f7d157a1e9c653dd8bfada3ae1eeb8a724fe381ab1035f8921755fc41ed2e08621b9008ee43afd38a8c0981dfd803b361cfe6f9a9c0274c2e8aed5e1ce2597d1b4bfb5a328afc0f2d0bda9ac76cb9a1f03eebd2db21879e227059c7f121c780fd8dbf2888575b52d3bc87a7ee3714ef3c"}) 2018/05/18 19:42:35 executing program 6: request_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140)="656d315b73656c66cf00", 0xfffffffffffffffa) r0 = socket$packet(0x11, 0x802, 0x300) sendfile(r0, r0, &(0x7f0000000000), 0x7) setsockopt$packet_int(r0, 0x107, 0x20000000001, &(0x7f00000000c0)=0x3, 0xa0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x4}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r2, &(0x7f0000000200)=0x4) 2018/05/18 19:42:35 executing program 3: request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000040)={0x73, 0x79, 0x2e}, &(0x7f00000000c0)='dns_resolver\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) sched_setparam(r0, &(0x7f0000000100)=0x8) 2018/05/18 19:42:35 executing program 5: r0 = memfd_create(&(0x7f00000002c0)="6194a878f708206eac6f983ba0b40c65b0b65340aca78f336dfbdfb747a3b119c71550fb43d0861bef3242c131e49014be138bb4f8a1ba81a0f2b941321f47bb73b58d3374deffa6cecd7512", 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180)) fgetxattr(r0, &(0x7f00000001c0)=@known='security.selinux\x00', &(0x7f0000000200)=""/42, 0x2a) 2018/05/18 19:42:35 executing program 2: r0 = add_key$keyring(&(0x7f0000000640)='keyring\x00', &(0x7f0000000680)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_reqkey_keyring(0xe, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20400, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xffffffff}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x6}, 0x8) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) 2018/05/18 19:42:35 executing program 4: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000040)={0x2, 0x8000, 0x9}) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'irlan0\x00', {0x2, 0x4e24, @rand_addr=0x4}}) r1 = socket$key(0xf, 0x3, 0x2) accept4$packet(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0x14, 0x80800) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@mcast2={0xff, 0x2, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x21}}, 0x8, 0x80000001, 0x0, 0x500, 0xfbd, 0x800000, r2}) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000100)={0x2, 0x1, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x60}, 0x1}, 0x0) ioctl$TIOCCONS(r1, 0x541d) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)={0x197, r3, 0x200, 0x70bd29, 0x25dfdbfc, {0x6}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0xa1e8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x4001) 2018/05/18 19:42:35 executing program 6: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x8, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000003c0)) 2018/05/18 19:42:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x301000, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) sendmsg$nl_netfilter(r2, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8008000}, 0xc, &(0x7f0000000240)={&(0x7f0000002300)={0x126c, 0x14, 0xf, 0x1, 0x70bd25, 0x25dfdbff, {0x3}, [@nested={0x10e8, 0x8d, [@typed={0x8, 0x8b, @fd=r0}, @generic="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", @typed={0x8, 0x42, @fd=r0}, @generic="f6be9a21debbfd0848a709a81903da87244d4e82f52f963b65ea2813d83dd09fcef0d5a80f7e2184c33c6195aa480ac0cdfded176dfcb95cae3dbd017c5a68642c855256488bad58ebc341bda6ee183fe758097df57512ea296269cdb778b18ae665d4b372b82e590504901d68f44547efe7f29ef0941abdb8810a125b9b2b7fd24a34a6881d42701d7e01e5aea559be67b3d91a680faf2578b28e49aacfc9f5ffac1dba2654e90845c2172c440dd1d2afd9650ca6d2ff3669fa6f3537718050c69fdc741636191dff47b9bb3ca06c2e9b"]}, @typed={0x8, 0x88, @str='\x00'}, @generic="077056ad887903df5befee31797180ede6d3e0a04355ce061358f9ebd4314dbba4bbd3300f101e5bf8c834dbe87334601e4e75aeec053a00586ef93f8e10045c865a347bb0222aeed36d6c878891d28d2bd0376272fae28041716f4ead22ae65bcb9deb63d5fb48c5e17b04b4ed8d13df50948aecb18daad3d6e16e616", @generic="e7be8c44e9619a204401561633a00c9ca9a9c95a33b2f96b51d7987ba898a4f01857b378cf33ba92d168a9137895226f40fb61ddf5691303113ed271b11a7e31886cb09f5b724164bdb953b9fdf5d75889b0d42b72976082555db58ac11409797683a5e05cf0c26363289b723772d5d57162a716bbb74fe7b50fdbe6e505516b06f7cb1f9541ce4344162f69a1bd9416f981d6c549c7a931d88a9a7baa33abcfecebdb574908e1cf6de2fc13ef186248bed5b95465e48b728cf654c001a3cbadbcc0be576ff5863ac6a5abe42053573f5204827bcfa684d0c98793f0aa4df371e729adf907a7722311a07e"]}, 0x126c}, 0x1, 0x0, 0x0, 0x20000080}, 0x40001) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000080)={{0x6a1663aa33d4755, @loopback=0x7f000001, 0x4e22, 0x3, 'dh\x00', 0x3b, 0x2, 0x7c}, {@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e20, 0x2003, 0x5, 0x3a, 0x1}}, 0x44) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000001c0)) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:35 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r1, r2, &(0x7f0000000080), 0x8000fffffffe) 2018/05/18 19:42:35 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000016) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000280)={0x2, {{0x2, 0x4e21, @multicast2=0xe0000002}}, 0x0, 0x4, [{{0x2, 0x4e21}}, {{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e24, @rand_addr=0x3}}, {{0x2, 0x4e24, @broadcast=0xffffffff}}]}, 0x290) 2018/05/18 19:42:35 executing program 0: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r3 = socket$inet(0x10, 0xf, 0xffffffffffffffff) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0xfffffffffffffffd, &(0x7f0000000280)=0x3e80000000, 0x4) r5 = fcntl$dupfd(r4, 0x0, r2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r5, 0xc08c5334, &(0x7f00000001c0)={0x4, 0x7fffffff, 0x1ff, 'queue0\x00', 0x200000000000000b}) r6 = dup(r4) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x10000000000000, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x800) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r6, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) fcntl$setsig(r7, 0xa, 0x3f) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000002c0), 0x4) r8 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) recvfrom$inet(r6, &(0x7f0000000300)=""/145, 0x91, 0x0, &(0x7f00000000c0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) ftruncate(r8, 0x80080) sendfile(r6, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/18 19:42:35 executing program 6: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x22000, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000000c0)=0x8, 0x4) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000340)=""/59) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1422020}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xe8, r2, 0x8, 0x70bd2a, 0x25dfdbff, {0x6}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8071}, @IPVS_CMD_ATTR_DAEMON={0x88, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2={0xff, 0x2, [], 0x1}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xad4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2=0xe0000002}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10000000}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local={0xfe, 0x80, [], 0xaa}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff00000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x1}, 0x4) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/05/18 19:42:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000040)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) fallocate(r0, 0x0, 0x8, 0x8) ioctl$int_in(r0, 0x5421, &(0x7f00000000c0)=0x9) recvmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000280)=@vsock={0x0, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x4}, 0x1000}, {{&(0x7f0000001300)=@ll, 0x80, &(0x7f0000001580)=[{&(0x7f0000001380)=""/197, 0xc5}, {&(0x7f0000000200)}, {&(0x7f0000001480)=""/229, 0xe5}], 0x3, &(0x7f00000015c0)=""/151, 0x97, 0x4}, 0x6}, {{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001680)=""/226, 0xe2}], 0x1, &(0x7f00000017c0)=""/14, 0xe, 0x5}, 0x5ef7}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000001800)=""/109, 0x6d}, {&(0x7f0000001880)=""/112, 0x70}, {&(0x7f0000001900)=""/64, 0x40}, {&(0x7f0000001940)=""/177, 0xb1}, {&(0x7f0000001a00)=""/110, 0x6e}, {&(0x7f0000001a80)=""/238, 0xee}], 0x6, &(0x7f0000001c00)=""/76, 0x4c, 0x3f}, 0x1}, {{&(0x7f0000001c80)=@generic, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001d00)=""/254, 0xfe}], 0x1, &(0x7f0000001e40), 0x0, 0xfffffffeffffffff}, 0x7d8958a4}], 0x5, 0x0, &(0x7f0000001fc0)={0x0, 0x989680}) readv(r0, &(0x7f0000000200)=[{&(0x7f0000002100)=""/188, 0xbc}, {&(0x7f00000021c0)=""/246, 0xf6}], 0x2) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x5) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000001e40)={0x0}) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f00000023c0)={r4, 0x8, &(0x7f00000022c0)=[0x200, 0x2, 0x789, 0x56, 0x1f, 0x16f5, 0x1, 0xfc1c], &(0x7f0000002300)=[0x4, 0x4, 0x2, 0x7cd47cc3, 0x8, 0x10000, 0xfffffffffffffffd, 0xff, 0x3], 0x20, 0x6, 0x1f, &(0x7f0000002340)=[0x80, 0x8, 0x6, 0xffffffffffffffd2, 0x877, 0x1f], &(0x7f0000002380)=[0x13a]}) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000002000)=ANY=[@ANYBLOB="24000000290097e2000000000000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000079d94073780d59d9dce00000000007cec42b53787f5e540e8f600c866cfffa61afb6cafa1b3b4b5b0dd468fde7fbac3cfd80058e7ce72bc67470e7cd5787bc4e402782a8e53f1011790f0fb523f315e634059c2db69fbbdf9ff79435798cda870d3dbb755eeeb68691c8a1a9509416a60b2d8ffcaff0f000000000000cd62ad79a6874a4dab690138b91a07ff01bcef7c8e527ad0e3a0f783185a0ac02baefc5430bc87284ca8750000000000000000000000000000"], 0x24}, 0x1}, 0x0) 2018/05/18 19:42:35 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) r1 = getpgrp(0x0) setpriority(0x0, r1, 0x200) ioctl(r0, 0x8912, &(0x7f0000000000)="c626222c852387b92cf66f62ed556307d0bc9b748fe71a653ce70c93fc7fe757e2c3129ad59073a6c913a25edf4933a93b0c319561fe77f38845565060c7c4fe72673e63964b8eb39e157b9887182c59a8e883") keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 2018/05/18 19:42:36 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = dup(r0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000004000)=0x1000, 0x4) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000003ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) 2018/05/18 19:42:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) ioctl$IOC_PR_RESERVE(r3, 0x401070c9, &(0x7f0000000180)={0x8, 0x401}) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) r4 = open(&(0x7f0000000080)='./file1/file0\x00', 0x200, 0x85) getsockopt$inet_dccp_int(r4, 0x21, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x4) dup(r2) ioctl$int_out(r0, 0x2, &(0x7f00000001c0)) 2018/05/18 19:42:36 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x2) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) chmod(&(0x7f0000000240)='./file0\x00', 0x0) 2018/05/18 19:42:36 executing program 6: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40000, 0x0) getsockopt$ipx_IPX_TYPE(r0, 0x100, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) futex(&(0x7f0000000140), 0x400000088, 0x0, &(0x7f0000001ff0), &(0x7f0000000100), 0x0) 2018/05/18 19:42:36 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000100)={0x2, 0x1, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x60}, 0x1}, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x482, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000040)={0x7, 0x1, {0x1, 0x3, 0x3, 0x3}}) 2018/05/18 19:42:36 executing program 2: r0 = socket(0x2, 0x1, 0x2000000000000000) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) ioctl$int_out(r1, 0x5460, &(0x7f00000000c0)) r3 = socket$packet(0x11, 0x3, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) getsockopt$packet_int(r3, 0x107, 0x15, &(0x7f0000004000), &(0x7f0000001ffc)=0x4) 2018/05/18 19:42:36 executing program 0: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r3 = socket$inet(0x10, 0xf, 0xffffffffffffffff) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0xfffffffffffffffd, &(0x7f0000000280)=0x3e80000000, 0x4) r5 = fcntl$dupfd(r4, 0x0, r2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r5, 0xc08c5334, &(0x7f00000001c0)={0x4, 0x7fffffff, 0x1ff, 'queue0\x00', 0x200000000000000b}) r6 = dup(r4) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x10000000000000, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x800) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r6, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) fcntl$setsig(r7, 0xa, 0x3f) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000002c0), 0x4) r8 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) recvfrom$inet(r6, &(0x7f0000000300)=""/145, 0x91, 0x0, &(0x7f00000000c0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) ftruncate(r8, 0x80080) sendfile(r6, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/18 19:42:36 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}, 0xd, r4}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f000006b000)={{r5, r6+30000000}, {0x0, 0x9}}, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000016) ioprio_set$pid(0x3, r2, 0x6) 2018/05/18 19:42:36 executing program 6: socketpair$inet6(0xa, 0x0, 0x5, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0xd80}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r1, &(0x7f0000000140)=0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x600000, 0x0) ioctl$sock_bt(r2, 0xdd17, &(0x7f0000000280)="38b265d8733328de99d933af6715f7032d11e0a1f0a5c3d8ade70de7f3d7c7edb6c611709c6f409afb0aa48727a54cb7d8fa2eb89d20af36f61fe1929eb98dfe003be0e4da49f402bd09510402bfc5e4febcba1c2ad1b72ca187bb4d7da43e40070e53e657ce105cfe0e6dd5c7f13e05dab23a0bccd5ec610ab13e4642204c965b8563d124263fe1cdb6b9c3ef8ee9b63a2652c444105b5808af1a") r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r4 = socket(0x12, 0x0, 0x4) ioctl$sock_ifreq(r4, 0x89f2, &(0x7f0000000000)={'sit0\x00', @ifru_mtu}) 2018/05/18 19:42:36 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x1, 0x70bd2a, 0x25dfdbfb, {0x3}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_PORT={0x8, 0x1, 0x6f22}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x5) mprotect(&(0x7f0000489000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) prctl$setname(0xf, &(0x7f0000000000)='-%^wlan1vboxnet0security(\x00') 2018/05/18 19:42:36 executing program 5: r0 = socket(0x2, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000180)={'bond0\x00', 0x9}) r1 = socket(0x10, 0x2, 0x0) bind$netlink(r1, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000100a00}, 0xc) ioctl$int_out(r1, 0x2, &(0x7f0000000000)) getsockopt$inet_dccp_int(r1, 0x21, 0x1f, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet6_int(r1, 0x29, 0x3f, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = getpgid(0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/netlink\x00') sendfile(r1, r3, &(0x7f0000000080)=0x100000, 0x10000480000502) 2018/05/18 19:42:36 executing program 1: r0 = creat(&(0x7f0000000140)='./file1\x00', 0x1) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000180), 0x10) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r4 = getpgrp(0xffffffffffffffff) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[], 