INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.25' (ECDSA) to the list of known hosts. 2018/04/07 04:17:18 fuzzer started 2018/04/07 04:17:19 dialing manager at 10.128.0.26:38639 2018/04/07 04:17:25 kcov=true, comps=false 2018/04/07 04:17:27 executing program 0: 2018/04/07 04:17:27 executing program 2: 2018/04/07 04:17:27 executing program 7: 2018/04/07 04:17:27 executing program 3: 2018/04/07 04:17:27 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0x3, 0x0, 0x0, 0xfffffffffffffffe}) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x4000) 2018/04/07 04:17:27 executing program 4: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mount(&(0x7f0000b28ff8)='./file0\x00', &(0x7f0000766ff8)='./file0\x00', &(0x7f00005a9ff9)='mqueue\x00', 0x8800, 0x0) r0 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000386000)=""/1840, 0x740) 2018/04/07 04:17:27 executing program 6: 2018/04/07 04:17:27 executing program 1: syzkaller login: [ 43.047838] ip (3742) used greatest stack depth: 54688 bytes left [ 43.788211] ip (3814) used greatest stack depth: 54072 bytes left [ 44.862670] ip (3913) used greatest stack depth: 53960 bytes left [ 46.626906] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.716977] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.978949] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.008891] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.016278] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.098716] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.109763] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.167906] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.435121] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.553562] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.732838] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.985986] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.040790] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.093915] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.112288] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.140954] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.147303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.158300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.194473] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.319543] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.325811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.347321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.521986] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.528336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.536675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.759958] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.766291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.784326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.807453] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.821866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.842647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.872295] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.878621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.889534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.919619] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.925869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.935887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.014110] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.020394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.033584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/07 04:17:45 executing program 0: r0 = socket(0x10, 0x200000000003, 0xc) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="1f0000000a06fd00010000f60000ff0180d0f80009000100020041ec000000", 0x1f) 2018/04/07 04:17:45 executing program 2: 2018/04/07 04:17:45 executing program 3: perf_event_open(&(0x7f0000000f88)={0x2, 0x78, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000340)=[{}], 0x1, 0x0) 2018/04/07 04:17:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) sendmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0x2, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000080)}}], 0x2, 0x48000) 2018/04/07 04:17:45 executing program 7: munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) clock_getres(0x1000000100, &(0x7f0000dd8ff0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r0}, {0x0, 