 0x14) 2018/04/10 20:32:36 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000002640)="5b5331d25a71c6a64f00d90720f785f88f9e63f90f76c48feee314083a181eefab2af8a65643ebc8c2b907fdebdd7b6aabd04ebe5b3133ae10d25c8992f969f3462f985649a0d1aeb7d535535fe9ce30e21dc14811cdff61456d7141cc19a8c86d8c80ccc6639cbb396c5307933f3d1c5a346d2d3a47311974a4970abaccab9b06afbdf003eb24b16c82af83155e9b5533db3eeb4e9c0722105fdc7585c77f5238ae3d12f08c8ab6dcf0edb2490a54ac46932250eb853d86d10cff49f40797062fee0affd74773c634", 0xc9}], 0x1, &(0x7f0000003640)}}], 0x1, 0x0) shutdown(r0, 0x1) clock_gettime(0x0, &(0x7f0000004d00)={0x0, 0x0}) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @loopback=0x7f000001}}, 0x0, 0x40, 0x0, "bb7d979a5ee032056dff2fc639ba6368d0d71d898a4e124cf21cd30cb70965e6517b9cd90bda9821886e8cd3637def26f925ad25edc2a48d5320748f0957c324fe23baa6085747576770b4aaa4b7bab6"}, 0xd8) recvmmsg(r0, &(0x7f0000004b00)=[{{&(0x7f0000002500)=@sco, 0x80, &(0x7f0000004340)=[{&(0x7f00000041c0)=""/215, 0xd7}], 0x1, &(0x7f0000000180)=""/186, 0xba}}, {{&(0x7f0000004600)=@nfc_llcp, 0x80, &(0x7f0000004a40), 0x0, &(0x7f0000004ac0)}}], 0x2, 0x0, &(0x7f0000000140)={0x0, r1+30000000}) 2018/04/10 20:32:36 executing program 6: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x80287010, &(0x7f00000000c0)) 2018/04/10 20:32:36 executing program 0: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) fcntl$setownex(r1, 0xf, &(0x7f00002cb000)={0x0, r0}) 2018/04/10 20:32:36 executing program 2: r0 = socket(0x1, 0x3, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), 0x10) 2018/04/10 20:32:36 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000001c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000000040)='ubifs\x00', 0x1004, 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000480)) 2018/04/10 20:32:36 executing program 7: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd64", 0xe3) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f8e)="ac2524ed7dbf3553e99e2123f59f0900000000000000025b00ae1c9087fdc3512cff4e4b58928fb3dce7c781649ba9f8817cf593dfbe5c6a448d8d189c3fdf8d78107af39b544ba0130f3ef14009c6ff40e050fc8326f0b80f68b00806775026313a2568fa9570c154b9e6d698b9f461ff", 0x71) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 65.928581] ================================================================== [ 65.936003] BUG: KMSAN: uninit-value in tcp_parse_options+0xd74/0x1a30 [ 65.942665] CPU: 0 PID: 7 Comm: ksoftirqd/0 Not tainted 4.16.0+ #83 [ 65.949055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 65.958390] Call Trace: [ 65.960973] dump_stack+0x185/0x1d0 [ 65.964586] ? tcp_parse_options+0xd74/0x1a30 [ 65.969065] kmsan_report+0x142/0x240 [ 65.972851] __msan_warning_32+0x6c/0xb0 [ 65.976915] tcp_parse_options+0xd74/0x1a30 [ 65.981233] tcp_validate_incoming+0x4f1/0x2790 [ 65.985898] tcp_rcv_state_process+0xb19/0x6490 [ 65.990560] ? __bpf_prog_run32+0x127/0x170 [ 65.994870] ? security_sock_rcv_skb+0x4c/0x1f0 [ 65.999541] tcp_v4_do_rcv+0xb26/0xd90 [ 66.003419] tcp_v4_rcv+0x5b25/0x6750 [ 66.007219] ? tcp_filter+0x270/0x270 [ 66.011005] ip_local_deliver_finish+0x6ed/0xd40 [ 66.015757] ip_local_deliver+0x43c/0x4e0 [ 66.019895] ? ip_local_deliver+0x4e0/0x4e0 [ 66.024204] ? ip_call_ra_chain+0x7b0/0x7b0 [ 66.028509] ip_rcv_finish+0x1253/0x16d0 [ 66.032558] ip_rcv+0x119d/0x16f0 [ 66.035996] ? ip_rcv+0x16f0/0x16f0 [ 66.039621] __netif_receive_skb_core+0x47cf/0x4a80 [ 66.044629] ? kmsan_internal_memset_shadow_inline+0xd0/0xd0 [ 