INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.35' (ECDSA) to the list of known hosts. 2018/04/13 18:58:01 fuzzer started 2018/04/13 18:58:02 dialing manager at 10.128.0.26:33379 2018/04/13 18:58:08 kcov=true, comps=false 2018/04/13 18:58:10 executing program 0: socket(0x25, 0x3, 0xfffffffffffffffe) 2018/04/13 18:58:10 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) flistxattr(r0, &(0x7f0000000000)=""/62, 0x3e) 2018/04/13 18:58:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0x0, 0x0) 2018/04/13 18:58:10 executing program 7: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000980)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:10 executing program 3: r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0xffffffff, &(0x7f0000e1d000), 0x8) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x4}) 2018/04/13 18:58:10 executing program 4: 2018/04/13 18:58:11 executing program 5: 2018/04/13 18:58:11 executing program 6: syzkaller login: [ 42.288471] ip (3749) used greatest stack depth: 54816 bytes left [ 42.729957] ip (3791) used greatest stack depth: 54312 bytes left [ 43.696402] ip (3886) used greatest stack depth: 53656 bytes left [ 44.039509] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.043128] ip (3914) used greatest stack depth: 53640 bytes left [ 44.046074] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.096935] device bridge_slave_0 entered promiscuous mode [ 44.175096] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.181574] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.206529] device bridge_slave_0 entered promiscuous mode [ 44.226295] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.232784] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.271993] device bridge_slave_0 entered promiscuous mode [ 44.292936] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.299413] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.332598] device bridge_slave_1 entered promiscuous mode [ 44.342728] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.349206] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.369554] device bridge_slave_0 entered promiscuous mode [ 44.385736] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.392224] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.406356] device bridge_slave_0 entered promiscuous mode [ 44.433322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.440919] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.447480] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.471940] device bridge_slave_0 entered promiscuous mode [ 44.490835] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.497336] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.509598] device bridge_slave_0 entered promiscuous mode [ 44.523107] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.529581] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.549109] device bridge_slave_0 entered promiscuous mode [ 44.566157] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.572658] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.584253] device bridge_slave_1 entered promiscuous mode [ 44.590522] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.597011] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.607256] device bridge_slave_1 entered promiscuous mode [ 44.621327] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.627804] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.637258] device bridge_slave_1 entered promiscuous mode [ 44.645899] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 44.656829] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.663294] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.700250] device bridge_slave_1 entered promiscuous mode [ 44.717797] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.724285] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.738607] device bridge_slave_1 entered promiscuous mode [ 44.749930] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.756483] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.774015] device bridge_slave_1 entered promiscuous mode [ 44.784084] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.790529] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.804154] device bridge_slave_1 entered promiscuous mode [ 44.835699] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.843473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.853209] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.861335] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.902519] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.963961] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 44.988093] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 45.057620] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.065318] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.075816] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.083446] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.098326] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.194291] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.212325] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 45.578363] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 45.785981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 45.993515] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.010390] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.098792] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.107894] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.119585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.209584] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.217966] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.229370] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.267816] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 46.296553] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.304902] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.330091] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.467594] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.475934] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 46.747905] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 