0x9}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x7, &(0x7f0000002000)={0x1}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0xd21d9e038effdb6f, 0x0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0246400, &(0x7f00000002c0)={0x1, 0x0, 0x0, 0xd3, &(0x7f0000000140)=""/211, 0x37, &(0x7f0000000240)=""/55, 0x14, &(0x7f0000000280)=""/20}) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000400)={0x2, &(0x7f00000003c0)=[{}, {}]}) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000300)) perf_event_open(&(0x7f0000aaa000)={0x0, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r2, 0x7, &(0x7f0000010000)) r4 = dup3(r1, r2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) fcntl$lock(r1, 0x7, &(0x7f0000000380)={0x0, 0x6, 0xcc8f, 0x1b, r5}) sched_yield() mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x80130, r1, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x83010, r2, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x9) 2018/04/07 04:17:45 executing program 6: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000180)="000000000000000373005eaf1af7d1f5ebefafb7083568646292c2afcd7ce872587e077e4c792344702356bc3b04c126b68cd1dddc29ad72e0b54fdfc58b6547d2f0e3a997d1bdddd4099f40c2378d58b7636122eedd076ed5fa525b5298b9ba86e15d2767001ba37803672b8c1fe2fda4fd59ce84345cde") getdents64(r1, &(0x7f0000000200)=""/115, 0x73) getdents(r1, &(0x7f0000000ea9)=""/407, 0x197) 2018/04/07 04:17:45 executing program 4: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) mount(&(0x7f0000b28ff8)='./file0\x00', &(0x7f0000766ff8)='./file0\x00', &(0x7f00005a9ff9)='mqueue\x00', 0x8800, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000080)=@req={0x20, &(0x7f0000000040)={'gretap0\x00', @ifru_flags=0x7a01}}) r1 = open$dir(&(0x7f000001bff4)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000386000)=""/1840, 0x740) 2018/04/07 04:17:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = socket(0x4, 0x803, 0x7fff) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e20, 0x7, @local={0xfe, 0x80, [], 0xaa}, 0x2}}, 0x484ff0fa, 0x2, 0x100000001, 0x0, 0x20}, &(0x7f0000000300)=0x98) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000340)={r2, 0x6}, 0x8) r3 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @multicast1}, &(0x7f0000000040)=0x10, 0x800) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000100)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000002000000000"], 0x1) sendmsg$nl_generic(r0, &(0x7f0000016000)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000001000)={0x14, 0x10, 0x301}, 0x394}, 0x1}, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000180)={0x3, {{0x2, 0x4e24}}}, 0x88) 2018/04/07 04:17:45 executing program 2: r0 = inotify_init() r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x10000004}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000d19ff4)) 2018/04/07 04:17:45 executing program 1: ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000600)={@loopback={0x0, 0x1}, @remote={0xfe, 0x80, [], 0xbb}, @mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x0, 0x0, 0x500}) r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$tun(r1, &(0x7f000024a000), 0x32) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0xfffffffffffffffa, 0x3a, 0x8001}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) ioctl(r1, 0x10000000000227d, &(0x7f0000000000)) r3 = getuid() fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r3, r4) 2018/04/07 04:17:45 executing program 7: unshare(0x20000000) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000000140)) ioprio_set$pid(0x2, 0x0, 0x4001) io_setup(0x5c24, &(0x7f00000002c0)=0x0) io_destroy(r0) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) clone(0x18c2500, &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)) 2018/04/07 04:17:45 executing program 6: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000040)=@full={{0x3, {"f298996278d1ac"}}, [{"8d1328d1fd9509"}, {"4571959e4efe3e"}, {"0a54d7130ae310"}, {"25f1dc3f66d04a"}, {"7410bea4316436"}, {"1f8f079cbe616f"}, {"21e6bfda4e8f27"}, {"173f8ae5b38d72"}]}, 0x48) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') capset(&(0x7f0000000ffc)={0x20080522}, &(0x7f0000000000)) 2018/04/07 04:17:45 executing program 3: perf_event_open(&(0x7f0000000f88)={0x2, 0x78, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000340)=[{}], 0x1, 0x0) 2018/04/07 04:17:45 executing program 5: getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)}, &(0x7f0000001180)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000011c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="57940000"], &(0x7f0000001280)=0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001340)={r0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, {r1, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x80000001, 0x1000, 0x1, 0x0, 0x3}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xd0) r2 = socket(0x11, 0x4000000000080002, 0x0) setsockopt(r2, 0x107, 0xd, &(0x7f0000001000), 0x717) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00'}) sendmmsg$inet_sctp(r2, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) 2018/04/07 04:17:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89fa, &(0x7f0000000040)={'sit0\x00', @ifru_data=&(0x7f0000000080)="48803d6b61439579b6d04dd4102d09b21f8e3ef66a49b9acdf65e7fc2c583929"}) 2018/04/07 04:17:45 executing program 4: r0 = getpid() mprotect(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0) process_vm_readv(r0, &(0x7f000000b000)=[{&(0x7f0000005f3f)=""/97, 0x61}, {&(0x7f000000a000)=""/51, 0x33}, {&(0x7f000000b000)=""/73, 0x49}, {&(0x7f0000006000)=""/4096, 0x1000}], 0x4, &(0x7f0000007000)=[{&(0x7f0000000fbd)=""/67, 0x7ffff000}, {&(0x7f0000008f73)=""/141, 0x8d}, {&(0x7f000000b000)=""/240, 0xf0}, {&(0x7f0000008f9d)=""/99, 0x63}, {&(0x7f000000b000)=""/4096, 0x1000}, {&(0x7f000000bf62)=""/158, 0x9e}], 0x6, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) 2018/04/07 04:17:45 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000002000)='/dev/sg#\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000003ff5)=[{&(0x7f0000003f2a)="58a3a1d5e5d0731e2281ca3b9ce7ac1231236c4044d09b5c0c935f28e6abbaf388fce66ae11a2c555e53f88ca3dee9532c35236e45462e5b1c0fa489e92cfc255721751e91bdbfa240ffa3bd8481ce00a4531660e1e32fbf3447ac7a96b52b996e07c26d1f", 0x65}], 0x1, 0x0) ioctl(r0, 0x227b, &(0x7f0000001000)="06") getpgrp(0xffffffffffffffff) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) read(r0, &(0x7f0000003fa8)=""/88, 0x58) poll(&(0x7f0000000000)=[{r0, 0x8}], 0x1, 0x6) 2018/04/07 04:17:45 executing program 3: mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)='gfs2\x00', 0x1, &(0x7f0000000200)="f73a230229c8de8627214f62e36a1ca68670c388642dc02b3e412c488af27a36fe41d79ee89eb66288c5012eebee49fbb0da011ade2975341c99fce3e20cac976f5b082fbdffeff563920c5b5b3dfb464f6e48449d6be86d834381ddf7211248a37d18df28c13cbf2c7cee7efcae8e45695d5d887adbf5bdc7f5de6b46906d8ff4622da35486c9764d83ba4efb345ae946920ef9b99431469c68e466a19afe8e31de4f64ba2b6c846d5c64b1a085bc97a105c07db29ad99013033301fa9ec910aa9abdd2d2b4b08488be61287b3af661fd4900c8d6") mkdir(&(0x7f0000000300)='./file1\x00', 0x0) mount(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='ufs\x00', 0x800000, &(0x7f00000004c0)="660113bacbd5f87a0de10a99d0bfee092c194553143177509d8ba72291eb23a09087eb8d1b556fec5246451de38a2de2b632134a36296e3f5a163d2375523f8c6dd2a0e31f65fe054df5b8e85cad2b59e8616d8c08e5ae0673") mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)='./file1\x00', &(0x7f0000000180)='overlay\x00', 0x0, &(0x7f0000000400)=',') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) 2018/04/07 04:17:45 executing program 1: ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000600)={@loopback={0x0, 0x1}, @remote={0xfe, 0x80, [], 0xbb}, @mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x0, 0x0, 0x500}) r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$tun(r1, &(0x7f000024a000), 0x32) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0xfffffffffffffffa, 0x3a, 0x8001}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) ioctl(r1, 0x10000000000227d, &(0x7f0000000000)) r3 = getuid() fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r3, r4) 2018/04/07 04:17:45 executing program 0: ioprio_set$pid(0x2, 0x0, 0x4001) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x18c2500, &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)) 2018/04/07 04:17:45 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x401, &(0x7f000014b000)=0x0) io_submit(r2, 0x1, &(0x7f000049bfe8)=[&(0x7f00004dbfc0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000391000)}]) 2018/04/07 04:17:45 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/103, &(0x7f0000001040)=0x67) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000002, &(0x7f0000690ffc)=0x77, 