66.050417] ? ip_local_deliver_finish+0xd40/0xd40 [ 66.055333] process_backlog+0x62d/0xe20 [ 66.059386] ? rps_trigger_softirq+0x2f0/0x2f0 [ 66.063950] net_rx_action+0x7c1/0x1a70 [ 66.067916] ? net_tx_action+0xab0/0xab0 [ 66.071969] __do_softirq+0x56d/0x93d [ 66.075766] ? ksoftirqd_should_run+0x30/0x30 [ 66.080246] run_ksoftirqd+0x1f/0x40 [ 66.083949] smpboot_thread_fn+0x488/0x970 [ 66.088180] ? cpu_report_death+0x1e0/0x1e0 [ 66.092488] kthread+0x539/0x720 [ 66.095841] ? cpu_report_death+0x1e0/0x1e0 [ 66.100236] ? kthread_blkcg+0xf0/0xf0 [ 66.104107] ret_from_fork+0x35/0x40 [ 66.107804] [ 66.109411] Uninit was created at: [ 66.112941] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 66.118036] kmsan_kmalloc+0x94/0x100 [ 66.121823] kmsan_slab_alloc+0x11/0x20 [ 66.125781] __kmalloc_node_track_caller+0xaed/0x11c0 [ 66.130956] __alloc_skb+0x2cf/0x9f0 [ 66.134657] tcp_send_ack+0x18c/0x910 [ 66.138441] tcp_fin+0x298/0x8f0 [ 66.141794] tcp_data_queue+0x2cb9/0xa200 [ 66.145931] tcp_rcv_state_process+0x5c61/0x6490 [ 66.150672] tcp_v4_do_rcv+0xb26/0xd90 [ 66.154542] tcp_v4_rcv+0x5b25/0x6750 [ 66.158325] ip_local_deliver_finish+0x6ed/0xd40 [ 66.163064] ip_local_deliver+0x43c/0x4e0 [ 66.167195] ip_rcv_finish+0x1253/0x16d0 [ 66.171240] ip_rcv+0x119d/0x16f0 [ 66.174681] __netif_receive_skb_core+0x47cf/0x4a80 [ 66.179680] process_backlog+0x62d/0xe20 [ 66.183728] net_rx_action+0x7c1/0x1a70 [ 66.187689] __do_softirq+0x56d/0x93d [ 66.191468] ================================================================== [ 66.198809] Disabling lock debugging due to kernel taint [ 66.204238] Kernel panic - not syncing: panic_on_warn set ... [ 66.204238] [ 66.211592] CPU: 0 PID: 7 Comm: ksoftirqd/0 Tainted: G B 4.16.0+ #83 [ 66.219279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.228613] Call Trace: [ 66.231197] dump_stack+0x185/0x1d0 [ 66.234816] panic+0x39d/0x940 [ 66.238009] ? tcp_parse_options+0xd74/0x1a30 [ 66.242493] kmsan_report+0x238/0x240 [ 66.246281] __msan_warning_32+0x6c/0xb0 [ 66.250334] tcp_parse_options+0xd74/0x1a30 [ 66.254653] tcp_validate_incoming+0x4f1/0x2790 [ 66.259314] tcp_rcv_state_process+0xb19/0x6490 [ 66.263975] ? __bpf_prog_run32+0x127/0x170 [ 66.268286] ? security_sock_rcv_skb+0x4c/0x1f0 [ 66.272945] tcp_v4_do_rcv+0xb26/0xd90 [ 66.276840] tcp_v4_rcv+0x5b25/0x6750 [ 66.280636] ? tcp_filter+0x270/0x270 [ 66.284421] ip_local_deliver_finish+0x6ed/0xd40 [ 66.289171] ip_local_deliver+0x43c/0x4e0 [ 66.293312] ? ip_local_deliver+0x4e0/0x4e0 [ 66.297623] ? ip_call_ra_chain+0x7b0/0x7b0 [ 66.301928] ip_rcv_finish+0x1253/0x16d0 [ 66.305983] ip_rcv+0x119d/0x16f0 [ 66.309428] ? ip_rcv+0x16f0/0x16f0 [ 66.313054] __netif_receive_skb_core+0x47cf/0x4a80 [ 66.318064] ? kmsan_internal_memset_shadow_inline+0xd0/0xd0 [ 66.323851] ? ip_local_deliver_finish+0xd40/0xd40 [ 66.328767] process_backlog+0x62d/0xe20 [ 66.332821] ? rps_trigger_softirq+0x2f0/0x2f0 [ 66.337386] net_rx_action+0x7c1/0x1a70 [ 66.341351] ? net_tx_action+0xab0/0xab0 [ 66.345400] __do_softirq+0x56d/0x93d [ 66.349195] ? ksoftirqd_should_run+0x30/0x30 [ 66.353683] run_ksoftirqd+0x1f/0x40 [ 66.357386] smpboot_thread_fn+0x488/0x970 [ 66.361610] ? cpu_report_death+0x1e0/0x1e0 [ 66.365916] kthread+0x539/0x720 [ 66.369269] ? cpu_report_death+0x1e0/0x1e0 [ 66.373578] ? kthread_blkcg+0xf0/0xf0 [ 66.377460] ret_from_fork+0x35/0x40 [ 66.381593] Dumping ftrace buffer: [ 66.385111] (ftrace buffer empty) [ 66.388802] Kernel Offset: disabled [ 66.392407] Rebooting in 86400 seconds..