46.969571] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.211885] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.219143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.230773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.262862] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.270743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.288577] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.302475] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.370916] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.436466] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.443671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.457180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 47.484725] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.495372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.502980] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.510726] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 47.520635] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.537260] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.552987] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.704917] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.720729] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.727598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.748564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.768472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.777000] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.787289] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.795668] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 47.804182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.831365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.860149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.903740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.917546] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.927382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.940415] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 47.950298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 47.958615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 47.970057] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 47.981412] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 47.993984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.012142] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.019909] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.047208] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.055334] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 48.063328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.080771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.106634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.137817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.164581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.178768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.190389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.198686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.207398] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.214563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.222994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.243537] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.255475] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.272158] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 48.283154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.291994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.334239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.365837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.397638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.432338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 49.958723] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.965223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.972140] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.978620] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.035224] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.041719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.310104] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.316581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.323461] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.329909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.389981] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.405945] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.412418] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.419293] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.425746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.434496] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.475344] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.481842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.488730] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.495185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.582020] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.593896] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.600375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.607310] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.613768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.628403] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.648756] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.655223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.662118] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.668564] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.744554] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.751370] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.757848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.764674] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.771175] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.785567] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 50.792094] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.798561] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.805413] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.811869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.833958] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 51.104453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.119250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.172219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.198099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.219714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.232764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.239942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.353769] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.547327] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.566867] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.823321] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.894746] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 59.971898] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.114432] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.120694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.137610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.174473] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.226339] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 60.351974] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.358257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.370646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.392636] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.415591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.444564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.559986] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.566408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.580646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.692484] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.698743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.709657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.763976] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 60.772126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.784618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.063136] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.069385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.084653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.126923] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 61.133211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.154412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/13 18:58:38 executing program 0: 2018/04/13 18:58:38 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x420d, r1, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=""/4096, 0x1000}) 2018/04/13 18:58:38 executing program 4: 2018/04/13 18:58:38 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x10000001}) 2018/04/13 18:58:38 executing program 7: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000980)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:38 executing program 3: 2018/04/13 18:58:38 executing program 5: 2018/04/13 18:58:38 executing program 2: 2018/04/13 18:58:38 executing program 2: 2018/04/13 18:58:38 executing program 4: 2018/04/13 18:58:38 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0xc0505350, &(0x7f0000000100)={0x0, @time}) 2018/04/13 18:58:38 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x4, 0x4) read(r0, &(0x7f0000000040)=""/249, 0xf9) 2018/04/13 18:58:38 executing program 0: r0 = socket$inet(0xa, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000840)=@filter={'filter\x00', 0xe, 0x2, 0x90, [0x0, 0x200004c0, 0x200005b0, 0x200005e0], 0x0, &(0x7f0000000480), &(0x7f00000004c0)=[{}, {0x10d, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 2018/04/13 18:58:38 executing program 5: r0 = socket$nl_generic(0x2, 0x3, 0x10) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x484, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 2018/04/13 18:58:38 executing program 7: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000980)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:38 executing program 6: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') 2018/04/13 18:58:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x4, &(0x7f0000000700)=0xffffffffffffffff, &(0x7f0000000740)=0x40000000007) 2018/04/13 18:58:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000bb5000)={0x0, 0x0, 0x2}, 0x8) 2018/04/13 18:58:38 executing program 7: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000980)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000a8d000)={&(0x7f0000c78ff4)={0x10}, 0xc, &(0x7f0000df6000)={&(0x7f0000b04cf4)={0x1c, 0x17, 0xa, 0xfffffffffffffffd, 0x0, 0x0, {}, [@typed={0x8, 0x1}]}, 0x1c}, 0x1}, 0x0) 2018/04/13 18:58:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000ad1000), &(0x7f0000467ffc)=0x4) 2018/04/13 18:58:38 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/13 18:58:38 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x80082407, &(0x7f0000000040)) 2018/04/13 18:58:38 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0), 0x0, &(0x7f0000001140)=[{0x10}], 0x10}, 0x0) 2018/04/13 18:58:38 executing program 7: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000980)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:38 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000ed4000)=0x7b, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000680)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000617fc9), 0x84, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="8015b27a0d9e2bd88efb1e7c6b4ef9d1bec8550b7ca1f4b2af2b0c9c0c376391fe4e3a7957eb2f6ff408c4a21ad0f2475c0047e61f7ee239a37eb76740424a2030fe1c954d3c451a827400a096863b226c1fd65bc96c698be9cea658fa7a55e8116f3e01062c48892c0d777fa7ab11939b5d55105ac393532322a292c70e0b417d139220ce63a652665b135b1d9d13c080e685ba0f7b8765c168f873094036ef6fb2f267c3b445c5607a5751afbaeb451600ff96f81469b49a5261b0f24af3684b2c7515fc45c29831da47bad34cb22fcda7fa3a8285d63f591c412a06", 0xdd}], 0x1}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000580)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000001080)="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", 0x3d4}], 0x1, &(0x7f0000000300)}, 