0x4, 0x1, 0xfffffffffffffff9, 0x10001, 0x7d, r4}) r5 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r6 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={"79616d300001178b00", 0x4012}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r7 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r2, r7, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:36 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ustat(0x7, &(0x7f0000000100)) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rfkill\x00', 0x200000020002, 0x0) ioctl$sock_netrom_TIOCINQ(r0, 0x541b, &(0x7f00000004c0)) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000500)=0x104080) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000540)=0xffffffff, 0x4) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x3, 0x100000001}) recvmsg$netrom(r0, &(0x7f0000000480)={&(0x7f0000000040)=@ax25={0x3, {"0cec1a11890a98"}, 0x80000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000140)="629c0468f6fdb41f9cfda91d0fd699a5676c7b5d75fad4ce3a7efae0ae3a15181ab2350cf1faca6a99a9a823362e5b3fb5131c4ede6ef46c16055d2f633dd14ad99d32bf889f1a81daed86d83ff4a5c7034d33e82f8166bf00288b0c788b3ab61595411a2ef7f893f9a26394694905250a4c3ab3e11960cb990129ef8cfc4809f8ceeb097c2afb52533fc8f7c1eb67", 0x8f}, {&(0x7f0000000080)="a74566103182ee4a68d42d4ab39e27878444e3f13965501bb2be0dce119db2a378d4b58f1d4a175ec893a18aea70d00a23c1f71a3268cd860b72ec4f1cb6e68b6e", 0x41}, {&(0x7f0000000200)="3155d6160bdbf0bd767bfa089170ad82db9034cab4f720ed93154e17dda606e5e894bd1e86d0daab69fc3a24444247a8b452f143b207e57f8db936f84b978ebfcc7330ad64c5ed709bd53d869f5fb93f1016f8a484c0c2ea1912befb252e587a05129763c73d58eb71bd7d9b62b50bc7884ea5eedf8840ecf0eca822", 0x7c}], 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x190, 0x4000}, 0x2002) 2018/05/18 19:42:36 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000000000000000000000000004000000000000000000000009d2e000000e9e49063d64f5700000000003804000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 2018/05/18 19:42:36 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40000, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x6) signalfd(r0, &(0x7f0000000080), 0x8) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000100)=ANY=[@ANYBLOB="020100000c0000000000000000000e0005000600000000000a0000000000000800000000000000002000000000000000000000000000000005000500000000000a00000000000000ff01000000000000000000002f0000010000000000000000"], 0x60}, 0x1}, 0x0) 2018/05/18 19:42:36 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000000), 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x20201) fcntl$setstatus(r2, 0x4, 0x2800) sendto$ipx(r0, &(0x7f0000000000)="d3412c8be0b149a2cf956c72ba7febb30e8a8bb655482d23aaaa183639d863d4eb7fecc84e18c92febf67739e6969204d62b3f4a8bd033d82542cb845d03fc59183099e50cbc86bd321b372c17606a8477ca61a0b6a29ef0d394b3393844468b8124261adf9209fb90151aae2bd5419fe34206", 0x73, 0x4000000, &(0x7f0000000080)={0x4, 0x20, 0x472eedcf, "aef773e0befb", 0x4}, 0x10) write(r2, &(0x7f0000000180)="bf", 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000698000)=0x3) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200, 0x0) close(r1) 2018/05/18 19:42:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3000, 0x2, &(0x7f0000ffa000/0x3000)=nil) listen(r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000180)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@dev={0xac, 0x14, 0x14}, @loopback=0x7f000001]}, 0x18) setsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f0000231000)={@multicast2=0xe0000002, @loopback=0x7f000001, @loopback=0x7f000001}, 0xc) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x20000, 0x0) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000140)=0x44) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000080)={0x4800}, 0x8) sendto$inet6(r3, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002c00)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000002bc0)={&(0x7f0000000380)={0x14}, 0xfffffffffffffe62}, 0x1}, 0x0) 2018/05/18 19:42:38 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) r1 = inotify_init1(0x0) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x1ff, 0x100) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000140)="8b1ecd38a316307f034850bedc2fb1148f72cf5f852d001c12e8fe76a90410910a2b72d8be0e7d3bdb944c96692fc750585ef58df93b79d928c0cf41017424c32d1644e0e9eb437fcab4ab7307d68942a5e5eed0876a2ec359e13993e9d64b15b7c957e5ce6a56237b94692ebaa8db49486b6b0e6b1c9ccb4e84", 0x7a) fcntl$setstatus(r1, 0x4, 0x2000) 2018/05/18 19:42:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) vmsplice(r1, &(0x7f0000000080), 0x0, 0xc) 2018/05/18 19:42:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffbff, 0x20000) getsockopt$inet6_int(r0, 0x29, 0x50, &(0x7f0000000080), &(0x7f0000000040)=0x574cf88) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f00000000c0)=0x2, 0x4) 2018/05/18 19:42:38 executing program 2: clone(0x0, &(0x7f0000b53000), &(0x7f0000000080), &(0x7f0000c35ffc), &(0x7f0000000000)) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)="2d7d7365637572697479c9232e5b00", &(0x7f0000000100)='$ppp1\x00', &(0x7f0000000140)='/%selinuxppp0-bdevGGPL\x00', &(0x7f0000000180)='#\x00'], &(0x7f00000003c0)=[&(0x7f0000000200)='{}/)\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='!]\x00', &(0x7f0000000380)='}cgroupbdev\x00'], 0x800) mq_timedreceive(0xffffffffffffffff, &(0x7f00000002c0)=""/103, 0x67, 0x0, &(0x7f0000000340)={0x77359400}) 2018/05/18 19:42:38 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) getrusage(0x1, &(0x7f0000000000)) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000100)={0x2, 0x1, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x60}, 0x1}, 0x0) 2018/05/18 19:42:38 executing program 0: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r3 = socket$inet(0x10, 0xf, 0xffffffffffffffff) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0xfffffffffffffffd, &(0x7f0000000280)=0x3e80000000, 0x4) r5 = fcntl$dupfd(r4, 0x0, r2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r5, 0xc08c5334, &(0x7f00000001c0)={0x4, 0x7fffffff, 0x1ff, 'queue0\x00', 0x200000000000000b}) r6 = dup(r4) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x10000000000000, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x800) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r6, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) fcntl$setsig(r7, 0xa, 0x3f) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000002c0), 0x4) r8 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) recvfrom$inet(r6, &(0x7f0000000300)=""/145, 0x91, 0x0, &(0x7f00000000c0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) ftruncate(r8, 0x80080) sendfile(r6, r8, &(0x7f0000d83ff8), 0x2008000fffffffe) 2018/05/18 19:42:38 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) r2 = gettid() timer_create(0x0, &(0x7f00000004c0)={0x0, 0x12}, &(0x7f0000044000)=0x0) syz_emit_ethernet(0x56, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000aaaaaaaaaa158100490088480000000000000000000000000000000000000000003b8225c68b7bdcef18c54294000000000000000000000047230024006400ff06bb9078ac14140cac1414180707ff80"], &(0x7f0000000000)={0x1, 0x2, [0x313, 0x43b, 0x46d, 0x33b]}) clock_gettime(0x0, &(0x7f00000002c0)) clock_gettime(0x400000000, &(0x7f0000000380)={0x0, 0x0}) socket$nl_netfilter(0x10, 0x3, 0xc) timer_settime(r3, 0x0, &(0x7f0000000340)={{0x0, 0x8}, {r4, r5+30000000}}, &(0x7f0000000300)) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x501000, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r6, 0x40a85321, &(0x7f0000000400)={{0xfff, 0x1}, 'port1\x00', 0x76, 0x1, 0x8, 0x1, 0x50b0, 0x7ff, 0x80000000, 0x0, 0x2, 0x25}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000016) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000500)={0x3f, @dev={0xac, 0x14, 0x14, 0xc}, 0x4e20, 0x3, 'lblcr\x00', 0x4, 0x0, 0x27}, 0x2c) ppoll(&(0x7f0000000080)=[{r0, 0x62}, {r1, 0x8000}, {r0, 0x4}, {r0, 0x40}], 0x4, &(0x7f0000000200)={0x0, 0x1c9c380}, &(0x7f0000000280)={0x800000}, 0x8) 2018/05/18 19:42:38 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020100090a0000000001000000000000020010000000000900000000000003000600000000000200004f8fc2ddbd07b671530700000000000000000000000000030005000000000002000000e000305341f8aa8960084da5800000000000000000f26722142860aa699bedf93d7b0dc39e4de6304a0797b4e392ae1364d52eb69c2beb72ab368b4671a2ee5d58ec691ef6eea737579d308a867700af39095bdfab8bc8887c65deff385a8866c209988fdafd04b1aa236656ff2692a47f46aaaaa69160b0f6d77a442d39237fffea900cad"], 0x50}, 0x1}, 0x0) 2018/05/18 19:42:38 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) sendfile(r0, r2, &(0x7f0000000000), 0x7ffffffe) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000080)={0x1ff, 0x26, "657cada1f86abda730f6014fc442a89cc7d148d560919c1daf8f34725b8af657f7442f7a3efe"}) [ 401.310646] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:38 executing program 2: clone(0x0, &(0x7f0000b53000), &(0x7f0000000080), &(0x7f0000c35ffc), &(0x7f0000000000)) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)="2d7d7365637572697479c9232e5b00", &(0x7f0000000100)='$ppp1\x00', &(0x7f0000000140)='/%selinuxppp0-bdevGGPL\x00', &(0x7f0000000180)='#\x00'], &(0x7f00000003c0)=[&(0x7f0000000200)='{}/)\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='!]\x00', &(0x7f0000000380)='}cgroupbdev\x00'], 0x800) mq_timedreceive(0xffffffffffffffff, &(0x7f00000002c0)=""/103, 0x67, 0x0, &(0x7f0000000340)={0x77359400}) 2018/05/18 19:42:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) mknod$loop(&(0x7f0000000080)='./file1\x00', 0x7000, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$packet(r1, 0x0, &(0x7f0000000180), 0x80000) accept$packet(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x14) fchdir(r0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000000)='./file1\x00', 0x600000, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', r3, &(0x7f0000000140)='./file1\x00') r5 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:38 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x1, 0x0, 0x10000000, 0x118, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x60}, 0x1}, 0x0) 2018/05/18 19:42:38 executing program 3: r0 = socket(0x0, 0x803, 0x4) write(r0, &(0x7f0000000280)="220000002100070700be875d09001c010a00001e0001090000000800050003800010", 0x22) 2018/05/18 19:42:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, 0x1c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x200000, 0x0) sendto$llc(r1, &(0x7f0000000300)="98b3a6a38a21ae331abb9fd308d7a3f0db9bd66f4512ae2e92fa19e167a9bde10f8249692beff05b334b67eec94af3c836289c6c4929d20b129020b96f23769c9f9fa2167ad24d988681ccbfe89647581b9ca927ad5a5dff91fe70ae457ed3b9f3f32670741822b55cfcdbf0d967c5d77afc628d9a4e4a52b1eeb6379741a37ba1df67d6b6dbfca776b717b2a13307bcaebabf886756124f155ac6198611e36709e5", 0xa2, 0x4000000, &(0x7f00000003c0)={0x1a, 0x313, 0x5, 0x100000001, 0x8, 0x2, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x40000}, &(0x7f0000000040)=0x8) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000100)=0x54) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x4, 0x8, 0x200, 0x6, 0x2, 0x0, 0x6, 0x7fffffff, r2}, 0x20) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x1) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000280)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}], 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='bcsh0\x00') 2018/05/18 19:42:39 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80202, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000040)={{0x0, 0xf2}, {0x3f800000000000, 0x8}, 0x10000, 0x2, 0x4}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) ptrace$setregs(0xf, r2, 0x0, &(0x7f0000000000)) 2018/05/18 19:42:39 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@dev={0xac, 0x14, 0x14}, @loopback=0x7f000001]}, 0x18) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="e00000027f0000010100000000080000"], 0x10) 2018/05/18 19:42:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000080)=0x1) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:39 executing program 0: clone(0x0, &(0x7f0000000140), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4) r1 = accept4(r0, &(0x7f0000000140)=@rc, &(0x7f0000000080)=0x80, 0x80800) getegid() bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x0, @rand_addr=0x4}}, 0x1e) 2018/05/18 19:42:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = gettid() r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @dev, @dev}, &(0x7f0000000180)=0xc) getpeername$packet(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000002c0)={0x0, @dev, @loopback}, &(0x7f0000000300)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000340)={0x0, @loopback}, &(0x7f0000001400)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000002bc0)={@empty, 0x0}, &(0x7f0000002c00)=0x14) getsockname$packet(r0, &(0x7f0000002c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000002c80)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002d80)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002e80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002f80)={'lo\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002fc0)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000031c0)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000032c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000033c0)={'vlan0\x00', 0x0}) getpeername$packet(r0, &(0x7f0000003400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000003440)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003480)={{{@in=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000003580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000035c0)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast1}}, &(0x7f00000036c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003700)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003800)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000003840)={@empty, @remote, 0x0}, &(0x7f0000003880)=0xc) accept$packet(r0, &(0x7f00000038c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000003900)=0x14) accept4(r0, &(0x7f0000003940)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000039c0)=0x80, 0x800) accept$packet(r0, &(0x7f0000003b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000003b40)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003b80)={'tunl0\x00', 0x0}) accept$packet(r0, &(0x7f0000003bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000003c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000003d40)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000004900)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000004a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000008300)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000008400)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000008440)={@dev, 0x0}, &(0x7f0000008480)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000084c0)={@rand_addr, @multicast1, 0x0}, &(0x7f0000008500)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000008540)={@empty, 