0xfc) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00007f3ffb)='yeah\x00', 0x5) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000100), &(0x7f0000000180)=0x6e, 0x0) sendmsg$unix(r1, &(0x7f0000003540)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000003400)=[{&(0x7f0000000240)="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", 0x149}], 0x1, &(0x7f0000003480)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYRES32], 0xc, 0x40010}, 0x0) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) shutdown(r0, 0x1) 2018/04/07 04:17:45 executing program 7: unshare(0x20000000) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000000140)) ioprio_set$pid(0x2, 0x0, 0x4001) io_setup(0x5c24, &(0x7f00000002c0)=0x0) io_destroy(r0) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) clone(0x18c2500, &(0x7f0000000200), &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)) 2018/04/07 04:17:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fdaff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fd9ffc)) ioctl$TCFLSH(r0, 0x540b, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4000, 0x0) r1 = memfd_create(&(0x7f0000000100)=']\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r2, &(0x7f0000000100)=ANY=[], 0x1023c) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0xffff) inotify_init1(0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000240)=@sack_info={0x0, 0x9, 0x1}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x0, 0x7}, &(0x7f00000003c0)=0xc) ioprio_set$pid(0x3, 0x0, 0x0) pipe(&(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, 0x8) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000200)) 2018/04/07 04:17:46 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000200)="5800000014001900f8ff4b41040d875602ff03000000e076489643d818fe58a2bc4a0381001dfffffff8ee11ed9e246cff0000000006007fffdd1000174100005bffff001ce1ed900000080082a4000000060200231be86e", 0x58}], 0x1) 2018/04/07 04:17:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x6, &(0x7f0000001540)=[{&(0x7f0000001240)}, {&(0x7f00000012c0)}, {&(0x7f0000001380)}, {&(0x7f0000001400)}, {&(0x7f00000001c0)}, {&(0x7f0000001500)}], 0x150000) 2018/04/07 04:17:46 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0xffffffffffffffc1, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @empty, 0x1}, 0x4, [0x0, 0x2, 0x800000000, 0x0, 0x0, 0x0, 0x3]}, 0x5c) r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmmsg(r0, &(0x7f0000000f40)=[{{&(0x7f00000002c0)=@ipx={0x4, 0x1, 0x8, "4eee039eac2a", 0x3}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000340)="ad265a3b04130cb5627ab8e40a810abb7545bc05", 0x14}, {&(0x7f0000000480)="20cf", 0x2}], 0x2, 0x0, 0x0, 0x40010}, 0x5}, {{&(0x7f0000000640)=@vsock={0x28, 0x0, 0x2711, @host=0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f00000006c0)="170ebb0bc3abefdece490b92aeb055341a2d2230121cd3d97f8176194def5ef8c0b51e45c2a18c605ca818113935424199918ec2fc64a384608f8cc1c24f5a15771d2325a483c1e30cda50078f7cd8627d9d18bb060669977bb5812c8d4e35ec712dbfee4ffce9183c98428048ac4f7b7a2813a7a2240c65d8ad196f7567d6982cb70e47e5a4636afaac599dc0c5e337b46bb5d99e", 0x95}], 0x1, &(0x7f00000007c0)=[{0x38, 0x10d, 0x7fff, "1bbc150c9384f1247b998d1963524a929d36fceb49df418d77be1c87ea45f59c5d7c55"}, {0x60, 0x10f, 0x3, "b576ed0ba662b9249edd6f685a80ea05052c19d94e8ecf5a0b0edcb074460efa607d78ccc77a3c946a94f727b075180abd48f34bcd1f714559c51a0f11713e35bb5db333a0dfbfc409adb782"}], 0x98, 0x10}, 0xa3aa}], 0x2, 0x4800) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x7}, @in6={0xa, 0x4e24, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, @in6={0xa, 0x4e20, 0x8a8, @empty, 0xffffffffffffff81}, @in={0x2, 0x4e22}, @in={0x2, 0x4e20, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0x2, @empty, 0x7159}, @in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0xff}, @in6={0xa, 0x4e23, 0x5, @mcast1={0xff, 0x1, [], 0x1}, 0xd2ec}, @in={0x2, 0x5, @remote={0xac, 0x14, 0x14, 0xbb}}], 0xd8) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000180)) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r2, 0x29, 0x5f, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@local={0xfe, 0x80, [], 0xaa}, 0x4b, 0x0, 0x2, 0xa, 0x5, 0x80000000, 0x7}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x40, &(0x7f0000001fde), 0x4) accept(r3, &(0x7f0000001080)=@hci, &(0x7f0000001100)=0x80) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x1, 