0x0) 2018/04/13 18:58:38 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x40a85323, &(0x7f00000002c0)={0x82}) 2018/04/13 18:58:38 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000080)=[{&(0x7f00000002c0)="200010000500010005000000001c08108f13", 0x12, 0x400}], 0x1, 0x0) 2018/04/13 18:58:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000007fc8)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001000ff20fffefd956fc283b724a600000d00000000060000000000001000010006c41180b598bc593a02001148a730df33a49868c62b2ca654a6613b6aab02000000bc832b0790ed", 0x4c}], 0x1}, 0x0) 2018/04/13 18:58:38 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x10, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000005c0)='./file0/file0\x00', 0x3fffa, 0x0) ftruncate(r0, 0x2000000) 2018/04/13 18:58:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) mmap(&(0x7f0000000000/0xd15000)=nil, 0xd15000, 0x2, 0x32, 0xffffffffffffffff, 0x0) accept4$ipx(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x10, 0x0) madvise(&(0x7f0000094000/0x3000)=nil, 0x3000, 0x10200000008) [ 67.906798] netlink: 28 bytes leftover after parsing attributes in process `syz-executor0'. [ 68.007956] netlink: 28 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/13 18:58:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000007fc8)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001000ff20fffefd956fc283b724a600000d00000000060000000000001000010006c41180b598bc593a02001148a730df33a49868c62b2ca654a6613b6aab02000000bc832b0790ed", 0x4c}], 0x1}, 0x0) 2018/04/13 18:58:39 executing program 7: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000980)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:39 executing program 2: r0 = socket$inet(0x15, 0x80005, 0x0) accept4(r0, &(0x7f0000000000)=@nl, &(0x7f0000000040)=0xc, 0x0) 2018/04/13 18:58:39 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) 2018/04/13 18:58:39 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') syz_mount_image$btrfs(&(0x7f0000002540)='btrfs\x00', &(0x7f0000002b80)='../file0/file0\x00', 0x0, 0x0, &(0x7f00000040c0), 0x0, &(0x7f0000004180)={[{@subvol={'subvol', 0x3d, [0x74]}, 0x2c}, {@subvol={'subvol', 0x3d, [0x7d]}, 0x2c}]}) 2018/04/13 18:58:39 executing program 6: setrlimit(0x8, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000982000)={0x4, 0x108000000000004, 0x4, 0x6}, 0x2c) 2018/04/13 18:58:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) mmap(&(0x7f0000000000/0xd15000)=nil, 0xd15000, 0x2, 0x32, 0xffffffffffffffff, 0x0) accept4$ipx(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x10, 0x0) madvise(&(0x7f0000094000/0x3000)=nil, 0x3000, 0x10200000008) 2018/04/13 18:58:39 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) [ 68.555912] netlink: 28 bytes leftover after parsing attributes in process `syz-executor0'. 2018/04/13 18:58:39 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/13 18:58:39 executing program 2: r0 = socket(0x1f, 0x2000000000000005, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x2) 2018/04/13 18:58:39 executing program 7: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000980)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:39 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) 2018/04/13 18:58:39 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x8000000000005, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0xc, 0x4, 0x100000001, 0x0, r0}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) 2018/04/13 18:58:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000fcdfe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x72) ioctl$sock_SIOCGIFINDEX(r0, 0x40082406, &(0x7f0000003780)={'bcsf0\x00'}) read(r0, &(0x7f00000010c0)=""/4096, 0x1000) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000c22ff0)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 2018/04/13 18:58:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000080)=ANY=[@ANYBLOB='V'], 0x1}, 0x1}, 0x8000) close(r0) [ 68.892895] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 18:58:40 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) 2018/04/13 18:58:40 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x24}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000ff7fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) mremap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00009de000/0x4000)=nil) close(r0) 2018/04/13 18:58:40 executing program 7: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000980)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 2018/04/13 18:58:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x1, 0x101002) write$evdev(r0, &(0x7f0000037fe8)=[{{}, 0x1, 0x20, 0x2}, {{0x0, 0x2}}], 0x30) 2018/04/13 18:58:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000080)=ANY=[@ANYBLOB='V'], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/13 18:58:40 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/13 18:58:40 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) [ 69.721013] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 18:58:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000ed4000)=0x7b, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000680)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000617fc9), 0x84, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="8015b27a0d9e2bd88efb1e7c6b4ef9d1bec8550b7ca1f4b2af2b0c9c0c376391fe4e3a7957eb2f6ff408c4a21ad0f2475c0047e61f7ee239a37eb76740424a2030fe1c954d3c451a827400a096863b226c1fd65bc96c698be9cea658fa7a55e8116f3e01062c48892c0d777fa7ab11939b5d55105ac393532322a292c70e0b417d139220ce63a652665b135b1d9d13c080e685ba0f7b8765c168f873094036ef6fb2f267c3b445c5607a5751afbaeb451600ff96f81469b49a5261b0f24af3684b2c7515fc45c29831da47bad34cb22fcda7fa3a8285d63f591c412a06", 0xdd}], 0x1}, 0x0) write$binfmt_elf32(r0, &(0x7f00000006c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "bf96c27f6840b5b30d8e9132b444f18a2f7e15b82d149071101846dd79462eca624e0a6a38a21292d9ec792544b3241d0606d7c09a981d7fe9c8ac071a55a97df362d3786f25ef8bf6aaaa66db74d9d79b10fa2fd545da173512c465527dac8f5ae62e8c066cdbf1c565842cf9e941d41f9b69998d904d2f76b7f63f71c707743fc99c154f3ac19ced2d6631172069b24b58681b99ee37634dfc97697ecfb3a45b2c4f4247c9b9638f0ae1425bee3b595a", [[]]}, 