0x0}, &(0x7f0000008580)=0x14) getsockname$packet(r0, &(0x7f0000008680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000086c0)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000008700)={0x0, @dev, @rand_addr}, &(0x7f0000008740)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000008840)={'yam0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000008880)={'veth1\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008d00)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000008e00)=0xe8) getsockname$packet(r0, &(0x7f0000009100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000009140)=0x14) accept$packet(r0, &(0x7f0000009280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000092c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000010380)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000010480)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000104c0)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000105c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000010600)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000010700)=0xe8) getpeername$packet(r0, &(0x7f0000011b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000011b40)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000011c80)={0x0, @rand_addr, @remote}, &(0x7f0000011cc0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000011d00)={'rose0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000012100)={@dev, @empty, 0x0}, &(0x7f0000012140)=0xc) getsockname$packet(r0, &(0x7f0000012440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000012480)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000012540)={@local, @empty, 0x0}, &(0x7f0000012580)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000012680)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000013300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000132c0)={&(0x7f0000004a40)=ANY=[@ANYBLOB="d00b0000", @ANYRES16=r2, @ANYBLOB="04002cbd7000fbdbdf250300000008000100", @ANYRES32=r3, @ANYBLOB="b00002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004002a8d000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000000000008000100", @ANYRES32=r5, @ANYBLOB="fc00020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000400000008000600", @ANYRES32=r6, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004006000000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="400002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="6801020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000009001b000000000000000800030003000000080004008045de5486871cadda51b64ff1feffc70add871d90891b0941ac4d4e3c0b29bc27a0ede0af05f00a984a0bfa8620c67ea55d2aa910c3", @ANYRES32=r15, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400070000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r16, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ff00000008000600", @ANYRES32=r17, @ANYBLOB="08000100", @ANYRES32=r18, @ANYBLOB="7400020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400ee4a00003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r19, @ANYBLOB="08000100", @ANYRES32=r20, @ANYBLOB="3801020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000500000008000600", @ANYRES32=r21, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000000010008000600", @ANYRES32=r22, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r23, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400010400003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r24, @ANYBLOB="08000100", @ANYRES32=r25, @ANYBLOB="e401020038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400ff01000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400f7ffffff08000600", @ANYRES32=r26, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000600000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400010000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r27, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004008100000008000600", @ANYRES32=r28, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r29, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r30, @ANYBLOB="08000100", @ANYRES32=r31, @ANYBLOB="380102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r33, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r34, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000500000008000600", @ANYRES32=r35, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000500000008000600", @ANYRES32=r36, @ANYBLOB="08000100", @ANYRES32=r37, @ANYBLOB="e801020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400020000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r38, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000500000008000600", @ANYRES32=r39, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r40, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000400000008000600", @ANYRES32=r41, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r42, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r43, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004003c0b000008000600", @ANYRES32=r44, @ANYBLOB="08000100", @ANYRES32=r45, @ANYBLOB="6801020038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400050000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r46, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400fdffffff38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400950e000040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e0000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32=r47], 0xbd0}, 0x1, 0x0, 0x0, 0x81b998c9c4016e69}, 0x0) process_vm_writev(r1, &(0x7f0000000200)=[{&(0x7f0000000380)=""/72, 0x48}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x2, &(0x7f0000002b00)=[{&(0x7f0000001500)=""/205, 0xcd}, {&(0x7f0000001600)=""/183, 0xb7}, {&(0x7f00000016c0)=""/144, 0x90}, {&(0x7f0000001780)=""/174, 0xae}, {&(0x7f0000001840)=""/59, 0x3b}, {&(0x7f0000001880)=""/161, 0xa1}, {&(0x7f0000001940)=""/186, 0xba}, {&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/239, 0xef}], 0x9, 0x0) 2018/05/18 19:42:39 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) tkill(r2, 0x1000000000016) 2018/05/18 19:42:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={r2, 0x7fff, 0x4, 0x1ff, 0x2, 0xb5f}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) 2018/05/18 19:42:39 executing program 6: prctl$intptr(0x1d, 0xbffffffffffff2fd) r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x3ff, &(0x7f0000000080), 0x8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000140)={0x0, @loopback, @local}, &(0x7f0000000180)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', r2}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f00000000c0)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r4 = eventfd(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000d36ff4)={0x4}) 2018/05/18 19:42:39 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000040)=""/216, 0xd8}], 0x1) mmap(&(0x7f0000bdb000/0x3000)=nil, 0x3000, 0x10000004, 0x32, r2, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000180)) tkill(r1, 0x1000000000016) 2018/05/18 19:42:39 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0xffffffec) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x220040, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0xc0508422}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x700, 0x70bd28, 0x25dfdbfd, {0x1}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3b}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44010}, 0x4004040) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) syz_fuseblk_mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', 0x0, r4, 0x0, 0x0, 0x100000001, 0x2003010) write$selinux_create(r1, &(0x7f0000000580)=ANY=[], 0xfe53) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000580), &(0x7f00000005c0)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) capset(&(0x7f00000001c0)={0x200f1526, r5}, &(0x7f0000000200)={0x2, 0x6, 0xca, 0x0, 0x4, 0xff}) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) close(0xffffffffffffffff) getpeername$llc(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000400)=0x10) 2018/05/18 19:42:39 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') r2 = socket(0x2, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") rename(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)='./control\x00') creat(&(0x7f0000000100)='./file0\x00', 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00') close(r0) 2018/05/18 19:42:39 executing program 3: clone(0x0, &(0x7f0000000140), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) memfd_create(&(0x7f0000000000)='#+loem1self\x00', 0x0) delete_module(&(0x7f0000000040)='%/cgroup\x00', 0x800) 2018/05/18 19:42:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:40 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)={0x3}) poll(&(0x7f0000000000)=[{r1}], 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) sendto$llc(r2, &(0x7f0000000040)="334a7a65430d4fb99060278320b8ed5e0fecec3ac63336a0f4a5a8aad8b61b54", 0x20, 0x880, &(0x7f0000000080)={0x1a, 0x0, 0x56a8, 0xffffffff, 0x0, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x10) 2018/05/18 19:42:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, 0x1c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x200000, 0x0) sendto$llc(r1, &(0x7f0000000300)="98b3a6a38a21ae331abb9fd308d7a3f0db9bd66f4512ae2e92fa19e167a9bde10f8249692beff05b334b67eec94af3c836289c6c4929d20b129020b96f23769c9f9fa2167ad24d988681ccbfe89647581b9ca927ad5a5dff91fe70ae457ed3b9f3f32670741822b55cfcdbf0d967c5d77afc628d9a4e4a52b1eeb6379741a37ba1df67d6b6dbfca776b717b2a13307bcaebabf886756124f155ac6198611e36709e5", 0xa2, 0x4000000, &(0x7f00000003c0)={0x1a, 0x313, 0x5, 0x100000001, 0x8, 0x2, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x40000}, &(0x7f0000000040)=0x8) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000100)=0x54) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x4, 0x8, 0x200, 0x6, 0x2, 0x0, 0x6, 0x7fffffff, r2}, 0x20) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x1) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000280)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}], 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='bcsh0\x00') 2018/05/18 19:42:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getdents64(r1, &(0x7f0000000180)=""/110, 0x6e) fcntl$setstatus(r1, 0x4, 0x4) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000240)='./file1\x00', 0x0, 0x80) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x2000001, 0x1010, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, &(0x7f00000000c0)=0x4e, 0x8000fffffffe) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x1000, 0x70b, 0x4000}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r5, 0x7}, &(0x7f0000000280)=0x8) 2018/05/18 19:42:40 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0xffffffec) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x220040, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000480)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0xc0508422}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r3, 0x700, 0x70bd28, 0x25dfdbfd, {0x1}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3b}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44010}, 0x4004040) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) syz_fuseblk_mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', 0x0, r4, 0x0, 0x0, 0x100000001, 0x2003010) write$selinux_create(r1, &(0x7f0000000580)=ANY=[], 0xfe53) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000580), &(0x7f00000005c0)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) capset(&(0x7f00000001c0)={0x200f1526, r5}, &(0x7f0000000200)={0x2, 0x6, 0xca, 0x0, 0x4, 0xff}) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) close(0xffffffffffffffff) getpeername$llc(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000400)=0x10) 2018/05/18 19:42:40 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x4e24, @multicast1=0xe0000001}}) r2 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x8001) time(&(0x7f00000002c0)) setsockopt$sock_void(r2, 0x1, 0x3f, 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/95, 0x5f}], 0x1) r3 = gettid() ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000380)={{0xdc}, 'port1\x00', 0xc0, 0x404, 0x4, 0x2, 0x8, 0x7, 0x10000, 0x0, 0x1, 0xb99d}) timer_create(0xfffffffffffffffd, &(0x7f00000001c0)={0x0, 0x6, 0x2000000000000001}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r3, 0x1000000000016) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000080)=0x3638f28a) 2018/05/18 19:42:40 executing program 6: mlockall(0x2) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x4000, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000540)=""/91) inotify_init() r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x62000, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) r2 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r3, 0x1, 0x1d, &(0x7f0000000040), &(0x7f0000000000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000680)={0x227, {{0xa, 0x4e23, 0x81, @dev={0xfe, 0x80, [], 0x1c}, 0xc949}}, 0x0, 0x4, [{{0xa, 0x4e22, 0x8, @loopback={0x0, 0x1}, 0x1}}, {{0xa, 0x4e20, 0x8, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x14}, 0x100}}, {{0xa, 0x4e22, 0x6, @mcast2={0xff, 0x2, [], 0x1}, 0x9}}]}, 0x290) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4e22, 0x7, 0x4e21, 0x8, 0x0, 0xa0, 0xa0, 0x7c, r4, r5}, {0x3, 0x7, 0x400, 0xffff, 0x1, 0x8, 0x100000000080, 0x2}, {0x20b253a5, 0xfffffffffffffffd, 0x1}, 0x7, 0x6e6bb4, 0x2, 0x0, 0x1, 0x3}, {{@in6, 0x4d5, 0xff}, 0xa, @in6, 0x3500, 0x1, 0x0, 0x0, 0xffffffffffff2467, 0x9, 0x1644eaa4}}, 0xe8) sendmsg$nl_route(r1, &(0x7f0000000640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1004000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5d8cb249420004012dbd7000fbdbdf2500000000"], 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x40090) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"69df01010000ffffffffffff0400005d", 0x103}) r6 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="4cd4b3bce137d085000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000fd778e407be90bc10be663dae2b9f65fc8a92b3af4c349719874a5e092ed95dab2491066d2dcff38c387bb5b85c45e4cf3a804003b2cf6e4534e1947336f85f8ae04c5a45b1e2087c220a4ab7fad3e9dc169fe"], 0x28}, 0x1}, 0x0) dup3(r6, r2, 0x0) 2018/05/18 19:42:40 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000053ff3)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8003, 0x0) fcntl$getown(r0, 0x9) mmap$binder(&(0x7f0000055000/0x1000)=nil, 0x1000, 0x1, 0x40010, r1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) munmap(&(0x7f0000000000/0x600000)=nil, 0x600000) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x989680}}) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000240)='(\x00') getpeername(r1, &(0x7f0000000180)=@pppol2tpv3, &(0x7f0000000200)=0x80) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x2000, 0x0) 2018/05/18 19:42:40 executing program 5: r0 = memfd_create(&(0x7f0000000240)='\x00', 0x3) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getegid() ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}) recvfrom$inet6(r1, &(0x7f0000000300)=""/193, 0xc1, 0x3c, 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000005c0)=0x8) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x151600, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000001c0)={0x6, 0x70, 0x1, 0x3, 0x0, 0xa5, 0x0, 