0x20}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000001000)={r4, 0x6, 0x1f}, &(0x7f0000001040)=0x8) 2018/04/07 04:17:46 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xef) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000000c0)=@fragment, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=@srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, [@local={0xfe, 0x80, [], 0xaa}]}, 0x0) 2018/04/07 04:17:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000f9e000)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000040)) dup2(r0, r0) dup2(r2, r0) epoll_wait(r1, &(0x7f0000000080)=[{}], 0x1, 0x0) [ 59.200759] syz-executor5: vmalloc: allocation failure: 17163354112 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 59.212925] syz-executor5 cpuset=syz5 mems_allowed=0 [ 59.218200] CPU: 0 PID: 5178 Comm: syz-executor5 Not tainted 4.16.0+ #81 [ 59.225069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.234458] Call Trace: [ 59.237091] dump_stack+0x185/0x1d0 [ 59.240772] warn_alloc+0x3fc/0x660 [ 59.244425] ================================================================== [ 59.251792] BUG: KMSAN: uninit-value in kernel_text_address+0x248/0x3a0 [ 59.258548] CPU: 0 PID: 5178 Comm: syz-executor5 Not tainted 4.16.0+ #81 [ 59.265385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.274732] Call Trace: [ 59.277328] dump_stack+0x14a/0x1d0 [ 59.280967] ? kernel_text_address+0x248/0x3a0 [ 59.285547] kmsan_report+0x142/0x240 [ 59.289350] __msan_warning_32+0x6c/0xb0 [ 59.293416] kernel_text_address+0x248/0x3a0 2018/04/07 04:17:46 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000fb1fee)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000001c0)={0x0, 0x1, &(0x7f00000000c0)='h'}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000080)=0x10000001c) [ 59.297829] __kernel_text_address+0x34/0xe0 [ 59.302245] show_trace_log_lvl+0x954/0x1030 [ 59.306651] ? __vmalloc_node_range+0xa6f/0x1140 [ 59.311414] show_stack+0xfc/0x150 [ 59.314951] ? print_worker_info+0x1b0/0x660 [ 59.319356] dump_stack+0x185/0x1d0 [ 59.322983] warn_alloc+0x3fc/0x660 [ 59.326633] ? __vmalloc_node_range+0x10b/0x1140 [ 59.331390] __vmalloc_node_range+0xa6f/0x1140 [ 59.335980] __vmalloc_node_flags_caller+0x102/0x120 [ 59.341081] ? xt_alloc_entry_offsets+0x62/0x70 [ 59.345754] ? xt_alloc_entry_offsets+0x62/0x70 2018/04/07 04:17:46 executing program 4: r0 = perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000580), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r1 = socket$inet(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000b80)=@broute={'broute\x00', 0x20, 0x1, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200008c0], 0x0, &(0x7f00000000c0), &(0x7f00000008c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'bond0\x00', 'sit0\x00', 'syzkaller0\x00', "7663236e300000040000e2ffffff00", @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [], 0x130, 0x130, 0x180, [@stp={'stp\x00', 0x48, {{0x81, {0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0x0, 0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4}}}, @ipvs={'ipvs\x00', 0x28, {{@ipv4=@broadcast=0xffffffff}}}]}}, @common=@log={'log\x00', 0x28, {{0x0, "419f3caef32aeac2b32adc0199086c2cb15ac7b2d822e2dd2525dc3610ef"}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x288) getpid() epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000307000)=&(0x7f0000000180)) [ 59.350436] kvmalloc_node+0x2a6/0x2e0 [ 59.354331] xt_alloc_entry_offsets+0x62/0x70 [ 59.358834] translate_table+0x216/0x3870 [ 59.362990] ? __kmalloc_node+0xf67/0x1190 [ 59.367230] ? kvmalloc_node+0x1a1/0x2e0 [ 59.371309] do_ip6t_set_ctl+0x60c/0x930 [ 59.375381] ? cleanup_entry+0x5c0/0x5c0 [ 59.379449] nf_setsockopt+0x476/0x4d0 [ 59.383354] ipv6_setsockopt+0x1e2/0x340 [ 59.387428] ? ipv6_update_options+0x510/0x510 [ 59.392018] sctp_setsockopt+0x68e/0x10820 [ 59.396257] ? kmsan_set_origin_inline+0x6b/0x120 [ 59.401108] ? __msan_poison_alloca+0x15c/0x1d0 [ 59.405784] ? __fdget+0x4e/0x60 [ 59.409156] ? __fget_light+0x56/0x710 [ 59.413048] ? sctp_shutdown+0x270/0x270 [ 59.417111] sock_common_setsockopt+0x136/0x170 [ 59.421785] ? sock_common_recvmsg+0x270/0x270 [ 59.426372] SYSC_setsockopt+0x4b8/0x570 [ 59.430438] SyS_setsockopt+0x76/0xa0 [ 59.434248] do_syscall_64+0x309/0x430 [ 59.438143] ? SYSC_recv+0xe0/0xe0 [ 59.441684] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 59.446869] RIP: 0033:0x455259 2018/04/07 