0x209) sendmsg$inet_sctp(r0, &(0x7f0000000580)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000001080)="30de661fa549cf74e3267553707815da24c64ecd52be99f0e539a377fab7d2ef799176ad983374c9a72cad62c2b29e5fc9884914c9725c6150c0e3ee617cacd25378c6b3efa221d4d45ef08f72333302efcafbd3d754c6e77c64b8b68c3718a18fde18e9875d40c5a9583cb8e796fc038e1c76ed087ac98921be8f6c6bac6c1438a68390cf80a1ab77c407b6ade1beee32da7231f709699f4250f9d107f9e501a1d33136e6061d3c5f0081374edb059aeb735c5820e88a0860403f9421afd12778578bd087179311e2380464dabc6b127b6d966a7abc3ecefd956a5d12ae0881bc2a1076821dcccc2dadb0f3b4b2e2a299ba9806f11cff52599e2b29195d56ec2d9a8e69365b61baf3bc4806918148075acec2457f68b6d359b6cb4877bccd737a7129a7d790b6a85f1ff7732227aef590fd30336e92b3b2b779cd615ad8613b9c051e37e6f334d1b69cbe434cb10a4c115233e865b1e6e6a6fb57c90971b784e852192d4bf0650ef271e24c7273f76ad0a93b5cc509c966e61e1a54707f6589ee8ab06627bee1810808070175eb3d8b212c4a4870633aa8be764942c807573917ac2c343d1e6f0901afa00426f25fee517958091b54788fe422ca71b6d3864b143c98afb765e33bc3e4bd9d05a7858e7cd1e92ee6971489e1746900d855b3522152b1bf73a9e0871b1a478ba4df6e1c3630052bfd85e4f024ab574b9cc47408834d2ba1827259d0d24027e6c6f4054b199cfdcfb227e233e8adb40a090336bc387bfb2670e9b0f45f9a2513a94247cd096cffecc1ba7cc23fd9052c7145e7552342ba9c063b9535b185048ab2348ba06fc2da649d2a8b5b8d56f6459bf7193b2b7872d8323426c90d1b4ec7411f4cdc4b371f6bece5e04a4895e9dc04446370fc4657d39039d370939480dd070fde2e11379f7ad984203242ebf7687d22bd9104e7e03aeb91370e06af05bb75fb0a4703138003890305eb6eb9662c3b3f94eecd6a63e0675c1922e720dbb108b3d615678a29a12981ee04fa5251284971bbbe340061b8af87428b4de92a17e19744e62c9483a9c8dd4922d815ec4f8489e010f06766eb321ac243f0a6e3a527a25e607bdfa64b890c7bba1011d54996971b7da2a56d84e64539c46cec128ec67415b22acfe576e3afb8ad89c9f738c2b1c403f819e382098d87aa70efcdbadf54e7810fbc48abb9e58eefd3ddaf1de80921b93afe2b10bfffe47e17d55c88c7e4fe7309eebef241e8077f7fd864c5830e92c74e75dff7fca38d406a3f090b04b239f36d2d7ac56544eb", 0x397}], 0x1, &(0x7f0000000300)}, 0x0) 2018/04/13 18:58:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f000063c000)={&(0x7f00009f8e98)=@newsa={0xf0, 0x10, 0x721, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in6=@dev={0xfe, 0x80}}, {@in=@broadcast=0xffffffff, 0x0, 0x833}, @in6, {}, {}, {}, 0x0, 0x0, 0x200000000000002}}, 0xf0}, 0x1}, 0x0) 2018/04/13 18:58:40 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f00000004c0)=""/186, 0xba}], 0x1) 2018/04/13 18:58:40 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000980)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000080)=ANY=[@ANYBLOB='V'], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/13 18:58:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f000063c000)={&(0x7f00009f8e98)=@newsa={0xf0, 0x10, 0x721, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in6=@dev={0xfe, 0x80}}, {@in=@broadcast=0xffffffff, 0x0, 0x833}, @in6, {}, {}, {}, 0x0, 0x0, 0x200000000000002}}, 0xf0}, 0x1}, 0x0) [ 70.072835] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 18:58:41 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00002ac000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f00000001c0)) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000005c0)=ANY=[@ANYRES16=r1, @ANYPTR, @ANYPTR=&(0x7f0000000680)=ANY=[@ANYRES64, @ANYBLOB="f3d1a5d44c6cac8ffe7ba5887af51e", @ANYRES32, @ANYRES16], @ANYRES16, @ANYRES32=r1]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)) 2018/04/13 18:58:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000ed4000)=0x7b, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000680)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000617fc9), 0x84, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="8015b27a0d9e2bd88efb1e7c6b4ef9d1bec8550b7ca1f4b2af2b0c9c0c376391fe4e3a7957eb2f6ff408c4a21ad0f2475c0047e61f7ee239a37eb76740424a2030fe1c954d3c451a827400a096863b226c1fd65bc96c698be9cea658fa7a55e8116f3e01062c48892c0d777fa7ab11939b5d55105ac393532322a292c70e0b417d139220ce63a652665b135b1d9d13c080e685ba0f7b8765c168f873094036ef6fb2f267c3b445c5607a5751afbaeb451600ff96f81469b49a5261b0f24af3684b2c7515fc45c29831da47bad34cb22fcda7fa3a8285d63f591c412a06", 0xdd}], 0x1}, 0x0) write$binfmt_elf32(r0, &(0x7f00000006c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "bf96c27f6840b5b30d8e9132b444f18a2f7e15b82d149071101846dd79462eca624e0a6a38a21292d9ec792544b3241d0606d7c09a981d7fe9c8ac071a55a97df362d3786f25ef8bf6aaaa66db74d9d79b10fa2fd545da173512c465527dac8f5ae62e8c066cdbf1c565842cf9e941d41f9b69998d904d2f76b7f63f71c707743fc99c154f3ac19ced2d6631172069b24b58681b99ee37634dfc97697ecfb3a45b2c4f4247c9b9638f0ae1425bee3b595a", [[]]}, 0x209) sendmsg$inet_sctp(r0, &(0x7f0000000580)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000001080)="30de661fa549cf74e3267553707815da24c64ecd52be99f0e539a377fab7d2ef799176ad983374c9a72cad62c2b29e5fc9884914c9725c6150c0e3ee617cacd25378c6b3efa221d4d45ef08f72333302efcafbd3d754c6e77c64b8b68c3718a18fde18e9875d40c5a9583cb8e796fc038e1c76ed087ac98921be8f6c6bac6c1438a68390cf80a1ab77c407b6ade1beee32da7231f709699f4250f9d107f9e501a1d33136e6061d3c5f0081374edb059aeb735c5820e88a0860403f9421afd12778578bd087179311e2380464dabc6b127b6d966a7abc3ecefd956a5d12ae0881bc2a1076821dcccc2dadb0f3b4b2e2a299ba9806f11cff52599e2b29195d56ec2d9a8e69365b61baf3bc4806918148075acec2457f68b6d359b6cb4877bccd737a7129a7d790b6a85f1ff7732227aef590fd30336e92b3b2b779cd615ad8613b9c051e37e6f334d1b69cbe434cb10a4c115233e865b1e6e6a6fb57c90971b784e852192d4bf0650ef271e24c7273f76ad0a93b5cc509c966e61e1a54707f6589ee8ab06627bee1810808070175eb3d8b212c4a4870633aa8be764942c807573917ac2c343d1e6f0901afa00426f25fee517958091b54788fe422ca71b6d3864b143c98afb765e33bc3e4bd9d05a7858e7cd1e92ee6971489e1746900d855b3522152b1bf73a9e0871b1a478ba4df6e1c3630052bfd85e4f024ab574b9cc47408834d2ba1827259d0d24027e6c6f4054b199cfdcfb227e233e8adb40a090336bc387bfb2670e9b0f45f9a2513a94247cd096cffecc1ba7cc23fd9052c7145e7552342ba9c063b9535b185048ab2348ba06fc2da649d2a8b5b8d56f6459bf7193b2b7872d8323426c90d1b4ec7411f4cdc4b371f6bece5e04a4895e9dc04446370fc4657d39039d370939480dd070fde2e11379f7ad984203242ebf7687d22bd9104e7e03aeb91370e06af05bb75fb0a4703138003890305eb6eb9662c3b3f94eecd6a63e0675c1922e720dbb108b3d615678a29a12981ee04fa5251284971bbbe340061b8af87428b4de92a17e19744e62c9483a9c8dd4922d815ec4f8489e010f06766eb321ac243f0a6e3a527a25e607bdfa64b890c7bba1011d54996971b7da2a56d84e64539c46cec128ec67415b22acfe576e3afb8ad89c9f738c2b1c403f819e382098d87aa70efcdbadf54e7810fbc48abb9e58eefd3ddaf1de80921b93afe2b10bfffe47e17d55c88c7e4fe7309eebef241e8077f7fd864c5830e92c74e75dff7fca38d406a3f090b04b239f36d2d7ac56544eb", 