0xfffffffffffffff7, 0x40000, 0x1, 0xe1, 0x7, 0x6, 0x4, 0x0, 0xe73, 0x6, 0xd6e, 0xfffffffffffffffa, 0x401, 0xfc00000000000000, 0x8, 0x100, 0x7, 0x2, 0x8001, 0x8001, 0x8, 0x8000, 0x81, 0x3f, 0x1ff, 0x77, 0xffffffffffffffff, 0x5, 0x0, 0x3, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x5, 0x1}, 0x400, 0x4, 0x2, 0x1, 0x5e, 0x3, 0x7}) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000180)=0x2, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000040)={0x0, 0xbb85}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r3, 0x8, 0x0, 0x8, 0x8}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000500)={0x2}, 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000400)={r4, @in6={{0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0xc}, 0x7}}, 0x4, 0x43ed, 0xf6, 0x427c, 0x6}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000540)={0x1000, 0x7df1, 0xcb724aee82d70bd1, 0xffffffffffffffff, 0x7, 0x2, 0x8000, 0x7ff, r5}, &(0x7f0000000580)=0x20) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000080)={0x5, 0x9, 0x6219, 0xf03, 0xffffffff, 0x400}) 2018/05/18 19:42:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x2d23e47}, 0x68) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r0, r3, &(0x7f0000d83ff8), 0x5) inotify_add_watch(r3, &(0x7f0000000080)='./bus\x00', 0x10) 2018/05/18 19:42:40 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000180)={0x7, 0x0, 0x2, 0x4}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000001c0)={0x3, r1, 0x1, 0x80000001}) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000100)=[{r3}], 0x1, 0xfffffffffffffffa) socketpair(0x0, 0x5, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) getsockname$netlink(r4, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r5 = syz_open_pts(r3, 0x200000) r6 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x3c) r7 = dup3(r5, r3, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0x15) r8 = socket(0xa, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") keyctl$session_to_parent(0x12) tkill(r6, 0x32) [ 403.871565] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14305 sclass=netlink_route_socket 2018/05/18 19:42:40 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x80, @mcast2={0xff, 0x2, [], 0x1}, 0x3}}, [0x7, 0x3, 0x5, 0x0, 0x1, 0x1, 0x80000000, 0x9, 0x800, 0x6, 0x6, 0xffffffff, 0x4, 0x5, 0x2]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)={r1, 0x100000001, 0x2, [0x9, 0x5]}, &(0x7f0000000240)=0xbe) 2018/05/18 19:42:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)=0x0) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='cmdline\x00') fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x8000, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x2000, 0x0) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file1\x00', &(0x7f0000000280)='msdos\x00', 0x1020, &(0x7f00000002c0)="5ee0d0c0fa06a08a4dbb833d2d5b5f09a858707e165a9884507bf80b21f31c448b79ed17081f30014ade83bba969dc049d72c523dbc785cf393b30a07fd05fc42dc88da6078b8dcd77862b61c35e702985f3712e59b553e994f4880ce2448b3aca78ad901aecda4765ed4f41c17dc67ce3009433e9") ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000340)=0x3) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r5 = open(&(0x7f0000000040)='./bus\x00', 0x2000, 0x80) symlinkat(&(0x7f0000000180)='./bus\x00', r5, &(0x7f00000001c0)='./bus\x00') sendfile(r1, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:40 executing program 6: mlockall(0x2) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x4000, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000540)=""/91) inotify_init() r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x62000, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) r2 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r3, 0x1, 0x1d, &(0x7f0000000040), &(0x7f0000000000)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000680)={0x227, {{0xa, 0x4e23, 0x81, @dev={0xfe, 0x80, [], 0x1c}, 0xc949}}, 0x0, 0x4, [{{0xa, 0x4e22, 0x8, @loopback={0x0, 0x1}, 0x1}}, {{0xa, 0x4e20, 0x8, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x14}, 0x100}}, {{0xa, 0x4e22, 0x6, @mcast2={0xff, 0x2, [], 0x1}, 0x9}}]}, 0x290) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4e22, 0x7, 0x4e21, 0x8, 0x0, 0xa0, 0xa0, 0x7c, r4, r5}, {0x3, 0x7, 0x400, 0xffff, 0x1, 0x8, 0x100000000080, 0x2}, {0x20b253a5, 0xfffffffffffffffd, 0x1}, 0x7, 0x6e6bb4, 0x2, 0x0, 0x1, 0x3}, {{@in6, 0x4d5, 0xff}, 0xa, @in6, 0x3500, 0x1, 0x0, 0x0, 0xffffffffffff2467, 0x9, 0x1644eaa4}}, 0xe8) sendmsg$nl_route(r1, &(0x7f0000000640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1004000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5d8cb249420004012dbd7000fbdbdf2500000000"], 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x40090) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"69df01010000ffffffffffff0400005d", 0x103}) r6 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="4cd4b3bce137d085000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000fd778e407be90bc10be663dae2b9f65fc8a92b3af4c349719874a5e092ed95dab2491066d2dcff38c387bb5b85c45e4cf3a804003b2cf6e4534e1947336f85f8ae04c5a45b1e2087c220a4ab7fad3e9dc169fe"], 0x28}, 0x1}, 0x0) dup3(r6, r2, 0x0) 2018/05/18 19:42:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r0, r3, &(0x7f0000d83ff8), 0x5) inotify_add_watch(r3, &(0x7f0000000080)='./bus\x00', 0x10) 2018/05/18 19:42:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000140)=@routing={0x29, 0xe, 0x3, 0x3f, 0x0, [@loopback={0x0, 0x1}, @empty, @mcast1={0xff, 0x1, [], 0x1}, @ipv4={[], [0xff, 0xff], @rand_addr=0x5}, @empty, @loopback={0x0, 0x1}, @loopback={0x0, 0x1}]}, 0x78) fcntl$setstatus(r1, 0x4, 0x60fe) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000001c0)="7bee5041114977ad07d20698c836946ab0c0a9e1b8afbce00122c02a62491fc6999e21c7e85e38b9c724ec795f8d8dea61dc5c2af024c8a651e38cfeda642aec53cfaa39faca33df9b46281ae34341903ea6b98c60a81e02fcbc4dc08d9fb3bb01ee8f8f9f7e1c1890596840439fdb289f4006ddaa9a93c5e0e0b06c8bb35e454d8a140eb2273990c2810983f189ea35951e6cdb1ddd0ca1a1e38c590f3b7250457db2f4657adf292d535848fe4fbb70225185619098cda4141d7f62ce666dbd2d682ae354adf11cbb2425261776ab94d1bded14c774e0d974571ca61d844923b7dcefdc4bb34a75000000000000000000000000", &(0x7f00000005c0), &(0x7f00000000c0), &(0x7f0000000480)="b0a26bcc43a4e7ad38d4d19c07117cc665aa1c4587e7f1ccf9c64beffa31b225cc15") sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) [ 404.086048] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14305 sclass=netlink_route_socket 2018/05/18 19:42:41 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0)="f8f550e6", 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) socket$inet6(0xa, 0x0, 0x1000) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000100)=""/200) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0x4a, "570663fff7d86d86bf88b81f8c6e890473aa1e88fdeca375c7b9bdd487363eb41bcff37d63b097e65d20f098a11d650dcf59c3b08fcaa9aa91e81f44b15b02d625b561350d79fbad728e"}, &(0x7f0000000400)=0x52) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000440)={r3, 0x9, 0x169, 0x1}, &(0x7f0000000480)=0x10) sendto$inet6(r1, &(0x7f0000000040)="00810000000000000000", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x3, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x2fd6c0000000000, 0x0, 0x0, 0x0, 0x7fffffff, 0x3}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000340)=0xfffffffffffffcf7) r4 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000000040)) ioctl$TCFLSH(r0, 0x540b, 0x20000) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x10000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000002080)={@remote={0xfe, 0x80, [], 0xbb}, @remote={0xfe, 0x80, [], 0xbb}, @mcast1={0xff, 0x1, [], 0x1}, 0x1, 0x4ba, 0x7, 0x400, 0x5, 0x81000000, r6}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000140)={0xff5, 0x80000000, 0xffffffffffffff7f, 'queue1\x00', 0x3}) 2018/05/18 19:42:41 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x800, 0x0, 0xfffffffffffffff9}]}) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000014c0)=[0x5, 0x100000001]) prlimit64(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000200)) r1 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080)='\x00', 0xfffffffffffffffa) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000240)="52f302c6c9e252c4b264d901917a189a67bae69b337b40a7b3fa737a86e474696cbc8c42482a03c1cc2213d5b6f0a84e759c5f7165287ad037710242f832436cf97ba0a3ceef119edafe467b271c28bff4f59b18be7e1d491d1ad268e0785d3cd645b5", 0x63, 0xfffffffffffffffc) r3 = request_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000340)='-ppp1{\x00', 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000380)={r1, r2, r3}, &(0x7f00000003c0)=""/4096, 0x1000, &(0x7f0000001440)={&(0x7f00000013c0)={'tgr128\x00'}, &(0x7f0000001400)="1bcd2b5360cae5a448222274d608736666", 0x11}) 2018/05/18 19:42:41 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000180), 0x315) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='highspeed\x00', 0x162) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x7, 0x1, [0x4]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e22, 0x7, @empty, 0x1}}, [0x6, 0x4, 0xe900, 0xf2, 0x8, 0xffffffffffffff80, 0x4, 0x6, 0x7075, 0xa4, 0x9, 0x2, 0x2, 0x0, 0x3]}, &(0x7f00000000c0)=0x100) sendto$inet(r0, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 2018/05/18 19:42:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000240)={0x8, 0x0, 0x0, 0x8}) readlink(&(0x7f0000000280)='./bus\x00', &(0x7f0000000300)=""/14, 0xe) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000002c0)={0x5a5, r3, 0x1, 0xfffffffffffffffe}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x6, r4, 0x10000, 0x8}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000200)={0x3, r5}) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) listxattr(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)=""/157, 0x9d) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) fsync(r6) sendfile(r1, r6, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000180)={0x21c, 0xfffffffffffffff9}) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000140), 0x4) 2018/05/18 19:42:41 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="c626262c8523bf012cf66f") unlink(&(0x7f0000000180)='./file0\x00') r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x119140, 0x0) r3 = accept$unix(r2, &(0x7f00000009c0), &(0x7f0000000a40)=0x6e) sendmmsg(r1, &(0x7f0000001000)=[{{&(0x7f0000000080)=@llc={0x1a, 0x311, 0x0, 0x80, 0x16a00000000, 0x84, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000001c0)=[{0xd8, 0x113, 0x4, "bb72ab69e20cc3e944f4f0f67ce4ed943b760c1528e5ff5101673e19ea082d81a299fefb0192e91f54e8d94031e35c4d5e4815a8cad18e3878c55b95b7d79929925b86c6674eb9c680162a06155b2d1c1ed96f37b6f99f809bd21974d8fd38fe71a534e2709a6a0bb37d8762f7e321ab244681d39bffd576821b409f4d335e084c8b84c1f2eb30488d82160b8699c36096640b2bf2608c8541edf0df1333187fa44e7990e3e2fb1f4b829905e6b8278c0a33c5b59915080af9e16904e9800814a9"}, {0x50, 0x11e, 0x2, "a2b3f118d089774b2c27aff5b13224183338794f81f152e63857f1a9e7f775f613cadd6e8be80ef965da3a05306cae23269653d0f8912639e092dfff18"}], 0x128, 0x4000}, 0x3}, {{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="2383fc01d416d0127d1b075eed03682ddca8e28c1029f095", 0x18}, {&(0x7f0000000300)="dce90949873610f0cf0c828f78ee7e90cb3b20d9794ddeb5aa02524239e15fa732e4563318bdf826d1cef6734aba51d534cbb4d78b8158133851233ffb", 0x3d}, {&(0x7f0000000400)="704ff2395efc57c454a6ae7cc42d2835be1a8d47dc9a2f9ca4c437241bf5b7ecc46fd42f277f3590e3ced677665453e8ba3c3ffbbc771f0e8330acaf98b757cb4b2b3ecec886bff2ad34199a100646211be795eba541e2427584f0cbe2139c2ef018992bf73433907a2d91d6625d9558661f0fcbd6c164337e8d002613cd18e8e5b2ddd4a0c80690380d191b6d7fa38c8d5eeb433f1179728f8fc9705f2d0557bacfe54f5fecbad4ca7f6d4ab9f9036750fb927bc896d654c951ad7adc1410f9b547fc6fe60db8bd6bffd213c48de7e857be43182aacae0f46", 0xd9}, {&(0x7f0000000500)="10e58ec113c59bfe4677608d1292d20b5d173e015f0668ee56029dfac9bb0f16c2e769c79f3f697042c0edb366576539b86159e69c06f2f28b385afdeaae74fa9756", 0x42}], 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x320, 0x1}, 0x1010000000}, {{&(0x7f00000008c0)=@nl=@kern={0x10, 0x0, 0x0, 0x2c0000}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000940)="e7043f22d5919c5da626f0a2b927e09e63724bd154d6b58aed659ff491d00ac8725a4942e680f59141a6ec2ce7314afa49c7fd91aa8ae4cd2abfdf20668255f4fdb088d77f75adf411cbd0bff4506295c1025f00996e8110e1a29b00c7ce", 0x5e}, {&(0x7f00000010c0)="b49d891dee6080348471def0d3942ac0cdfdd8b585b1d036132c08f510f517d1f5496f8e6384f1e301155e5878d9515f99bfab55febc384b10d14efffa1a1cb25c62bd61cc64d95b3868b9f91005923bf3678a47b4025d855c6ba956379c0d9dbe739f1c3b7b355c45847f288ec38f714f62165aca8b36aa55e6c98dffc803b5c81172f9c0986ac6ba791ec8742e34bebbd090cadf07e05c31c9454d8630feb708437f9f0c7d0cbff9e9b83710545bdfbad3154908a8dbec607d8e2545977e28e0ee7630e7028e92b8e9b5785e479968488f23799630ab3cbf5158f6b625d2e09b62daba5a864f433c51", 0xea}, {&(0x7f0000000ac0)="14e3aada009d10647c40637b7ce669048cd0b7d120917697c0db1174ac0b45a83d4932e61f0fb98157def0605a662de817bb55a872f5f9a4919d83297f9f021d9ac3d1d5c7e201f9d621bcb1fabdc51fa04c1c8e02b62a87dd28bb3449b925724b1a72705704ee74ea32c5d24a2cff3bb566e4d759b3622cd36726b2c0242850c2a578aade1d56edad0e29885158c61006074ff905049e9b37585c2517caad3fbc65e2147402d25c7635ce2e89308e41003fd69b3ecdd6cdddbba7063479176abf0e6dcb07", 0xc5}, {&(0x7f0000000bc0)="f810fa9d51def9ecd6e13899cf5ed97c393f5b6055592a0a6a31eb289b2f2647682def9090704b3d319ffaaa4b521f05885e5de0313808c92909350c03f2d603985087799a037af242cb354191df3fbfe6f6189d09a26c89232b6d6e1a", 0x5d}, {&(0x7f0000000c40)="63cb6e7665feda4c00d6794812a5406951a0014c7032074792151961b69f6f6f86a32f756bade95fbf689fefb7ce8650b9816f8416cd7dca7cba7002e1dd9161b6c4f55e399cd6e4b9ed418504270ee021dcd56b664943281cd3d0e026b1d53268e7dea49d3adfc91a3845", 0x6b}, {&(0x7f0000000cc0)="6df44dacb9719ef12b9db0b13fe95867e8b8b1599c5770a46cf666caa75ad8183f7631649fc14f910697422a9e47937aca03c9148bd03b410372ded04f07ccab2c3ea63199744556e2d65d227a9970aae931743446c47606b63b23b70a3234a1f0aca220080098b54a0a8e14b15fd3b8651be2eae4903f", 0x77}, {&(0x7f0000000d40)="fa7d56505a07ec1546717510155c477384bb", 0x12}], 0x7, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], 0x1e8, 0x4080}, 0x108}], 0x3, 0x1) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000a80)) 2018/05/18 19:42:41 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) r2 = gettid() r3 = dup(r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000180)={0x5, 0x70, 0xf5, 0x2, 0x7fffffff, 0x10000, 0x0, 0x4, 0x8408, 0x2, 0x5, 0x7ff, 0x2, 0x6, 0x0, 0x4, 0x800, 0x7, 0x7fff, 0x10000, 0x8, 0x38b, 0x8000, 0x1f, 0x7a6771, 0x7, 0x7, 0x3, 0x9, 0x6, 0x9, 0x80000001, 0xfff, 0xf1, 0x6, 0x3, 0x1, 0x9, 0x0, 0xaf69, 0x2, @perf_config_ext={0x6, 0x1}, 0x8000, 0x2400000, 0xff, 0x5, 0x4, 0x5, 0xfdf0000000}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000000280)=""/194) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000016) 2018/05/18 19:42:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f0000000000)=0x80000000, 0x4) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) accept(r0, &(0x7f0000000040)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x80) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) 2018/05/18 