04:17:46 executing program 7: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000687000)=0x9, 0x135) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0x3, 0x4) bind$inet6(r0, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = memfd_create(&(0x7f0000000300)='-\x00', 0x1) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000340)=""/122) sendto$inet6(r0, &(0x7f00007a8fff), 0x0, 0x20000000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000000080)=@nfc_llcp, &(0x7f0000000000)=0x80, 0x80800) clock_gettime(0x0, &(0x7f00000003c0)) setitimer(0x3, &(0x7f0000000440)={{0x77359400}, {0x0, 0x2710}}, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x3, 0x4}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x2, 0x8, 0x2000000000, 0x0, 0x3, 0xc000000000000000, 0x7f, {r3, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x9, 0xc892, 0x200, 0x2, 0x8}}, &(0x7f00000002c0)=0xb0) [ 59.450077] RSP: 002b:00007f2fb8f44c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 59.457781] RAX: ffffffffffffffda RBX: 00007f2fb8f456d4 RCX: 0000000000455259 [ 59.465051] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000016 [ 59.472317] RBP: 000000000072bea0 R08: 0000000000000004 R09: 0000000000000000 [ 59.479587] R10: 0000000020001fde R11: 0000000000000246 R12: 00000000ffffffff [ 59.486858] R13: 0000000000000556 R14: 00000000006fb0b0 R15: 0000000000000000 [ 59.494123] [ 59.495749] Local variable description: ----flags.i.i.i.i.i@get_page_from_freelist [ 59.503442] Variable was created at: [ 59.507160] get_page_from_freelist+0x15d/0xb600 [ 59.511912] __alloc_pages_nodemask+0x789/0x5dc0 [ 59.516654] ================================================================== [ 59.524002] Disabling lock debugging due to kernel taint [ 59.529444] Kernel panic - not syncing: panic_on_warn set ... [ 59.529444] [ 59.536810] CPU: 0 PID: 5178 Comm: syz-executor5 Tainted: G B 4.16.0+ #81 [ 59.544950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.554311] Call Trace: [ 59.556909] dump_stack+0x14a/0x1d0 [ 59.560540] panic+0x39d/0x940 [ 59.563756] ? kernel_text_address+0x248/0x3a0 [ 59.568341] kmsan_report+0x238/0x240 [ 59.572153] __msan_warning_32+0x6c/0xb0 [ 59.576225] kernel_text_address+0x248/0x3a0 [ 59.580640] __kernel_text_address+0x34/0xe0 [ 59.585057] show_trace_log_lvl+0x954/0x1030 [ 59.589470] ? __vmalloc_node_range+0xa6f/0x1140 [ 59.594238] show_stack+0xfc/0x150 [ 59.597782] ? print_worker_info+0x1b0/0x660 [ 59.602187] dump_stack+0x185/0x1d0 [ 59.605819] warn_alloc+0x3fc/0x660 [ 59.609467] ? __vmalloc_node_range+0x10b/0x1140 [ 59.614227] __vmalloc_node_range+0xa6f/0x1140 [ 59.618823] __vmalloc_node_flags_caller+0x102/0x120 [ 59.623937] ? xt_alloc_entry_offsets+0x62/0x70 [ 59.628612] ? xt_alloc_entry_offsets+0x62/0x70 [ 59.633294] kvmalloc_node+0x2a6/0x2e0 [ 59.637193] xt_alloc_entry_offsets+0x62/0x70 [ 59.641702] translate_table+0x216/0x3870 [ 59.645855] ? __kmalloc_node+0xf67/0x1190 [ 59.650098] ? kvmalloc_node+0x1a1/0x2e0 [ 59.654182] do_ip6t_set_ctl+0x60c/0x930 [ 59.658260] ? cleanup_entry+0x5c0/0x5c0 [ 59.662331] nf_setsockopt+0x476/0x4d0 [ 59.666235] ipv6_setsockopt+0x1e2/0x340 [ 59.670308] ? ipv6_update_options+0x510/0x510 [ 59.674894] sctp_setsockopt+0x68e/0x10820 [ 59.679130] ? kmsan_set_origin_inline+0x6b/0x120 [ 59.683977] ? __msan_poison_alloca+0x15c/0x1d0 [ 59.688652] ? __fdget+0x4e/0x60 [ 59.692024] ? __fget_light+0x56/0x710 [ 59.695923] ? sctp_shutdown+0x270/0x270 [ 59.699986] sock_common_setsockopt+0x136/0x170 [ 59.704659] ? sock_common_recvmsg+0x270/0x270 [ 59.709247] SYSC_setsockopt+0x4b8/0x570 [ 59.713314] SyS_setsockopt+0x76/0xa0 [ 59.717123] do_syscall_64+0x309/0x430 [ 59.721018] ? SYSC_recv+0xe0/0xe0 [ 59.724566] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 59.729747] RIP: 0033:0x455259 [ 59.732929] RSP: 002b:00007f2fb8f44c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 59.740636] RAX: ffffffffffffffda RBX: 00007f2fb8f456d4 RCX: 0000000000455259 [ 59.747900] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000016 [ 59.755169] RBP: 000000000072bea0 R08: 0000000000000004 R09: 0000000000000000 [ 59.762437] R10: 0000000020001fde R11: 0000000000000246 R12: 00000000ffffffff [ 59.769706] R13: 0000000000000556 R14: 00000000006fb0b0 R15: 0000000000000000 [ 59.777453] Dumping ftrace buffer: [ 59.780979] (ftrace buffer empty) [ 59.784662] Kernel Offset: disabled [ 59.788260] Rebooting in 86400 seconds..