0x397}], 0x1, &(0x7f0000000300)}, 0x0) 2018/04/13 18:58:41 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000980)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f000063c000)={&(0x7f00009f8e98)=@newsa={0xf0, 0x10, 0x721, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in6=@dev={0xfe, 0x80}}, {@in=@broadcast=0xffffffff, 0x0, 0x833}, @in6, {}, {}, {}, 0x0, 0x0, 0x200000000000002}}, 0xf0}, 0x1}, 0x0) 2018/04/13 18:58:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000080)=ANY=[@ANYBLOB='V'], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/13 18:58:41 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)={0x14, r1, 0x707, 0x0, 0x0, {0xb}}, 0x14}, 0x1}, 0x0) 2018/04/13 18:58:41 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/13 18:58:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) [ 70.793020] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 18:58:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f000063c000)={&(0x7f00009f8e98)=@newsa={0xf0, 0x10, 0x721, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in6=@dev={0xfe, 0x80}}, {@in=@broadcast=0xffffffff, 0x0, 0x833}, @in6, {}, {}, {}, 0x0, 0x0, 0x200000000000002}}, 0xf0}, 0x1}, 0x0) 2018/04/13 18:58:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000769f0f)=""/241, 0xfffffffffffffdd4, 0x0, &(0x7f0000497ff0)={0x2, 0x0, @broadcast=0xffffffff}, 0x4e) recvfrom$inet(r0, &(0x7f00000004c0)=""/149, 0xfffffffffffffce2, 0x0, 0x0, 0x2c8) 2018/04/13 18:58:41 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f000001cff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg$rds(r0, &(0x7f000000dfc8)={&(0x7f0000014000)={0x2, 0x0, @rand_addr=0x31a00dfb}, 0x10, &(0x7f0000001fc0), 0x0, &(0x7f0000000080)=[@rdma_dest={0x18, 0x114, 0x2}], 0x18}, 0x0) 2018/04/13 18:58:42 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000980)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:42 executing program 5: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f000063c000)={&(0x7f00009f8e98)=@newsa={0xf0, 0x10, 0x721, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in6=@dev={0xfe, 0x80}}, {@in=@broadcast=0xffffffff, 0x0, 0x833}, @in6, {}, {}, {}, 0x0, 0x0, 0x200000000000002}}, 0xf0}, 0x1}, 0x0) 2018/04/13 18:58:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000ed4000)=0x7b, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000680)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000617fc9), 0x84, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="8015b27a0d9e2bd88efb1e7c6b4ef9d1bec8550b7ca1f4b2af2b0c9c0c376391fe4e3a7957eb2f6ff408c4a21ad0f2475c0047e61f7ee239a37eb76740424a2030fe1c954d3c451a827400a096863b226c1fd65bc96c698be9cea658fa7a55e8116f3e01062c48892c0d777fa7ab11939b5d55105ac393532322a292c70e0b417d139220ce63a652665b135b1d9d13c080e685ba0f7b8765c168f873094036ef6fb2f267c3b445c5607a5751afbaeb451600ff96f81469b49a5261b0f24af3684b2c7515fc45c29831da47bad34cb22fcda7fa3a8285d63f591c412a06", 0xdd}], 0x1}, 0x0) write$binfmt_elf32(r0, &(0x7f00000006c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "bf96c27f6840b5b30d8e9132b444f18a2f7e15b82d149071101846dd79462eca624e0a6a38a21292d9ec792544b3241d0606d7c09a981d7fe9c8ac071a55a97df362d3786f25ef8bf6aaaa66db74d9d79b10fa2fd545da173512c465527dac8f5ae62e8c066cdbf1c565842cf9e941d41f9b69998d904d2f76b7f63f71c707743fc99c154f3ac19ced2d6631172069b24b58681b99ee37634dfc97697ecfb3a45b2c4f4247c9b9638f0ae1425bee3b595a", [[]]}, 0x209) sendmsg$inet_sctp(r0, &(0x7f0000000580)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000001080)="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", 0x397}], 0x1, &(0x7f0000000300)}, 0x0) 2018/04/13 18:58:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) close(r0) 2018/04/13 18:58:42 executing program 2: r0 = timerfd_create(0x0, 0x0) r1 = dup2(r0, r0) timerfd_settime(r0, 0x0, &(0x7f00001c9fe0)={{}, {0x0, 0x989680}}, &(0x7f0000d7efe0)) read(r1, &(0x7f0000941ff8)=""/8, 0x8) [ 71.202359] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 18:58:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f000063c000)={&(0x7f00009f8e98)=@newsa={0xf0, 0x10, 0x721, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in6=@dev={0xfe, 0x80}}, {@in=@broadcast=0xffffffff, 0x0, 0x833}, @in6, {}, {}, {}, 0x0, 0x0, 0x200000000000002}}, 0xf0}, 0x1}, 0x0) 2018/04/13 18:58:43 executing program 7: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000980)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000ed4000)=0x7b, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000680)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000617fc9), 0x84, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="8015b27a0d9e2bd88efb1e7c6b4ef9d1bec8550b7ca1f4b2af2b0c9c0c376391fe4e3a7957eb2f6ff408c4a21ad0f2475c0047e61f7ee239a37eb76740424a2030fe1c954d3c451a827400a096863b226c1fd65bc96c698be9cea658fa7a55e8116f3e01062c48892c0d777fa7ab11939b5d55105ac393532322a292c70e0b417d139220ce63a652665b135b1d9d13c080e685ba0f7b8765c168f873094036ef6fb2f267c3b445c5607a5751afbaeb451600ff96f81469b49a5261b0f24af3684b2c7515fc45c29831da47bad34cb22fcda7fa3a8285d63f591c412a06", 0xdd}], 0x1}, 0x0) write$binfmt_elf32(r0, &(0x7f00000006c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "bf96c27f6840b5b30d8e9132b444f18a2f7e15b82d149071101846dd79462eca624e0a6a38a21292d9ec792544b3241d0606d7c09a981d7fe9c8ac071a55a97df362d3786f25ef8bf6aaaa66db74d9d79b10fa2fd545da173512c465527dac8f5ae62e8c066cdbf1c565842cf9e941d41f9b69998d904d2f76b7f63f71c707743fc99c154f3ac19ced2d6631172069b24b58681b99ee37634dfc97697ecfb3a45b2c4f4247c9b9638f0ae1425bee3b595a", [[]]}, 0x209) sendmsg$inet_sctp(r0, &(0x7f0000000580)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000001080)="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", 0x397}], 0x1, &(0x7f0000000300)}, 0x0) 2018/04/13 18:58:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0x14, 