19:42:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") write$binfmt_misc(r0, &(0x7f0000000280)={'syz1', "eb92753ff2e7067bce32b9f9036e610964bf97d389d62fa0c9c9ad7f0ca463492f"}, 0xfffffe3c) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000300)={0x1, 0x3f, 0x4, 0x8, 0xfffffffffffffffa, 0x3, 0x33, 0x2, 0x5, 0x3ff, 0x8f2, 0xff}) fsetxattr(r0, &(0x7f0000000000)=@random={'user.', "2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a"}, &(0x7f00000000c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a", 0x3c, 0x3) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000240)=0x401, 0x325) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e21, 0x5, @mcast1={0xff, 0x1, [], 0x1}, 0xa797}}, 0x6, 0x4, 0x4, 0x4, 0x2a}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r1, 0xe2cc, 0x8}, &(0x7f00000002c0)=0xa) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x15) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 2018/05/18 19:42:42 executing program 2: r0 = socket(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0}) r2 = getpgid(0xffffffffffffffff) ptrace$peekuser(0x3, r2, 0x7fff) r3 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x37a, 0x101002) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x1}) recvmmsg(r0, &(0x7f0000007200)=[{{&(0x7f00000028c0)=@ll, 0x80, &(0x7f0000003c80)=[{&(0x7f0000002940)=""/4096, 0x1000}, {&(0x7f0000003940)=""/69, 0x45}, {&(0x7f00000039c0)=""/223, 0xdf}, {&(0x7f0000003ac0)=""/182, 0xb6}, {&(0x7f0000003b80)=""/187, 0xbb}], 0x4, &(0x7f0000003d00)=""/67, 0x43}}, {{&(0x7f00000060c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000007140), 0x0, &(0x7f0000007180)=""/101, 0x65}}], 0x2, 0x0, &(0x7f0000001540)={r1}) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}, 0x1}, 0x0) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x3, @loopback=0x7f000001}}, 0x1e) 2018/05/18 19:42:42 executing program 6: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create(0x4) keyctl$join(0x1, &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)) sendto$ipx(r1, &(0x7f0000000180)="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", 0x1000, 0x8000, &(0x7f0000000040)={0x4, 0x7, 0xf2a3, "879f2830a987", 0x3}, 0x10) r3 = dup2(r2, r1) r4 = getpid() fcntl$lock(r3, 0x7, &(0x7f0000000100)={0x3, 0x1, 0x8, 0xa5, r4}) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x0) 2018/05/18 19:42:42 executing program 5: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x100}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r1, 0x81}, &(0x7f0000000180)=0x8) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) futimesat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{}, {0x77359400}}) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) futimesat(r0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)={{}, {0x77359400}}) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000280)=0x2, 0x4) dup3(r0, r0, 0x80000) 2018/05/18 19:42:42 executing program 4: gettid() r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="98022ec94bb412511b050600050000800900"], &(0x7f0000000480)=0x16) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000004c0)={r1, 0x1}, 0x8) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r2, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x10}}, 0x3, 0x1, 0x1, 0x4}}, 0x80) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000100)) exit(0x0) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000000c0)) 2018/05/18 19:42:42 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000000140)='./bus\x00', r2, &(0x7f0000000080)='./bus\x00') r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000240)={0x8, 0x0, 0x0, 0x8}) readlink(&(0x7f0000000280)='./bus\x00', &(0x7f0000000300)=""/14, 0xe) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000002c0)={0x5a5, r3, 0x1, 0xfffffffffffffffe}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x6, r4, 0x10000, 0x8}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000200)={0x3, r5}) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) listxattr(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)=""/157, 0x9d) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) fsync(r6) sendfile(r1, r6, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:42 executing program 3: mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0x0, &(0x7f00000000c0)={0x0, 0x6, 0x94}) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000280), &(0x7f00000002c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x6857b21ff1155d93) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) mq_unlink(&(0x7f0000001800)='bdev\x00') 2018/05/18 19:42:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000200)) ioctl$TIOCSTI(r0, 0x5412, 0x3ff) r1 = accept(0xffffffffffffff9c, &(0x7f00000000c0)=@generic, &(0x7f0000000040)=0x80) accept4$ax25(r1, &(0x7f0000000140), &(0x7f0000000180)=0x10, 0x0) 2018/05/18 19:42:42 executing program 6: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xfffffffffffffc4e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@multicast2=0xe0000002, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x2b}, 0x2, @in=@broadcast=0xffffffff, 0x0, 0x3, 0x0, 0x9}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, 0x1c) 2018/05/18 19:42:43 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000080), 0x1) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:43 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") unshare(0x8000400) r1 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) mq_notify(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000100)}}) 2018/05/18 19:42:43 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1=0xe0000001, 0x0, 0x33}, 0x0, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r1, &(0x7f00000000c0)={0xa}, 0x1c) write$binfmt_aout(r1, &(0x7f0000000980), 0x20) 2018/05/18 19:42:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1000082) rt_sigsuspend(&(0x7f00000000c0), 0x8) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 2018/05/18 19:42:43 executing program 0: getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000140)={'HL\x00'}, &(0x7f0000000180)=0x1e) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000140)=ANY=[]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) write(r1, &(0x7f0000000600)="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", 0xe00) 2018/05/18 19:42:43 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) gettid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000000)='/dev/random\x00', 0x55ab76206f6ab6ff) tkill(r2, 0x1000000000016) 2018/05/18 19:42:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x80045438, 0x0) 2018/05/18 19:42:43 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000698000)=0xe) close(r0) 2018/05/18 19:42:43 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) close(r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x260000, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000040)=0x3, 0x4) 2018/05/18 19:42:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) 2018/05/18 19:42:43 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x1, 0x100010, r2, 0x0) 2018/05/18 19:42:43 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) r1 = syz_open_dev$sndtimer(&(0x7f0000022ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f000000efcc)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 2018/05/18 19:42:43 executing program 6: syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x8000000000000000, 0x0) unshare(0x2000400) timerfd_create(0x3, 0x800) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000f33fc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000), &(0x7f0000000080)={&(0x7f0000a65ff8), 0x8}) r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) r2 = epoll_create(0x20) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x10, 0x3, 0x9) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000180)}, 0x0) getpgid(0xffffffffffffffff) prctl$setmm(0x23, 0x6, &(0x7f0000ffd000/0x2000)=nil) r4 = socket$packet(0x11, 0x3, 0x300) read$eventfd(r1, &(0x7f0000000140), 0x8) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$sock_inet_sctp_SIOCINQ(r5, 0x541b, &(0x7f0000000280)) setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f00000000c0)="f8f550e6", 0x4) r6 = socket(0x0, 0x1, 0x0) ioctl(r6, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb86dd4d093a0600080000fe020000000000000000bbff0200000000b3d00004000000000001000000000008907800000000008fdfe980e78d63c75ffa5f731edf211f1ef3fac59052213cfc83085d3daea1cf5ccd9119594ab9ecd9281bf0604a423090f3ad554deaa2514959fc7a8e595124a1580bc23b1198ea2c0fcb45a852d55d7871a07ca91422c2471013e0c4898c9d4692e43a476e16ce5897d2"], &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)) mq_timedreceive(r0, &(0x7f0000000040)=""/53, 0x35, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}) 2018/05/18 19:42:43 executing program 5: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x0) 2018/05/18 19:42:43 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0xffffff80, 0x0, &(0x7f00008feff0)={&(0x7f0000da9000)={0x2, 0xa, 0x0, 0x9, 0x2}, 0x10}, 0x1}, 0x0) 2018/05/18 19:42:43 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000200)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x400445a0, &(0x7f0000013000)) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000013000/0x1000)=nil, 0x1000}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) close(r0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200)=@abs, 0x6e) 2018/05/18 19:42:43 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:43 executing program 2: r0 = socket(0x2, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000440)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) [ 407.276743] FAULT_FLAG_ALLOW_RETRY missing 30 [ 407.281359] CPU: 1 PID: 27330 Comm: syz-executor5 Not tainted 4.4.132-g46155cc #42 [ 407.289054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.298394] 0000000000000000 fde551602f5d2e55 ffff8801d8617770 ffffffff81e0df8d [ 407.306423] ffff8800a0e9ef00 ffff8801d86178f8 1ffff1003b0c2efb 0000000000000002 [ 407.314487] 0000000000000000 ffff8801d8617920 ffffffff81c120a4 ffffffff8122ee10 [ 407.322500] Call Trace: [ 407.325085] [] dump_stack+0xc1/0x124 [ 407.330446] [] handle_userfault.cold.18+0x22/0x27 [ 407.336932] [] ? debug_check_no_locks_freed+0x210/0x210 [ 407.343931] [] ? userfaultfd_ioctl+0x2090/0x2090 [ 407.350315] [] ? handle_mm_fault+0xb58/0x30b0 [ 407.356438] [] ? handle_mm_fault+0x2680/0x30b0 [ 407.362647] [] handle_mm_fault+0x269a/0x30b0 [ 407.368692] [] ? vm_insert_mixed+0x140/0x140 [ 407.374729] [] ? __do_page_fault+0x785/0xa10 [ 407.380773] [] ? vmacache_find+0x57/0x290 [ 407.386558] [] __do_page_fault+0x360/0xa10 [ 407.392428] [] do_page_fault+0x27/0x30 [ 407.397949] [] page_fault+0x28/0x30 [ 407.403209] [] ? copy_user_generic_unrolled+0x9e/0xc0 [ 407.410027] [] ? evdev_ioctl_handler+0xace/0x17b0 [ 407.416496] [] ? evdev_event+0xc0/0xc0 [ 407.422013] [] ? debug_check_no_locks_freed+0x210/0x210 [ 407.429005] [] ? quarantine_put+0xda/0x180 [ 407.434869] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 407.441687] [] ? check_preemption_disabled+0x3b/0x170 [ 407.448507] [] evdev_ioctl+0x27/0x30 [ 407.453854] [] ? evdev_ioctl_compat+0x30/0x30 [ 407.459991] [] do_vfs_ioctl+0x63f/0xf40 [ 407.465593] [] ? ioctl_preallocate+0x1f0/0x1f0 [ 407.471802] [] ? invalidate_inodes+0x300/0x340 [ 407.478009] [] ? __fget+0x16f/0x3b0 [ 407.483277] [] ? __fget+0x47/0x3b0 [ 407.488447] [] ? security_file_ioctl+0x8f/0xc0 [ 407.494654] [] SyS_ioctl+0x8f/0xc0 [ 407.499821] [] entry_SYSCALL_64_fastpath+0x22/0x9e 2018/05/18 19:42:44 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x20800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:44 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) chroot(&(0x7f000009a000)='./file0\x00') chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f0000272ff7)='../file0\x00') mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000000400)='ubifs\x00', 0x1004, 0x0) chroot(&(0x7f0000000080)='../file0\x00') 2018/05/18 19:42:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000240), 0x8) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000004c0)="909e4a4331fc4e2a3de37d3e33cb7a2b1a6ce76b40eacb0d7fb4293e029e82f861ad70ecdc3028a3e833404599f0834d83e1b155ce23714a86e5fd4f61dc4864879102a8cb969ea5ec3cf45fc5202b095e071fc00fbe67653d4842f06ec53d35bc6618b546e4cf3efe410f376d2d5a3dca7ae3454b249ad5de1ee5fef7b09e30dc657532c4332b7bf47cf76321dafb6ab5038235e306570a57935e08a2d0cba9e8f7ae601bb9ee4cb3f5e737a5479de5a6effdd67a895189041c6c3d67cc152b96c79a5797c4f1805842041de5a425fd0de2f2ed1b92edb93f76dd6bf411926927f2d82caddaa3718249fc72d2f12bddd2094b075e1a2e09ce02c84ef772a45a7f73092ae8482ab653333bb77fcf4d5d06641a4064c6c7e773f8ecb8057df80eed532742d291f040b6eb1c66dcf86d208ec47929faaf63947a03c5d4d60c4a339e6602c40baf0f47689d24c4c7e1a60f47fb925c4e143d2a18540c72d7401e4e19774f63e31348bcbb51959a2096522c865fc02178e7257f000b15bee2434a0f93ea0483093afae4d4af3ad0c4b38be682a7eaba4b9f7a3fb04d772483e328c1229e14f0e806a7762af45eeb3fa5f93f9cbc1cb13abde4a8b4128f05e5f0f246719b57a8a0b5c5be3cd737cf1b1269d722dc22540bc186c80ce70955c8953b2aa72609884f42592f22d52dba05faf814c94ce1f9224c3d82c1018f5d1cbddd1545f9af2bd0b8effca3971308b9f79b6252d31f47b10341f76dee670706474e217642d8fc8edd421ec8067f11f7452ee36b33f749a06fcbe60390e0c4fce6ecdd6bc00fce2e5849df6de88e72f8f2e9c939a9fa140f00863d319392319754c537ad913fc3599c3f7a0d95933f3d526b38ba01e28f4daf21c870e48f9838a38fb4d9f64c9c51a08a0db34050aeae6590cef14440d3a67a8581c9d1fe9bac0c181377844fb551e944667ca4ac3c44afed87c9415f24ae4f6be5bf6de4cdb17cdab5a6b57262950afbe2eac34afd323f2ebcc055e0a2cc3a8ba3dc21d62f7fba43453d980fe687363d7b44044b2b30c300f12e295bed8ea64cb1c381ddcf8bd0a3e00b77acfdb21198f177a83834a5baa2830543d02ab42241f41910d47bd5cf223229ec2ab70ca3849a39720b4dac2b455c03692ff48e7c978194a672742389ae55d54460a42343e14e2f0003b3b628c3bfe7b7c76ee95c6217e1363786e49c4d683d43d4e25d39b6d9706c4a1200e4b2cb9cc8d1a38a2183b273fa4d99bc3560598ce243b5213eefd7b48d4a6c90a6c31d785320474cb5350410791527bbf8992f34f3094c83b6c1ee1eed96c67c531b5f0e09e19dca8e145cbb8817847c62fd07ff18a54337f70c26365408056303a9601567d6ea49bb8afbedff812c417c4fc1a7c5d8eaddc71e605216f19ae30ba0c6ec27535a850276eec8bb28ce0f58842290431943f3361d77a5216c1d758410409d2829e7ba97b94c0407ad1e259700141f5cec70e07ae07ecc50dff08e3ea7450e4b413679936b908143c7d3e2e856ec820cf17e37e7acb957c260776e1b9e78a1b73e82f161c5a24fbe5e1f70933e09b997e39826d95906aef53ff07e80fe9f3c5c8b86e69f3024c7d874515a4f05290d75c46081cc3f4cb9f20c44deea19cb8c832be425ec24f368945247527d842fde88214f9f9694a3ed9feb0e19a4c2d2d92e08184c0af3f281b11e2d1b418ac9f14dcd3b39090922f24ec754d6e79bb808e2a7f2f258c07c0bc6ed40a8f3b782576103288bd4c83d3c3ead3092d24b4106e7997f646348e83251b19ea6fb1e184b3cdda444ca69f29275f86d7efce04d63ef67c8935f1cdce589ef1e9a4f3ab6f50f8abff1b67aa3104e05e05e5354c16900ffb8aa6b1dbca0a2805fabd184e4de1d32c86db60faf95cd6ef796e2d98415ddf9802583996f3a3591ec4811fcaaf04eb4f0938a533d4b88f303d91317434c89c298ba68cd7216837015bfa1b2288c671397296a396a96d325217c9fab09923d6a53dd184ed4f22b662fce8d40ee10ed284f27063a54f36b48086f163c6be6a5f60bab01ae76d92426d0aa670d0016ad10655203e3645fccc31f12cd0c2692c3f0575cbdbc7c1c3fe7848a3640279a4c97c931e130740a55327de76b1130d678a850dec0d9d9b7526568292b027f350f341c35265267d5c8172ef1c25b2d212dd9a8335927247baafa74cf7b04df6508329fc09f865331ed8f532143b04f1dccfad47a7bb167a3917b475dad15fc8642eadd80c9cc70d3923d636b4c98710c3278b8cbe4a4d86bbd9c7d501b0469c82f21ecb642fb3e91a753067059519ad21a366e874dd75745f8a6199bda2737a038f9a2129ae69ac3f674fe5467e7c073cd9d8d2b94fbbbad5ea60809d28b2d1583bca13b8ad1a69653a3d54b6d06e2a54e6f1ab1eda88913528bb89cae20f602ca3e1de405075c6b1914a451a907495ca134f6058327ab3cd31d1e6e18f61a9c562371249c0a756f2984c66fa302cdabc530bcb555d599095c9d85fa6b9aefb9f8c748e67363c678a3607f0decfedcad3d2880262919d418f4f533707c8b4c7aef6813b13d7b197343fed05c6b330cc10dfb25f7801c91191e2d3746d9c608b121f485a942b9eea650c10d1aa8ef1be41fc14f40c9b2fec28530e45e8964e3adead7bd8234d6374d632a1a7a306868592ff8b44cd31fe0c881c5ed56ab0f47a95dd9282402f1e7a54bd9046df09b90379ff1a40e3057863d435620d0d84bc5dea6960a433a4490881c563deae357a10a0e03e125d4fa0cdc2840ece64818f631593f03a4042bf312075665ccb4f26d7fc462f886b2781ee0db2ed44503d193b070385d613eedbd7e62f59abd1921885806a901897271fda1d5585254b09213bad41557c3efaac90551650c9c37d78195af03734994e93dea9f730be61aec148abea37a830a8d78a1dc1407007ca31d0f6b46c5d06dba97585ac789079d92ce5859d62c0728f527e74c9c15a2570a9c805a71d245821b70400bb9eb391d27242b183cf775933088c6dab322a6b9b7851086920b16a95952e148d7fa957f10ce708cceb954d22751cd57d4e73107fb2d13a33253a3d6699479209337b282ec21d3227c726edaa02a197aa7c16c684957f8575e61eee813af4e249aa659ef4d1fd12cfbba2420128cb32f2fb04538e2eb1067c8c7517b5b70ecb820f13ff3eb92a6796775926d4c3b1455d9823b2cc445604efd64f25df99b1c256afe6d4947360c14a7e48b5b19075044aaa4c05a9238622aeec6456b79bd1b900a01bbbc2ed94bd3cde87851f15557ff43c5b4ed6448b6beb5a8fdaab6ca4cbffa821ff7973f7433dd6b61dae229c0dd21372d0a6b3d9389158c82dcc2fe8384d297803d46c39448a25845a9489413a08ac6d738f9d562539863208f67497dbb0d239f32063174799a434891c3cc95e0183465c98cd1dc6cb1c63970644070fb8e1ac0f70fac4f0729db965dc510e43b2eaddfa29ed1419471bd3c20d863af495e054bd04cf741d015e196c5206012793e15d7c158a64fc9e0488d4401da0d791d865c557f8b48ea8fedc9426300bcc6bd8de2da842232981e75a5e9f48a7f6a75aa5b87f2a3ecf758419f36ed81b8726355e2c4ea52450ff6ccb88568f530913191ecd850c491a12e92ca705f8bc471f5d6b5ad2aae9eaecb539af070d13085d488c8868114b9ee1b16e6eb68342c4159b89c4180ef451e3467ded3d784ff192f75e8bf1d2511a9e0d87b2ca5c74fe9916ecf57bfdc7398bcecec2fe7333387ab70e1c34d839305cd1c6dae07082691c30ea04250159dbb3e6ab103291c265d6a20d2f897e42ab398b9ef2f974b8d0c103172cb949007c1da6e5db2cd051b9e2668ca07c6c9e97d8ce7506da89e3d636c05bf02565c7dd3db2b8bef1702a8ea73d494e790c9331e82341ab495cf31e1604e8d5782922f7a3d33c433d6dc214ffd700fcefc5745ae0a8c5046140d04272be112a5dfeafa4a594729b2e53ca65219bc452fe4bb7e41c91bedcb111b24604276cacec3612c5a687f0e26e14c44e56335caa13fd02705245ec0e72c84270a08", 0xb4b) 2018/05/18 19:42:44 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000698000)=0xe) close(r0) 2018/05/18 19:42:44 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:44 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000180)=""/95, 0xffffffdc}], 0x1) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000016) 2018/05/18 19:42:44 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x4}) mq_timedreceive(r0, &(0x7f0000000440)=""/196, 0xc4, 0x0, &(0x7f0000000540)) 2018/05/18 19:42:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="380000001800230000000000000000000a000000000000000000000014000500000000000000080000000000000000000800060000000000"], 0x1}, 0x1}, 0x0) 2018/05/18 19:42:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'syz_tun\x00', 0x0}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@remote={0xfe, 0x80, [], 0xbb}, r1}, 0x14) dup2(r2, r0) 2018/05/18 19:42:44 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x3}, 0x1c) 2018/05/18 19:42:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000100), &(0x7f00000001c0)=0x18) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) madvise(&(0x7f000090b000/0x3000)=nil, 0x3000, 0x4) read(r0, &(0x7f000060df9c)=""/100, 0x64) 2018/05/18 19:42:44 executing program 2: r0 = timerfd_create(0x7, 0x0) r1 = dup2(r0, r0) timerfd_settime(r1, 0x0, &(0x7f0000bdffe0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000d5dfe0)) timerfd_settime(r0, 0x0, &(0x7f00001c9fe0)={{}, {0x0, 0x989680}}, &(0x7f0000d7efe0)) 2018/05/18 19:42:44 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x4}) mq_timedreceive(r0, &(0x7f0000000440)=""/196, 0xc4, 0x0, &(0x7f0000000540)) 2018/05/18 19:42:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001780)='/dev/ptmx\x00', 0x2000000000000043, 0x0) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f00000001c0)}], 0x1, 0x0) 2018/05/18 19:42:45 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:45 executing program 6: r0 = eventfd2(0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000340)={'filter\x00'}, &(0x7f0000000440)=0x24) writev(r0, &(0x7f0000000340), 0x1) 2018/05/18 19:42:45 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x185080) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x2, 0x1ff, 0x200, 0x1f, 0x400, 0x8000000000000, 0x21d, 0x7f, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=r2, @ANYBLOB="400000008427733c765eb9985258979bde6200e2b5e18af605d5ce9d2535c1a9a8fcb744387dcbe58c25c6f0b35c1771ed62a11515f030e0584dfe76b77de406315dbcd47b43659c535d60e4210e6424b6aa0984ac055841fb8cdc2b64239602a041c3c26e0c837a449689bd69acc7cf337b8f3e4f86f6e2cd8beccf358a0079a9c84dff1d37ab3fb18ac31ff33fcc149e152fa6a487d874739643ba8d9415a80f48a83bb036b6f3708f2665d040372b2b"], &(0x7f0000000200)=0x48) fchdir(r0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000280)={0xffffffffffffffff, 0x343, 0x5, &(0x7f0000000400)="b1bb782d86"}) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ftruncate(r3, 0x8200) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r5 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000380)={r2, 0x7}, &(0x7f00000003c0)=0x8) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:45 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x4}) mq_timedreceive(r0, &(0x7f0000000440)=""/196, 0xc4, 0x0, &(0x7f0000000540)) 2018/05/18 19:42:45 executing program 2: r0 = socket(0x2, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) memfd_create(&(0x7f0000000240)="3fbeaefb9b3af1bdbe3b2ca8511065c1b98cecf21f709d7c0000410369f3932b2f6d008e7110949cf6704bde5ece3e8e02ba60d6851194b6e2a23f877f009a4ebe7616cdad8bdea2d4d31484a6ad", 0x0) close(r1) 2018/05/18 19:42:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/05/18 19:42:45 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) readv(r1, &(0x7f0000000180)=[{&(0x7f00000001c0)=""/95, 0x5f}], 0x1) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000016) 2018/05/18 19:42:45 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)) 2018/05/18 19:42:45 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x4}) mq_timedreceive(r0, &(0x7f0000000440)=""/196, 0xc4, 0x0, &(0x7f0000000540)) 2018/05/18 19:42:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000698000)=0xe) close(r0) 2018/05/18 19:42:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000698000)=0xe) write(r1, &(0x7f0000000040), 0x0) 2018/05/18 19:42:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c00)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)=@bridge_newneigh={0x28, 0x1c, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, r1}, [@NDA_DST_MAC={0xc, 0x1, @link_local={0x1, 0x80, 0xc2}}]}, 0x28}, 0x1}, 0x0) 2018/05/18 19:42:45 executing program 2: request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000000)="04", 0x0) 2018/05/18 19:42:45 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000100)="2941c60fc2e0a34a9a062b8fa13042647a01fc320abbf655086d5e93956cfa78c31f250c26415192e641ccf9594bc32a5e16deb3c27d8b5116a14a12a0421d288b338ded7bebfd5745cd974ce8c66912e12ed2064e57367d4c7cdb660b2f90fa5ac83d84461245ecb09f297d48acd445", 0x70}, {&(0x7f0000000180)="aa2f7255061477fde26e4077f3b11fe2bb515fb3fcf7a5f6f61ddcffd0592506527b7db118aa8bb32dbed6ae4de1259722b8e95636d621d7fa7f709d61e1bb56f826f22541ffe24df4558d32868a21dbe48eaa273c6f350ad07a7aee0605f4370d2dfaa2ad9a146eefebe2752df5378d66a12aae3265687d81474fbea124", 0x7e}, {&(0x7f0000000080)="dc10c5fedda293dddf156dbcab9a94edc45fbb1d3772", 0x16}, {&(0x7f0000000200)="7dc1d40a362277bc0950301d68f677fc8e6c13c9a47edad8bb9585635291336a6d404876f7f07e99eec34a5b03fa3be358244658c27aa8421c10107f5106957b3e9e6f01263f84c8a9ec79b4d010130d34691a4bc38aea190c7947a367bf11bb8a26aac1bcbdaac8fac30a1dcf4a9d6c17570498884141cbda19e7b78e84df5c8a0734312b50574e50b360c3d7b2a1af7aa2233440cce60231b7", 0x9a}, {&(0x7f00000002c0)="b4b8ec4f759c65c48191d1f9d7160035c72439", 0x13}, {&(0x7f0000000300)="1070a07d5017f9d004a96c69d888a0b6a11c5c660219602a6a858cf4c85b05405b7bf398ce53f35444d83a53385d33612eb7f6144324dd32ed799f22c8a9220b155df8cee9cdacc613c6b86f6cc8f9ae1f4c99e714449583ce60648d709bf0d584b131d39001692586dae512324f36b73a9941b874e8b3659063adaeebf5efcbbf24230db44ece5881f2789bc1e9c6a05380603cb903fd9ddceb9a4f113b4f48520ee27150814bd86bcc1dfe6a173f9cd69a5db03d8ce64b17343ef96f2d704e2093a4397fdcd0d520045bb0b58b6a6671a2c7c3e6571f7f9c967308a4252a6e2a49525ab683e43ccc9f5d1b1d", 0xed}, {&(0x7f0000000400)="fb63688c4622fab809800fd5900035c8b580cbf6bedb5a0e7d1d29462178c3634136bc44e55acfc229435ab080e0d56a0ff719100d86e4d5b1", 0x39}, {&(0x7f0000000440)="81849abe51221c5a4b4dbed5a66fd2f6f1e5dfeb8bf237dc04d73ada47", 0x1d}], 0x8) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') inotify_init() r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000c6eff6)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write(r0, &(0x7f00000ce000)="9b37e17e4fbbe4a62c58a06f1b749267b041439ab45f5cb7a0fb26962a5b5d746027c8e51040ac277580ffdcf048b558be78d9586af148bc76874841b63ef270c82b2d2af25d165ed1d18d7bb38500bc7309789270c0b1bcd07c8e2f63da930a", 0x60) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000f23fae)=""/82, 0x52) 2018/05/18 19:42:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x100000001, 0x10}, 0xc) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000480)="1b", 0x1}], 0x1) 2018/05/18 19:42:45 executing program 2: r0 = memfd_create(&(0x7f0000ee6ff4)='--vboxnet0.\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x200008000020002) r2 = dup2(r1, r0) write$sndseq(r1, &(0x7f0000000180), 0x123) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000172000)={0x80, 0x8}) 2018/05/18 19:42:46 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f00000065c0)='./bus\x00', 0x0) 2018/05/18 19:42:46 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000002c0), &(0x7f0000000300)=0x4) fchdir(r0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r4 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x1ff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r5, 0xffff}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000140)={r5, 0x4cc}, 0x8) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r2, r4, &(0x7f0000d83ff8), 0x8000fffffffe) dup(r3) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x200, 0x0) 2018/05/18 19:42:46 executing program 6: r0 = socket(0xa, 0x1, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa}}}, 0x108) dup3(r1, r0, 0x0) 2018/05/18 19:42:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:46 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000200)="6c6f67696e7569640039dad3c444de4a35f0fd223db6aa1e2fdd63c9f35f389e4669e0af6522c225bbb645ae9e0f46c87cd44db4919c1a34ab1d00bb4157f79b23912e9b96566ebf23618dfdd331fcacfeccdb938974f48d420c49e5b37f94bdb651b9c102659034f4192f") sendfile(r1, r2, &(0x7f00000000c0), 0x1) 2018/05/18 19:42:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000004c0)="909e4a4331fc4e2a3de37d3e33cb7a2b1a6ce76b40eacb0d7fb4293e029e82f861ad70ecdc3028a3e833404599f0834d83e1b155ce23714a86e5fd4f61dc4864879102a8cb969ea5ec3cf45fc5202b095e071fc00fbe67653d4842f06ec53d35bc6618b546e4cf3efe410f376d2d5a3dca7ae3454b249ad5de1ee5fef7b09e30dc657532c4332b7bf47cf76321dafb6ab5038235e306570a57935e08a2d0cba9e8f7ae601bb9ee4cb3f5e737a5479de5a6effdd67a895189041c6c3d67cc152b96c79a5797c4f1805842041de5a425fd0de2f2ed1b92edb93f76dd6bf411926927f2d82caddaa3718249fc72d2f12bddd2094b075e1a2e09ce02c84ef772a45a7f73092ae8482ab653333bb77fcf4d5d06641a4064c6c7e773f8ecb8057df80eed532742d291f040b6eb1c66dcf86d208ec47929faaf63947a03c5d4d60c4a339e6602c40baf0f47689d24c4c7e1a60f47fb925c4e143d2a18540c72d7401e4e19774f63e31348bcbb51959a2096522c865fc02178e7257f000b15bee2434a0f93ea0483093afae4d4af3ad0c4b38be682a7eaba4b9f7a3fb04d772483e328c1229e14f0e806a7762af45eeb3fa5f93f9cbc1cb13abde4a8b4128f05e5f0f246719b57a8a0b5c5be3cd737cf1b1269d722dc22540bc186c80ce70955c8953b2aa72609884f42592f22d52dba05faf814c94ce1f9224c3d82c1018f5d1cbddd1545f9af2bd0b8effca3971308b9f79b6252d31f47b10341f76dee670706474e217642d8fc8edd421ec8067f11f7452ee36b33f749a06fcbe60390e0c4fce6ecdd6bc00fce2e5849df6de88e72f8f2e9c939a9fa140f00863d319392319754c537ad913fc3599c3f7a0d95933f3d526b38ba01e28f4daf21c870e48f9838a38fb4d9f64c9c51a08a0db34050aeae6590cef14440d3a67a8581c9d1fe9bac0c181377844fb551e944667ca4ac3c44afed87c9415f24ae4f6be5bf6de4cdb17cdab5a6b57262950afbe2eac34afd323f2ebcc055e0a2cc3a8ba3dc21d62f7fba43453d980fe687363d7b44044b2b30c300f12e295bed8ea64cb1c381ddcf8bd0a3e00b77acfdb21198f177a83834a5baa2830543d02ab42241f41910d47bd5cf223229ec2ab70ca3849a39720b4dac2b455c03692ff48e7c978194a672742389ae55d54460a42343e14e2f0003b3b628c3bfe7b7c76ee95c6217e1363786e49c4d683d43d4e25d39b6d9706c4a1200e4b2cb9cc8d1a38a2183b273fa4d99bc3560598ce243b5213eefd7b48d4a6c90a6c31d785320474cb5350410791527bbf8992f34f3094c83b6c1ee1eed96c67c531b5f0e09e19dca8e145cbb8817847c62fd07ff18a54337f70c26365408056303a9601567d6ea49bb8afbedff812c417c4fc1a7c5d8eaddc71e605216f19ae30ba0c6ec27535a850276eec8bb28ce0f58842290431943f3361d77a5216c1d758410409d2829e7ba97b94c0407ad1e259700141f5cec70e07ae07ecc50dff08e3ea7450e4b413679936b908143c7d3e2e856ec820cf17e37e7acb957c260776e1b9e78a1b73e82f161c5a24fbe5e1f70933e09b997e39826d95906aef53ff07e80fe9f3c5c8b86e69f3024c7d874515a4f05290d75c46081cc3f4cb9f20c44deea19cb8c832be425ec24f368945247527d842fde88214f9f9694a3ed9feb0e19a4c2d2d92e08184c0af3f281b11e2d1b418ac9f14dcd3b39090922f24ec754d6e79bb808e2a7f2f258c07c0bc6ed40a8f3b782576103288bd4c83d3c3ead3092d24b4106e7997f646348e83251b19ea6fb1e184b3cdda444ca69f29275f86d7efce04d63ef67c8935f1cdce589ef1e9a4f3ab6f50f8abff1b67aa3104e05e05e5354c16900ffb8aa6b1dbca0a2805fabd184e4de1d32c86db60faf95cd6ef796e2d98415ddf9802583996f3a3591ec4811fcaaf04eb4f0938a533d4b88f303d91317434c89c298ba68cd7216837015bfa1b2288c671397296a396a96d325217c9fab09923d6a53dd184ed4f22b662fce8d40ee10ed284f27063a54f36b48086f163c6be6a5f60bab01ae76d92426d0aa670d0016ad10655203e3645fccc31f12cd0c2692c3f0575cbdbc7c1c3fe7848a3640279a4c97c931e130740a55327de76b1130d678a850dec0d9d9b7526568292b027f350f341c35265267d5c8172ef1c25b2d212dd9a8335927247baafa74cf7b04df6508329fc09f865331ed8f532143b04f1dccfad47a7bb167a3917b475dad15fc8642eadd80c9cc70d3923d636b4c98710c3278b8cbe4a4d86bbd9c7d501b0469c82f21ecb642fb3e91a753067059519ad21a366e874dd75745f8a6199bda2737a038f9a2129ae69ac3f674fe5467e7c073cd9d8d2b94fbbbad5ea60809d28b2d1583bca13b8ad1a69653a3d54b6d06e2a54e6f1ab1eda88913528bb89cae20f602ca3e1de405075c6b1914a451a907495ca134f6058327ab3cd31d1e6e18f61a9c562371249c0a756f2984c66fa302cdabc530bcb555d599095c9d85fa6b9aefb9f8c748e67363c678a3607f0decfedcad3d2880262919d418f4f533707c8b4c7aef6813b13d7b197343fed05c6b330cc10dfb25f7801c91191e2d3746d9c608b121f485a942b9eea650c10d1aa8ef1be41fc14f40c9b2fec28530e45e8964e3adead7bd8234d6374d632a1a7a306868592ff8b44cd31fe0c881c5ed56ab0f47a95dd9282402f1e7a54bd9046df09b90379ff1a40e3057863d435620d0d84bc5dea6960a433a4490881c563deae357a10a0e03e125d4fa0cdc2840ece64818f631593f03a4042bf312075665ccb4f26d7fc462f886b2781ee0db2ed44503d193b070385d613eedbd7e62f59abd1921885806a901897271fda1d5585254b09213bad41557c3efaac90551650c9c37d78195af03734994e93dea9f730be61aec148abea37a830a8d78a1dc1407007ca31d0f6b46c5d06dba97585ac789079d92ce5859d62c0728f527e74c9c15a2570a9c805a71d245821b70400bb9eb391d27242b183cf775933088c6dab322a6b9b7851086920b16a95952e148d7fa957f10ce708cceb954d22751cd57d4e73107fb2d13a33253a3d6699479209337b282ec21d3227c726edaa02a197aa7c16c684957f8575e61eee813af4e249aa659ef4d1fd12cfbba2420128cb32f2fb04538e2eb1067c8c7517b5b70ecb820f13ff3eb92a6796775926d4c3b1455d9823b2cc445604efd64f25df99b1c256afe6d4947360c14a7e48b5b19075044aaa4c05a9238622aeec6456b79bd1b900a01bbbc2ed94bd3cde87851f15557ff43c5b4ed6448b6beb5a8fdaab6ca4cbffa821ff7973f7433dd6b61dae229c0dd21372d0a6b3d9389158c82dcc2fe8384d297803d46c39448a25845a9489413a08ac6d738f9d562539863208f67497dbb0d239f32063174799a434891c3cc95e0183465c98cd1dc6cb1c63970644070fb8e1ac0f70fac4f0729db965dc510e43b2eaddfa29ed1419471bd3c20d863af495e054bd04cf741d015e196c5206012793e15d7c158a64fc9e0488d4401da0d791d865c557f8b48ea8fedc9426300bcc6bd8de2da842232981e75a5e9f48a7f6a75aa5b87f2a3ecf758419f36ed81b8726355e2c4ea52450ff6ccb88568f530913191ecd850c491a12e92ca705f8bc471f5d6b5ad2aae9eaecb539af070d13085d488c8868114b9ee1b16e6eb68342c4159b89c4180ef451e3467ded3d784ff192f75e8bf1d2511a9e0d87b2ca5c74fe9916ecf57bfdc7398bcecec2fe7333387ab70e1c34d839305cd1c6dae07082691c30ea04250159dbb3e6ab103291c265d6a20d2f897e42ab398b9ef2f974b8d0c103172cb949007c1da6e5db2cd051b9e2668ca07c6c9e97d8ce7506da89e3d636c05bf02565c7dd3db2b8bef1702a8ea73d494e790c9331e82341ab495cf31e1604e8d5782922f7a3d33c433d6dc214ffd700fcefc5745ae0a8c5046140d04272be112a5dfeafa4a594729b2e53ca65219bc452fe4bb7e41c91bedcb111b24604276cacec3612c5a687f0e26e14c44e56335caa13fd02705245ec0e72c84270a0810b58dcbe262b6530e74e087855a9740c601e3778c04ed03bfc2f7db28c9aabdefd07af77f50006f2644f5e9c05859eb4c2bfd310baf4080353edd843e32774c605e450c034149aecbc7247954", 