0x40000080000028, 0xaff}, 0x14}, 0x1}, 0x0) 2018/04/13 18:58:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x2) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1}) write$sndseq(r0, &(0x7f0000000240)=[{0xffff, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"416bc8caab396cdb5b1d1941"}}], 0xfffffef6) 2018/04/13 18:58:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) close(r0) 2018/04/13 18:58:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b9bff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfffffffffffffd90, 0x20020003, &(0x7f0000385ff0)={0x2, 0x20000000004e21, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000769f0f)=""/241, 0xfffffffffffffdd4, 0x0, &(0x7f0000497ff0)={0x2, 0x0, @broadcast=0xffffffff}, 0x4e) recvfrom$inet(r0, &(0x7f00000004c0)=""/149, 0xfffffffffffffce2, 0x0, 0x0, 0x2c8) 2018/04/13 18:58:43 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8919, &(0x7f0000000000)={"65727370616e3000000000000200"}) [ 72.071914] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 18:58:43 executing program 7: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000980)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:43 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x78, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 2018/04/13 18:58:43 executing program 2: add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f0000000240)="b5", 0x1, 0xffffffffffffffff) 2018/04/13 18:58:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f000063c000)={&(0x7f00009f8e98)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in6=@dev={0xfe, 0x80}}, {@in=@broadcast=0xffffffff, 0x0, 0x833}, @in6, {}, {}, {}, 0x0, 0x0, 0x200000000000002}}, 0xf0}, 0x1}, 0x0) 2018/04/13 18:58:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000ed4000)=0x7b, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000680)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfc}]}, 0x10) sendto$inet(r0, &(0x7f0000617fc9), 0x84, 0x20000000, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f000009cfe4)={&(0x7f000009ffa8)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(pcrypt(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000398000)=[{&(0x7f0000697000)="8015b27a0d9e2bd88efb1e7c6b4ef9d1bec8550b7ca1f4b2af2b0c9c0c376391fe4e3a7957eb2f6ff408c4a21ad0f2475c0047e61f7ee239a37eb76740424a2030fe1c954d3c451a827400a096863b226c1fd65bc96c698be9cea658fa7a55e8116f3e01062c48892c0d777fa7ab11939b5d55105ac393532322a292c70e0b417d139220ce63a652665b135b1d9d13c080e685ba0f7b8765c168f873094036ef6fb2f267c3b445c5607a5751afbaeb451600ff96f81469b49a5261b0f24af3684b2c7515fc45c29831da47bad34cb22fcda7fa3a8285d63f591c412a06", 0xdd}], 0x1}, 0x0) write$binfmt_elf32(r0, &(0x7f00000006c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "bf96c27f6840b5b30d8e9132b444f18a2f7e15b82d149071101846dd79462eca624e0a6a38a21292d9ec792544b3241d0606d7c09a981d7fe9c8ac071a55a97df362d3786f25ef8bf6aaaa66db74d9d79b10fa2fd545da173512c465527dac8f5ae62e8c066cdbf1c565842cf9e941d41f9b69998d904d2f76b7f63f71c707743fc99c154f3ac19ced2d6631172069b24b58681b99ee37634dfc97697ecfb3a45b2c4f4247c9b9638f0ae1425bee3b595a", [[]]}, 0x209) 2018/04/13 18:58:43 executing program 7: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000980)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) close(r0) 2018/04/13 18:58:43 executing program 2: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = socket$inet(0x2, 0x3, 0x6) sendto$inet(r1, &(0x7f000014cf2c), 0x0, 0x8000, &(0x7f00005b5ff0)={0x2}, 0x10) sendto$inet(r1, &(0x7f0000000040)="33f018eb", 0x4, 0x0, &(0x7f0000000140)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/13 18:58:43 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x5, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) write(r0, &(0x7f0000c34fff), 0xfffffd12) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) 2018/04/13 18:58:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f000063c000)={&(0x7f00009f8e98)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in6=@dev={0xfe, 0x80}}, {@in=@broadcast=0xffffffff, 0x0, 0x833}, @in6, {}, {}, {}, 0x0, 0x0, 0x200000000000002}}, 0xf0}, 0x1}, 0x0) [ 72.466453] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 72.516504] ================================================================== [ 72.523920] BUG: KMSAN: uninit-value in __flow_hash_from_keys+0x10d8/0x1150 [ 72.531030] CPU: 1 PID: 6093 Comm: syz-executor2 Not tainted 4.16.0+ #83 [ 72.537867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.547216] Call Trace: [ 72.549812] dump_stack+0x185/0x1d0 [ 72.553447] ? __flow_hash_from_keys+0x10d8/0x1150 [ 72.558373] kmsan_report+0x142/0x240 [ 72.562180] __msan_warning_32+0x6c/0xb0 [ 72.566250] __flow_hash_from_keys+0x10d8/0x1150 [ 72.571020] __skb_get_hash_symmetric+0x14d/0x230 [ 72.575870] packet_rcv_fanout+0x38f/0x8d0 [ 72.580110] ? packet_direct_xmit+0xbf0/0xbf0 [ 72.584607] dev_queue_xmit_nit+0x111a/0x11e0 [ 72.589116] dev_hard_start_xmit+0x27c/0xc70 [ 72.593539] __dev_queue_xmit+0x22d9/0x2b60 [ 72.597876] dev_queue_xmit+0x4b/0x60 [ 72.601682] neigh_resolve_output+0xac6/0xb60 [ 72.606191] ? neigh_event_ns+0x360/0x360 [ 72.610336] ip_finish_output2+0x1238/0x1380 [ 72.614748] ip_finish_output+0xcb0/0xff0 [ 72.618900] ip_output+0x502/0x5c0 [ 72.622444] ? ip_mc_finish_output+0x3b0/0x3b0 [ 72.627031] ? ip_finish_output+0xff0/0xff0 [ 72.631353] ip_send_skb+0x5f3/0x820 [ 72.635065] ? __ip_local_out+0x5b0/0x5b0 [ 72.639220] ip_push_pending_frames+0x105/0x170 [ 72.643903] raw_sendmsg+0x2960/0x3ed0 [ 72.647819] ? compat_raw_ioctl+0x100/0x100 [ 72.652137] inet_sendmsg+0x48d/0x740 [ 72.655937] ? security_socket_sendmsg+0x9e/0x210 [ 72.660787] ? inet_getname+0x500/0x500 [ 72.664763] SYSC_sendto+0x6c3/0x7e0 [ 72.668482] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 72.673931] ? prepare_exit_to_usermode+0x149/0x3a0 [ 72.678962] SyS_sendto+0x8a/0xb0 [ 72.682417] do_syscall_64+0x309/0x430 [ 72.686307] ? SYSC_getpeername+0x560/0x560 [ 72.690637] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 72.695821] RIP: 0033:0x455319 [ 72.699010] RSP: 002b:00007efd224afc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 72.706732] RAX: ffffffffffffffda RBX: 