0xb98) 2018/05/18 19:42:46 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x0) close(r1) bind$unix(r0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e20}, 0x6e) close(r2) r3 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) readv(r3, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) r4 = gettid() readv(r3, &(0x7f0000000000)=[{&(0x7f0000000280)=""/209, 0xd1}], 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r4, 0x1000000000016) 2018/05/18 19:42:46 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:46 executing program 5: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) write$eventfd(r1, &(0x7f0000000040), 0x8) 2018/05/18 19:42:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) write(r1, &(0x7f00000004c0)="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", 0xb4b) [ 409.446283] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='hybla\x00', 0x6) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 2018/05/18 19:42:46 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000004c0)="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", 0xb4c) 2018/05/18 19:42:46 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x9) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:46 executing program 5: r0 = gettid() unshare(0x40000000) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/if_inet6\x00') sendfile(r1, r1, &(0x7f0000000000)=0x10, 0x5) [ 409.598802] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 409.681494] IPVS: Creating netns size=2552 id=16 [ 409.739039] pktgen: kernel_thread() failed for cpu 0 [ 409.744210] pktgen: Cannot create thread for cpu 0 (-4) [ 409.749746] pktgen: kernel_thread() failed for cpu 1 [ 409.754848] pktgen: Cannot create thread for cpu 1 (-4) [ 409.760228] pktgen: Initialization failed for all threads 2018/05/18 19:42:47 executing program 4: 2018/05/18 19:42:47 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:47 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x32, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/05/18 19:42:47 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000001340)='highspeed\x00', 0x101be) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/05/18 19:42:47 executing program 5: r0 = gettid() unshare(0x40000000) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/if_inet6\x00') sendfile(r1, r1, &(0x7f0000000000)=0x10, 0x5) 2018/05/18 19:42:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:47 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_getattr(r2, &(0x7f0000000080), 0x30, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r3, 0x1000000000016) 2018/05/18 19:42:47 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) 2018/05/18 19:42:47 executing program 4: 2018/05/18 19:42:47 executing program 6: 2018/05/18 19:42:47 executing program 4: 2018/05/18 19:42:47 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) fcntl$setstatus(r1, 0x4, 0x2803) [ 410.339526] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 411.155819] IPVS: Creating netns size=2552 id=17 2018/05/18 19:42:48 executing program 4: 2018/05/18 19:42:48 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000002c00)={@mcast1}, &(0x7f0000002c40)=0x14) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000200)=0x6, 0x8) pipe2(&(0x7f0000000500), 0x84000) readv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x22, 0xffffffffffffffff}, &(0x7f00000001c0)) r3 = mq_open(&(0x7f0000000440)='\x00', 0xc1, 0x5b, &(0x7f0000002c80)={0x80000001, 0x7fff, 0xfffffffd, 0x20, 0x8001, 0x81, 0x8, 0x81}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r4 = syz_open_procfs(r2, &(0x7f0000000380)='net/dev_mcast\x00') epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r1, &(0x7f00000003c0)={0x1}) r5 = socket$inet6(0xa, 0x2, 0x0) ioctl(r5, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r6, 0x80045432, 0x6f3000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="d40000000f2518a0bc96e06000b5e7397035041b7461bae7399008e851b9b7a249fed7679b146c0ad0dc88ebac907480f71fffa989ab7d30d9484b239fa0e194080000000000ffd50a871f1e39b83eacc91019895d321cbe7caa1d2997265c1ca6299c399d62dcd2e98f531dd4374218e4f289b0d172ffd93b89589fa148d42fa145b7c0d17a2655e1120cbb9c452ddcc4d9ee16dd2661c7a138148917608e106ad0b49a1d74788bec2255366939774e5dc3bf60584946c9c76c62dcf690b4e03d905c9622978feddda3078b6ce4b08361e50565aa489561"], &(0x7f0000000000)=0xdc) socketpair(0xb, 0x800, 0x1, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={r7, 0x1ff}, 0x8) syz_open_dev$usbmon(&(0x7f00000004c0)='/dev/usbmon#\x00', 0xffffffff, 0x181000) tkill(r2, 0x1000000000016) sendmmsg$nfc_llcp(r0, &(0x7f0000002b40)=[{&(0x7f0000000540)={0x27, 0x0, 0x2, 0x1, 0x6, 0x1, "b7420d3eff15e3044b9f9ac067708b7fe954fec013feaef269b425ecadcfdf87a2cae3c9892842b961a65ec393b8a218bc9b1c8006f53da5d13fa7e982fce0", 0x2a}, 0x60, &(0x7f0000001600)=[{&(0x7f00000005c0)="41140bf7a89ffd058483e365911be515873a959ba52448533d0bd57d8eda4834c09c155d2d59cfd1e9f0d6e2a2e6cc163e323bbb51e8a1c49bc395f9", 0x3c}, {&(0x7f0000000600)="2477a1d4f1daf0051b083277ed0d70411699dbbdbeb80850a9e36fe8ab5517529433cf0ad5fee016dc103d7ea4ef47f75144cf2c423c92c40b8a3e20bda95859eb1d6fe28a23374c6ca5bfaf4e0720291ee8897ad355baba244c0cd32055f4e6675b02097006a6dfaaccffc6bf5426a76141ccdca21796ebd1206259e2a2b041227b58d2187c5127b2462feae206a14fe9fc23fca56cd636c77fb6cdd4dbcff6950e94440af8fc37961cd04569ac537120cadbfab2696d6f1902a78da432cdd0975da5d9f3d9d45204b751975c14a838060bc83c6bf7a0ea902de3341d15a88ec2243710f9c07fd8fd8d1b9eaf5ece2125c79f5789cce2570462ac07363ab13a017924bbfd703eaa82bf28afef7d2953729060d5d9931ab938cadc73f06836f0e9f02fc17caa90268a99448bbb9e65ba0b484955d093b945f5fc0a9835de2aeab58c608bd4a232d82ef4d7ecee922eeebfadb6a5a545fc06a9d90cad0257647c58129727f9c6cc816b904d44c1dcc4ca99cb0764b0e980da4b3fe19bf0e26e295da9917fbd94af2150b554b3129a45f98163c0c449936ed1918083294f6fe05cfc9ff689a0836bc17bf967f738a2e29ce934aee750cd2e4fab70b9cf36a7d41cef9ea9323045f14708ac78e761efc494482ce5c495f8f48b9412f650ac3f19f4d8a1cc2fadf7778a3f8eedf633cb071142e810e4dfd84821a3e157a5c7f2172fc8848a32102be49ff220e2b2fd74e0837aa863a6b7de14a4c3e33ebc2a29de328fb3a46ccc823217bfbc4ebfd882841c05712ac45d22cfd879c8a41a094979aeefcbe45eb3fded8816dfece07bd8c4f700f3bf9c47258ad39dc9b86de5e10753656182a87f954b170fdc50f9ba73997b1534d056e002177564db78f99ad82e59fd68d6dc6291ff5dea89bd858a37dabf6d2dd5d4bc4f59baab8ed6115d6bf33117f0454ae880dfdb775130d1307098fe458519c9df5a3e8f0d88cd884c2c894af8ec3e1fedf6add81cab3779235c4e365dbb7b4c49c631c3686b055b8a1131e610a0fefe40e71fa6d2c3fcd8574e8f02f0fb9d729c832d3e09f55cc2d202c29c20d62c1bdddb10de3e7326c0521a6437faa37e3d9c7e9bfea19aad87e5cb4477e01f8257808c30195b147b9ad1d262e53d58f00f636d6cc244a3f16bd4811046413d812485dcfacc6695675478d76a9e758e236d2b9655f1ebc2e7231b2c13c57024aebd0d85cf0d92c579a7eb0f3479e3c6375b3c994f83e1eb4f4062f163826b44f64c007028a10fa8673398ff9339a147bda6701cd6f559f421f363b5218f4ccdb8a976ee2887af827bc4a48c59b3dfce96ea90e48789b583fe322995ecf111dcad1390abdbaa1f5bcc8f6410f72216ff50ef096ed0f818fd47275c9286acdfef3b38e0f9e78179bc1f18f5d00bb24ad1654791afb8b12755ed4c4737aa8ba2e6853ef50744a93870ec9465b59fabd1cfbe7ce90b2bbc4ff8435c67273653d6a4d5ae838ec6a4aa1a820f77a9608ca4c5e4174f7418c52b516528d9eac73a8609879d06daf7ab51329a2436dc92522f512260fdcdfe9dadbd3a2e479007322200c133990f364812cd75e497fbaf8d6ed4cb669b212993f1d082a4d1c941c32d883204de6eb10f4030ab28c3e60d69f39609536ecf49a16ab4c3707c11ae830586a671a45da5ecd446d59dcc28ac22820b6a00cf01c2c55168ef61a5abdfbe1461771680dbfc9666057cb9a6c3100125e1328d15a7214086985567689369f58aecdbb38009ccba81d682d25f3651f3d9b4c3f78839b493104fce7c83e90122a38f1c4ec8718b2f0257271ebce036ef10bcaf64983497523106f939c1eeff97970feeab7296e34868867166b9b65d940f51f01e74b4522e0fb0750c21a890712da2c425fe6e1bea89282abc7668edb736247c2421341900a0aef46c27f979b3295b6dff3c0dab3c11d37e8d48abc802d5a03e5eb2340ed8e2c0555ab0dc7390acf02b4bf3cc3a85a86c6b537733ae7f1b1d9795714a31f6b2329b7fa9d32d4ea675ba8e30689baf36d1093b48e7af241128f4d107f94f90afbb69f0c9dfee1d4731c877869e0e558bcb10da70da24c3844bbdb3afd05fde82b646dfaa09457c461b2d32fe3d4930e8eecbed67fccd0b3c48924cd056fe25aea3cae68880c59dc1915e3ae6b0c164158b147208dd9ce0f1397aac324ffb41b3018a50b4a9d247ccbecf400f74deb6aefe955d49b8101696e8fef71a428ffc45afaecdf83f623d844a8ad1185c36cbeb2ec96bdc2c5bda4292ea55d5b7204240777471f321f38f9ebb62712c66de51718d425921c6a44a82e7d8560a68cafb34542fe6b47ffe9ea6aa4fc1ed78d8b9f264cfcd031068175590087bc00b9166d70d94443e3e6e3589a3ba9e7068f683284c57d25c3c255ca0c9d6b75b2e05486c71ff50cb5019d125d25c8de13d41625e24a000ec796c5cf212986499b03200260e6fe1a4b19d514bb7509b2261e0a00e2dde09c6b77339124f6f9b0147dfb3e5ab5e48fe157fd291e3b936a97542d36c8340960e35a348a92b922d3ba87613cc05ecba1ee89bb1416850fb872ee6614630ba3013c4abf728fe4ce4e730b4654e0365fdf1b3ad9a02729b7e00e6fd11d3c8820d034a323bf14842130bccef461ab9ab4d54de4fff695ee1b3c660e62299679531522911044c4e1ffba6c3b80f576ac60348215e3c5a70934bedeeb03282a6bae89c12140ef097c9c4763fa6e86a6871f075948195ba1ab506eadcf61b8e01c90bad2bf5a55905c8dcd38a6997311db97ecbd5ef4eb80ec813c4076b171cebfe47fb9352ef7263310ec2ef162322b37f50dd6009184d1d5e8c30d435da6c9162e6155230b96fe34dc1e6535792d2a9ad88dcf30619afccde9f049df61585eee7a72fae3990fb85b5c030f905f28fd5740a75fc52ea7a71a318cc4afd02dfdde05c9443ab20fdfe1b00cce70c68188d0f653a5940f11356314a2231619d531af0cdfabebfeae395be6bd5ff0cabb49dae0a8ec9e8f3cd508228c4cd3005d12f2cb42af1be4039e40a1302c2a2992423b849da2471ddc31b8e2f6f857a660dedc810bc5837f4245868ad8d7cebf6e13173b327fe4f98597b68e220ac0a921633d34e1dd16ec328a56f8abd0a1e36920372bd2ca0bb9460bb77f442b1dcda257477db45701f71359065d37b8e039f6b4bd1b3c7fa32f999c1251e879ba80888f280836145785fa956991f98c23a0ce701d5a0248487b95c2a81bd29dcd780df297c09c40250a7e285843ace0ae56387843eb2f848805e63581396fe715b64162fd66183e25945fd13d63cc8fe4a23114fbe840e3195f7d74d9a3d61ac871a96f797d51dad93534183f2329201e54649b262efe2799050cd9ccc68e118d2782ff533bd3f3112911f5f7ebed13be1fd0bbee94b9cc6a300a889df9242e823e9cadf54cc0e861c9adc0f00755f24eac86a73ebb9c469f33a66bfd769948a8dbebe643e77fe5a3941e09b8e74ae10f2254bc280282c6cd1d822095836eba42db89e2735c4e63da508e280b71db7fbc03445ec78bffda3ac79e2c8db52c12cc1864526346dc6db08229163859b5d2e831370fae2f617e2db33795e5d83fb8edec80db10c82cc1a29e1bf240654489374089d99a847dfb45008b5ab9849413921024f86cc3a464b37f3c29467d58614957e179680b3c18dfba7625b9f0711fdd9b7b47335d4d73fea04da240e8091b83f5ac4437f74c923c6421f1f23f6cf89176a34305a929e1c0a8cd6825dfc61e70a624ea3ffa9ba921c8d03c2774a09cf3dc0daeb1a7d8e48e6a0ffc389ac7a4f513c76d9448e254e772ff00d5a23a7c1c23de35a40e5778354d6cf252bac68a036425b6d6ecd41e64e069263c45241df16c4547876aa1aebac0abc2c1d5bf88d3e51dc567110e9581a692370af27a23262ce210efc34173498d0d24b7669ceac23a3b7b9d95c6b1573619dfa46a64868c09a46444800c885a604d8e9e91b8d1ac570cc806e382388ae8a9d36194805246d997d1474eeb7ff2686991a7e14d845d98c4d203a93347845d1b5e7b3ee702f1d1e70981ae1f93aeda4fdfc7b37ca4b0ac1b98a145a585ff9472e5ce2385d68391f84414d447619caa9c7a45af101b5ed9fef73e352db1e7b6de4e9195c6dbd4b21922405838c14d719a1d9ff3f4854f24e0f997029af233fbeee9900eb580169e7330eaf613bb9a2b9b2e240ed258c070bef464a235f08d421729b8d0cc53b1965378f2aaeff53786d661021958d22dd21823dc31370bdec54949cbf5f431c76083130227f9605f2f77924e60f4b8dfbcc420dc7c19e0b6fff90aab40af45c6be107f631d7b6a55754fd2c6ef4b63b8d0b5cc76c756c995ec80e3120d4bfbad3649801455576c990900a5453d143c658b385f5d371926479084f756c404199cb1fb2828e006f3d9bd6353a83101cf4428e18538e31c4d46d67025b7f77c6a8141772c50de1758240b86c34b02bccd171d6b82d882df8c721805460ed9b2b22b73c25bbad2a9d12113d024bbf9f70033b62b712d8c71187bb3a7540e0103d220ba7c2456e48699a281ae3fc1992a3975c2e2bb282788502fbc1d8d5d90f763cf73b3c49d8e83f6994aaa4d097eff3cf9e67093739e4401be17c30dd5a2b64cbe2b80d9dbb515b575deb181d4839ae9458ede275bf48ce0d34e204d3478dd10dcade2682f23f44f2e13e24bc571dab2b9ec64e76c372be04ace9b7c17eafd4ccffe284d371876119a41af42b8c1861fe0cafba09112ead9132b401ba7bf603a5957ac1822aeba62a344c53c5de3bed643c82d98cdefa16e29e39d17be1cc78dc8e89d2615357b76ad84650eb760d918c18e097e1fe3169240cdeef857db64f3a6beeea2c1b402c1e4ebb9ad375c5e105ae055d5f4fe2a3e3e4c625b53930cf8e21abfad1f4d101fe2bb936f078ab5c47e3c432d6a0c7a763e15676c63577fadcb7e06f78f7f99150abc36532c7dac563dce6af209cb307bad77894bd2c05ac3ef0308c0fbbc5f8183482552f1da37f571af2517dc76a759b164b851908a03b187c8cfb91d7fa0270c6e7c544c06c1ad819ba2470a55148181454dab2c81c59c591d5567924c2c6377112f9d9570cd2b1ee812047e6e2444d6e38b6b48bcf35d8073de0dd88a7339f88abd8e7cac783fe71d7878943c8f61529c5f608d0d397584643780a64949f6e369c653f70980706e8eb503fd7c0f01532e67770c036c864f0b0e2dc3675fafab516324256c07da8edf1e3be9dada4a6279d300713b65eac246188eb60be1f3eb91a01a9c65624111c3afe8903b8a56f652e14b5673f53715f558a3fb71549e81b4d8b27f101486bb36f0df8a6efc0b3d0002453cef2fd7da001a25c4a3ac619f8d9c4535d9d08e8a1a74364d6cc4cb452a9c336405ac58bffdc37c0c530059db5fa489fabac389747a73e7e095dfcfd329fbd9f5437a911145504fc59e5bbdcc3b82472a1bcebf72c9b0d8f5d65dda8b3a2f05404bcd7b46afb1fdb994239a2398656ffed3a648dc5e9b39f2657b568828c7f20759bd54edc985a7ac888bbd8544e814e257bfe351f94b93c7d22994b57ee5de4ef456506e86cbec1c638d99530271203892234d414abbaf30be4062dafb6d1ae3959661223ae740ea943d7d9f27b630e43001a9a2efeed66e577a1be788b96e3753f32b39aef9b52e0ba227eb6b61a8ac2f9cc6c52f6378971213a55c60ad308de413bb4599e9b2939d30e0f6e6bd39918aff8ac83fd61f13fee1daae01d", 