00007efd224b06d4 RCX: 0000000000455319 [ 72.714000] RDX: 0000000000000004 RSI: 0000000020000040 RDI: 0000000000000014 [ 72.721264] RBP: 000000000072bea0 R08: 0000000020000140 R09: 0000000000000010 [ 72.728531] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 72.735798] R13: 00000000000004f7 R14: 00000000006fa7c8 R15: 0000000000000000 [ 72.743067] [ 72.744687] Uninit was stored to memory at: [ 72.749014] kmsan_internal_chain_origin+0x12b/0x210 [ 72.754120] __msan_chain_origin+0x69/0xc0 [ 72.758355] __skb_flow_dissect+0x4cbd/0x6580 [ 72.762850] __skb_get_hash_symmetric+0x10b/0x230 [ 72.767694] packet_rcv_fanout+0x38f/0x8d0 [ 72.771930] dev_queue_xmit_nit+0x111a/0x11e0 [ 72.776428] dev_hard_start_xmit+0x27c/0xc70 [ 72.780835] __dev_queue_xmit+0x22d9/0x2b60 [ 72.785154] dev_queue_xmit+0x4b/0x60 [ 72.788953] neigh_resolve_output+0xac6/0xb60 [ 72.793451] ip_finish_output2+0x1238/0x1380 [ 72.797859] ip_finish_output+0xcb0/0xff0 [ 72.802003] ip_output+0x502/0x5c0 [ 72.805547] ip_send_skb+0x5f3/0x820 [ 72.809258] ip_push_pending_frames+0x105/0x170 [ 72.813926] raw_sendmsg+0x2960/0x3ed0 2018/04/13 18:58:43 executing program 7: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000980)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x9}}, {{0xa, 0x200000004e24, 0x9, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x7}}, {{0xa, 0x4e23, 0x6c}}, {{0xa, 0x4e20, 0x2576, @mcast1={0xff, 0x1, [], 0x1}, 0xda6}}]}, 0x290) 2018/04/13 18:58:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f000063c000)={&(0x7f00009f8e98)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in6=@dev={0xfe, 0x80}}, {@in=@broadcast=0xffffffff, 0x0, 0x833}, @in6, {}, {}, {}, 0x0, 0x0, 0x200000000000002}}, 0xf0}, 0x1}, 0x0) [ 72.817811] inet_sendmsg+0x48d/0x740 [ 72.821614] SYSC_sendto+0x6c3/0x7e0 [ 72.825329] SyS_sendto+0x8a/0xb0 [ 72.828782] do_syscall_64+0x309/0x430 [ 72.832675] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 72.837850] Uninit was stored to memory at: [ 72.842174] kmsan_internal_chain_origin+0x12b/0x210 [ 72.847279] kmsan_memcpy_origins+0x11d/0x170 [ 72.851774] __msan_memcpy+0x19f/0x1f0 [ 72.855658] skb_copy_bits+0x63a/0xdb0 [ 72.859547] __skb_flow_dissect+0x48ea/0x6580 [ 72.864046] __skb_get_hash_symmetric+0x10b/0x230 [ 72.868890] packet_rcv_fanout+0x38f/0x8d0 [ 72.873124] dev_queue_xmit_nit+0x111a/0x11e0 [ 72.877622] dev_hard_start_xmit+0x27c/0xc70 [ 72.882031] __dev_queue_xmit+0x22d9/0x2b60 [ 72.886347] dev_queue_xmit+0x4b/0x60 [ 72.890155] neigh_resolve_output+0xac6/0xb60 [ 72.894650] ip_finish_output2+0x1238/0x1380 [ 72.899056] ip_finish_output+0xcb0/0xff0 [ 72.903201] ip_output+0x502/0x5c0 [ 72.906739] ip_send_skb+0x5f3/0x820 [ 72.910447] ip_push_pending_frames+0x105/0x170 [ 72.915117] raw_sendmsg+0x2960/0x3ed0 [ 72.919003] inet_sendmsg+0x48d/0x740 [ 72.922803] SYSC_sendto+0x6c3/0x7e0 [ 72.926516] SyS_sendto+0x8a/0xb0 [ 72.929969] do_syscall_64+0x309/0x430 [ 72.933860] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 72.939035] Uninit was created at: [ 72.942578] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 72.947595] kmsan_alloc_page+0x82/0xe0 [ 72.951571] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 72.956326] alloc_pages_current+0x6b5/0x970 [ 72.960739] skb_page_frag_refill+0x3ba/0x5e0 [ 72.965235] sk_page_frag_refill+0xa4/0x340 [ 72.969554] __ip_append_data+0x107e/0x3d10 [ 72.973876] ip_append_data+0x2fb/0x440 [ 72.977850] raw_sendmsg+0x287b/0x3ed0 [ 72.981736] inet_sendmsg+0x48d/0x740 [ 72.985536] SYSC_sendto+0x6c3/0x7e0 [ 72.989251] SyS_sendto+0x8a/0xb0 [ 72.992704] do_syscall_64+0x309/0x430 [ 72.996611] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 73.001796] ================================================================== [ 73.009145] Disabling lock debugging due to kernel taint [ 73.014589] Kernel panic - not syncing: panic_on_warn set ... [ 73.014589] [ 73.021957] CPU: 1 PID: 6093 Comm: syz-executor2 Tainted: G B 4.16.0+ #83 [ 73.030093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.039439] Call Trace: [ 73.042030] dump_stack+0x185/0x1d0 [ 73.045658] panic+0x39d/0x940 [ 73.048873] ? __flow_hash_from_keys+0x10d8/0x1150 [ 73.053803] kmsan_report+0x238/0x240 [ 73.057608] __msan_warning_32+0x6c/0xb0 [ 73.061675] __flow_hash_from_keys+0x10d8/0x1150 [ 73.066440] __skb_get_hash_symmetric+0x14d/0x230 [ 73.071282] packet_rcv_fanout+0x38f/0x8d0 [ 73.075521] ? packet_direct_xmit+0xbf0/0xbf0 [ 73.080016] dev_queue_xmit_nit+0x111a/0x11e0 [ 73.084521] dev_hard_start_xmit+0x27c/0xc70 [ 73.088935] __dev_queue_xmit+0x22d9/0x2b60 [ 73.093266] dev_queue_xmit+0x4b/0x60 [ 73.097067] neigh_resolve_output+0xac6/0xb60 [ 73.101568] ? neigh_event_ns+0x360/0x360 [ 73.105752] ip_finish_output2+0x1238/0x1380 [ 73.110168] ip_finish_output+0xcb0/0xff0 [ 73.114319] ip_output+0x502/0x5c0 [ 73.117857] ? ip_mc_finish_output+0x3b0/0x3b0 [ 73.122440] ? ip_finish_output+0xff0/0xff0 [ 73.126757] ip_send_skb+0x5f3/0x820 [ 73.130470] ? __ip_local_out+0x5b0/0x5b0 [ 73.134622] ip_push_pending_frames+0x105/0x170 [ 73.139297] raw_sendmsg+0x2960/0x3ed0 [ 73.143211] ? compat_raw_ioctl+0x100/0x100 [ 73.147538] inet_sendmsg+0x48d/0x740 [ 73.151342] ? security_socket_sendmsg+0x9e/0x210 [ 73.156196] ? inet_getname+0x500/0x500 [ 73.160171] SYSC_sendto+0x6c3/0x7e0 [ 73.163888] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 73.169342] ? prepare_exit_to_usermode+0x149/0x3a0 [ 73.174370] SyS_sendto+0x8a/0xb0 [ 73.177826] do_syscall_64+0x309/0x430 [ 73.181726] ? SYSC_getpeername+0x560/0x560 [ 73.186055] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 73.191246] RIP: 0033:0x455319 [ 73.194431] RSP: 002b:00007efd224afc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 73.202140] RAX: ffffffffffffffda RBX: 00007efd224b06d4 RCX: 0000000000455319 [ 73.209406] RDX: 0000000000000004 RSI: 0000000020000040 RDI: 0000000000000014 [ 73.216672] RBP: 000000000072bea0 R08: 0000000020000140 R09: 0000000000000010 [ 73.223941] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 73.231210] R13: 00000000000004f7 R14: 00000000006fa7c8 R15: 0000000000000000 [ 73.239062] Dumping ftrace buffer: [ 73.242587] (ftrace buffer empty) [ 73.246269] Kernel Offset: disabled [ 73.249873] Rebooting in 86400 seconds..