0x1000}], 0x2, &(0x7f0000001640)={0x1010, 0x0, 0x200, "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"}, 0x1010, 0x10}, {&(0x7f0000002680)={0x27, 0x0, 0x0, 0x7, 0x9, 0x8001, "f4a32fc50a83842bee4e23800e4b259c98200892a07eecd5908c03392bc20cb44f68c38bfe5586c12f158bc6fa0e1747167a96c7c124b92cbb75f3923b9efc", 0x3a}, 0x60, &(0x7f00000027c0)=[{&(0x7f0000002700)="81fb5a8c4dbf48d0e8a36a14407182f427af2c049fa7b071a5a1d7e09e0da23ec9fe255fdfff69afca43fc3bff453e157e4e5f330ce726e5c89f3a98fb5e2e9ceae833f8a6608f8b3227aba67943a2956b023e6c8b98ea15c23682b941e96d38584672a7104c8ac1b987f2d376945642615fd5821a32fe9a392b01e5cc", 0x7d}, {&(0x7f0000002780)="a1fe234f7f5c528bd1af159d2a6f974135144c134c82fd", 0x17}], 0x2, 0x0, 0x0, 0x40}, {&(0x7f0000002800)={0x27, 0x1, 0x1, 0x7, 0x2, 0x0, "961b5fbe4852ecafd2cb9760e48dba23649643536641711069889ced17f484c5ce8a2551b777e261c71d4885e553f3b95444c44185b5498f4238db0a7ae440", 0xc}, 0x60, &(0x7f0000002ac0)=[{&(0x7f0000002880)="e5a8bc0501678f70f5b13b101f39d01b1f78375b79efc49fbbae1ecde82c392a8caa93aa9f7e499a105c5e64fe7a585b808e2aadd5e7c50fb6b6a3ffd9b8a1e2e697f8318f058bb1a6bec1d7507c4c3200a7cb1350abeb526879ff61174f19f06499ff225e1c8bad2b5d37cde1606e9adbee52bb3f4f6fa1c9d3548cd092cb4a5281765cd91ded2647806bbe7bafd639cc5731b9f12dbe4990ecb3d075a284b9e152a35d6a21992741d5e4ea88459d5f67418ce9356773112f98a4a14865f06c28f8377c49b58743a070998e0622fb", 0xcf}, {&(0x7f0000002980)="4d2bec8942e128a426b5afe8d9ca759b18a9b7b024ee1689a2c0b1e3c2c6e7b94dccae7fa5f7f4f52f693363cf493e595d43128aef679f923b642740b8a4bd8e1cb0b0a9302c99f47adc295f43b9df664415d07b8281651da883af59ec6664ed995ee213620a47f0971d8d7a8940536a97d640276bae87336fe35e74cc4add80e3912a92338604297b487354d177a7bf4d6614e3384e5666a8eb82563fff46f50341af9403be628e", 0xa8}, {&(0x7f0000002a40)="d90caa5e94fabbeebc6a0a926cdcc81893a24ee02a7e5e699d41a1bc27bf42de9a5a65980a3272b8c04423556af0092f5666e0a4c2256dea8d732c571ce082be5223e08c1007788d16aaeeef66e5a52cfbe3aac4c5ee422b361683e088286c99b12f05464b8a059fb7bd39", 0x6b}], 0x3, &(0x7f0000002b00)={0x30, 0x13f, 0x6, "15f42307a091ff78c704d32fe97d5e78c7a3423ba320df5aec56dba24231"}, 0x30, 0x20000040}], 0x3, 0x4000014) accept$inet(r4, 0x0, &(0x7f0000000400)) ioctl$void(r3, 0x5450) 2018/05/18 19:42:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000004c0)="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", 0xb4b) 2018/05/18 19:42:48 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) 2018/05/18 19:42:48 executing program 5: 2018/05/18 19:42:48 executing program 6: r0 = socket(0x11, 0x100000803, 0x0) r1 = syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x20000000002) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x5001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xaa01}) write$tun(r1, &(0x7f0000000100)={@void, @val={0x0, 0x1, 0x0, 0x5}, @ipv4={{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1=0xe0000001}, @igmp={0x0, 0x0, 0x0, @multicast1=0xe0000001}}}, 0x26) 2018/05/18 19:42:48 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') sendfile(r0, r1, &(0x7f00004db000)=0xd6, 0x8) 2018/05/18 19:42:48 executing program 4: 2018/05/18 19:42:48 executing program 5: 2018/05/18 19:42:48 executing program 5: 2018/05/18 19:42:48 executing program 4: 2018/05/18 19:42:48 executing program 3: 2018/05/18 19:42:48 executing program 5: 2018/05/18 19:42:48 executing program 1: 2018/05/18 19:42:48 executing program 4: 2018/05/18 19:42:48 executing program 3: [ 411.340266] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:49 executing program 1: 2018/05/18 19:42:49 executing program 5: 2018/05/18 19:42:49 executing program 3: 2018/05/18 19:42:49 executing program 4: 2018/05/18 19:42:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:49 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) timer_settime(r3, 0x0, &(0x7f00000001c0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000000)={0x1f, 0x3, 0x3, 0xffffffff}, 0x6) tkill(r2, 0x1000000000016) 2018/05/18 19:42:49 executing program 6: 2018/05/18 19:42:49 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) 2018/05/18 19:42:49 executing program 3: 2018/05/18 19:42:49 executing program 1: 2018/05/18 19:42:49 executing program 5: 2018/05/18 19:42:49 executing program 6: 2018/05/18 19:42:49 executing program 4: 2018/05/18 19:42:49 executing program 4: 2018/05/18 19:42:49 executing program 6: 2018/05/18 19:42:49 executing program 3: 2018/05/18 19:42:49 executing program 1: [ 412.733743] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:50 executing program 4: 2018/05/18 19:42:50 executing program 5: 2018/05/18 19:42:50 executing program 1: 2018/05/18 19:42:50 executing program 3: 2018/05/18 19:42:50 executing program 6: 2018/05/18 19:42:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:50 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:50 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) ioctl(r1, 0x5, &(0x7f0000000280)="b83a3a32fc8eaff51747649f045304a92709942a1460063e12a3bcbe91e47c82e86c06e4339869b50730657c8015bd2fe166e463504a718f51beea61fd0bb64dd2b884fb35bccb0e6a2a891918a65f63aa38f7699473d21e2c89495f32adb5366a96a20aa327033e676e7636e9be8360964a77870328d709c4fcb7816df6935b9cfef2a9b03666fa1b79a1f606054753d48f5ae2fa371d0e2a4c35ee92c3bebb98f6928eebab660453db36c62463850ef5b28734cfc115f457254e6bc14438258e66dd7aa7f294b76f76f864912e52b74db705df3cbe9721b1aa53a2222c28d27cdf2ef36eff8d4f57e519116a41ba86dc66d072c286a4c5c60b9ed4234c6861684ce5f15b4911257522ed169dd8f8866d8153ced54a6fda7376b002e1a5102b696ae72e857af91070855b7d03b439e772f29c5d4a133c2cda751af2efad6dd90f6424368630d68197c94c010cebfb1d3377e47fdfdf8191fdad55bf309c87e88c16d1a89999b91da93128011d6b0435897e5498efa04de10085836a5af15f155f0f117b5a331254673cc45bc4a999b43bf7ea49855278984db84892ce26100eb1af1dabb90dbb582c9df6a0c2a18a2fa9f3b2dfc8b477bcd0d114d05c6e702dc5cbd2ed45f1cbc4de2913a00729eb07ae04b3449764b5b01554f20e444571a7ad087183588c5ac7a7ee93e63444d0a588e16b97a092ec246f4d8efa151319c58a61dca42151f030b54fb97f0201ea372054794e44c04ef0479a8bb1bacdf241a8ee49451a197b369ceb06a9a4aef97311e98415442d1292c36e0c64e9332af7cc625de302cae44588ff05639ded87f05327b4c3e918ac3e81f1fd1a67277cb3576da9e10e8ed498d9624c5a133446aff12140e609a0d8ccc065f0bae59aeeeca19063873159555511650204801720417b447262c5ccc26413529ec1677af66c6cbff220055161e3c2d7d260392e8aba47a819b11f8c2ce7e276fd294d78d8f5c54cfd5507cbf2df2a4708fe8fdfcf06773c52d6161cfa90c196ab80979b858805a1ae637bfd5fd029b64af9148c99453608eb6cbb759a8514dcdd26a9f200699b1a70574306973fffa514b35d9b210e781295ab663746475604ba7bc33b27799efdce2141d878be6640fe1de00d8440f9aecd8604b13a2ce1f08d28d5cd81765240ddf215d27c6977dc8076a5a4b9065d9cd51f6aa790ab5126d329af064ff03c38180f0dfb3d21616e089af35fade935aa3b7f2b7d68480f8a642e002360af1ad84fc66003b149521ce2f36e1f8161de3dedae9b6e8530ca2b58f1b1edf130a5a07bf9939c4d5a2d6053abad62982ae3513fd1ff86e25f91189602fdc11617d01850b34bd9a9d5190b771a9551ad61741ae4edf555adf265aeb162efeef42f1589b7ad09297162cd86f16f29314fc07ff0eb33b6f496ac8971491920249b4af553b3a47a76cec7230b7c9fc73321aa5c4dfa380bbbc3671114767022cdc9e6d94a00da9d32fb257169a4c1a4af42d67d51426585f6888d12594e436251b432496b3226135f79e21b74d6c16da6720958bed87d8501f6ecb706d69689be6944673941f7715ad745fa0ba6d62a9a3d6f44b6875dd05ceb85bced20c268e6a156d77ff05698a6b40533153308ddf99672989eee93f3729574b85f80cb2798164dc33c21ef7880b30e2fcf8ff5df39dd4557596465113fdace4b2b7bbad22916ef978d324d60d41fbcc1dd72aa374370073811ff5a5323a56a3a09c55db4833e4ef1d7a216464baabe5867b3327a0f2f707388eb7d79cc8d85b46c4758ea209dbc807210f08418d858835bd28247aadee2f20f05d331a65db03d2035ca179f28e7f65aa30104fd9aeeaf1a120550f1d340222c2117f797c2bdbb1ce93b5d2a3748772cb4bd63e4c7b2445d5363cffb97ea3a34d7ed9baee48ebef89b7fb36e0f0e23c8151c841c41f592ccba3332aacde256fde5a72eb8a22d4ab48669115113dc6d13d7c835481a52c5ba0a00cfec269a04a505f407d3d395f5c03e09d65e6fe9b3759003656fdc0c5038d5266fe19e74e9995c8b96092b053403f93efc2e291a7e6f6971604f613c3d54c56e1a7f134b9ad30c5ecbc91d2f46260c73cd98f28adf87d85f5d046df8871cfd337c36e51d8cdf853d84cc7c75eab15964206c3fd510ee827e1ac726bae50817f5ba824a810ebf441077677769711a5ecf435dc1affb43c250acdb7b76bcb53bcb1bc5019c02db479956b1f0009c607c02f44521e9cadad92a4068f98f43ad8c136cadeab739625f6bb2fa9150238d7773886b468d3eeed951636a7508993b9862b3d5186b5c1e0021d74784520a083ddc00fb90a72c57d882d92add1497ef762b185427912daf795dbebed62dac14fe6c52841e700536cb195380b5ee09cb82acaf4867c7a88cf316055c5b941326cf5fe5d92506ae2a90cee56e4f2510dbd923d93a9e6ed005cc3acd4bd41d295e172d54bcd6eacb8a29a5057fce50447a2ee96c640b8a28ce1bcbd2f278255708e724cc9384a959adcefebe38daab457aa7399efdb2972f745393bef49672e660c2ea1fd071e20f410da4e597233847e4c49612b465f9c1fa9d15745245b5808112f04e5a14f374a4f18ee4017049684f93f71223b69472b65752f7cdedaefc8b0576330a696b2a4953e4838a5215acf610be1d674d389c44c10af8c11bb328cf05b002dcbd0ec6ff1f051e7236336c1d0e8eced43cb3d34d6ecf1a9be79830812bd455509d9fbde26ddd4286711b8bff77cd68ea6e59a4dd2467c7380e74e7a54b351abe578b90bea877324652ed60cd5a010ab2bb7c0494d2bf86889c99da9644eb75ec160b81a7cd0283e89e99d8335fe61a7b56da90d07f3178d815c31183830547dc4ebe00b9d1813aafffc85e2d2e57056a076e42b6386507e93d0eaf3eb8a368c718300798e6b4e31f31d4c7abcfdd69321c0cb61c9fd96d02c66a5e5357912f043e45819959fa19e24acdd27db58e273477a0d2f9e2755a60765bfac1b4b36452f9c683f434711a1e88d3b61380c0f87e8b782a6e5acb4bfaf3c42f0bc5541cdf16487b5e946ee57338d768649a21750478bfe90d9976b70f72d294e91f02d3efbe068dac78ae38142b2a46bc9498814008d6021d4d1fd7d3d794a80272ff39af77ad487e2e87d23d40a8af7f07fe0b3229b3a990df7fbfb7995cf69daa5bfc9b59e7d3dc17abe9649c338851c25d409d7e43bbfb048cc159164aadd6a0b16b39eb5c115bead3b12dc71e8f932f324eaea3f64bf4d0d6dd964312ef2d8d13302b71b699d3841ed3560f4de9896191dd0636e835d4d2b400b73c5a32ded92399401ce797e0c1a4593c530be48d3cc3f63a8f67139c642ced9207a2d5baa18121abddd14da1f8a0ae340cbbd5a1fa53b116e9283bd788f266b0906e3479fd9f916a609ab938133f636f333aa8f4a2d80882d9d843197409c02b29b8597a54e97c89f7ed64da9c7e772859da2227e13225898430bde4ff6f7b26c227b54b33c8a2ebab32205501d1a92ae8838ab8c1906786e714f10a882649edf06978b5300adac940f0b3c896fef2f5ea0679042b782f394e2d3542ab3246d0fdcdb4b32517aedd3c3c2629d846123274a14a25a4099cd993903935c3b10cc0a2aec3dac949f0a53a33b4f36c031d2f84a3e0492e97c6eba7754a6b920ba66ff0eae42e74d77ef312b78f03d7559c9e50148e91c5f49ff01aacb816113a7c6e00648f679384a044f99021e41e9fdbec5b65cf0311a7ec29191f8786070089eb43bcf98e45621bc946f0c0228c6b129784571a035667d2ae7617b7581181422ad9928d0085d1dd47c75a719d148eeb0bf8fc360e097b1df329cae74650f6deee83539cd7da46841e500825f156198d04f9793b360c2b462d63d6a07a214ccc9dee188f500cde707dcf637286786e9a82c558cd12d6a50e538829fe4c3f4d0d65c87ff09906ff68ee40dbdaaef0e34672fb438a484ba758b6b33f5a7348af1ae9c71da4bd25ddb81387db0e68bd95ee4c69512ecbd9d57b1a59e3c493732bbab68c7a418ba42b3320d37b5162167c6f43a3783ca68cb474fd37cdb2949099afb3e9feea2e43302d8b4c2c08a2eac368448c8ff8be9ae133433a4484f2bbfc361eff4a935c1741d35de0b2f30ca5da5699392d455b20226951b17cc593d68c224ef2b636f327f0a7ee950ef778fc6abd9536be20cac47b0b6daedaf7d6c90120f3adcdb6d78f2b26fac5776cdfe6fe2beba959f5972a8b5c6e478cdfade4bdca1e722df238d69e95a7c81c0fb3ba84bcffd7970c312814604956137de790389ac43a1ed322fc532e0640ec049acab6756640eba6d2cb2c89ec1efdc0d91d6c09099ab18ebd10ee9204e8d4945b44f2d9036d52d5654d8c64a02779e5978e0783deb6e2075ed6b49ebc0a0dac5b916621a5bd057f6d04d464814d09bdfd945d4c6c10572c61be3a92b1395df78bdba2cb245434248e37df09c01b8561cc53f6840af2506ac2088a876d77ef38f1f5d82bbac2e094c2f4de2d7bd32a1d85174b4a46831d5cba339e167b0941809ce9732b73638048fbe7c6e0c29b4e2508b279d8bdfac525b34e64c005fdd0be1576a5ee7b597cd1c77f7c54401a4dfe73e070ea6ea7a3e83afa4655a25f07ae6b18f6554e768c3149a0a84c0cbe7f752035fdaf959264979103055c27a4c8b091757b4392c0712ddc9d194658d128335491a9a4f9badcc38118504bd9f544ee17f3ab700383d5e79be8571cf5db894fb6a8108fc81bfda2e243be0a33039aff5e062989493783f4dd04e50727e6085aeba89fcbea24ad9e866c6cc2a45d28b7aee1dbcf48af9ba0780916f046f093d13f3af68c9341f9f1496cf0f3919c2aee1f614243ee5b211c439784a5e0503c83ab1caf8fb735036b38ed27ff00f6258d3301878feebfc0c4e86fa79b4d49bcd61035992614724dae8b2b15512deea4f00fcc1abd654cf284c09581a8fb4982c27912acc4edc6ecd9e90952d934f20d59a34e360a239cedfe085d6397061f249b84f83b454705ac8058394897e11ab6f8718bf292e553b32f5b0d0f730b019b9e7993956ff0607648bd07c4140cd03d081953bc954e53b074ee0d74be9265d5f1d3d5becae231750ebe397efee412ea3d0a3b6410675f272fcbf7a407604680819096a0edc4680ba5f03132eb4814eaa325a21e060bd5cb7f6ab3f559e1a11e01d51aebe469f93e58b1669b1bd91a85ef163214f9fae6175e3fd6d0901a0a81c17d26e521f9d06280f2f73641b0eefc9715113e554cbdb4716f0d51a94c09b42321904ef49f45ec2182220159d5ab4047b2b301be7b4896dce66b34d56db3507044065024b0b6b7b48d4b1cee1fea8273b7523d6786ce5aaecdc836cdad5f109271ef997d8e41f8a731a774dfa0489fc085f723afa8c74da7681f1a0a332f3fbfaaeb64af8caa79677dbfce1470dbc0b1141f8111c86d323ec8395c042e59ceb0e88a3d2b3df13ceb6e3462171d9a13410ac92a0c406e63beae66858abd64870b7207eafaa3cbf6b932d153cbab28f712f60cda33ad3595e8430a788bbd70473f34ce4718c0e8994d97bafece4e259036f5808aef673fe1da41088391f6636a3c9727c2dc15f789f9a2fde00493b50adfc7a6b02e597dc54084d7ff5e27b948e740b4dd287af95c3bdddccff60775c16204fc6097a33ae6652b9913474a697c8082a83f9400743ae048d65ec67197a170d286493e80d2d3fb4c11f0fd3e5c6e2d9067e1f59c8a3a939cf5c737c4d3ec") r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) timer_settime(r3, 0xfffffffffffffffc, &(0x7f000006b000)={{}, {0x0, 0x989680}}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000016) 2018/05/18 19:42:50 executing program 6: 2018/05/18 19:42:50 executing program 1: 2018/05/18 19:42:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket(0xa, 0x80002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x3f}) 2018/05/18 19:42:50 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept(r1, &(0x7f00000001c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, &(0x7f0000000040)=0xffffffffffffffd3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'eql\x00'}, 0x18) 2018/05/18 19:42:50 executing program 4: r0 = socket(0x2, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCCONS(r2, 0x541d) 2018/05/18 19:42:50 executing program 1: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000e7fffc), 0x0) r1 = gettid() ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c62626") getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000006200)={{{@in, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000006300)=0xe8) geteuid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clone(0x0, &(0x7f0000000340), &(0x7f00000004c0), &(0x7f0000000300), &(0x7f0000000440)) tkill(r1, 0x1000000000016) 2018/05/18 19:42:50 executing program 6: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)) [ 413.623336] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:50 executing program 3: r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x2, {0xa}}}, 0x32) setsockopt(r0, 0x400000000000111, 0x1, &(0x7f0000000580)="4f4610cf", 0x4) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000007c40)=[{&(0x7f0000000000)="981f86018a3db9", 0x7}], 0x1, &(0x7f0000007d00)}}], 0x1, 0x0) [ 414.464330] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:51 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept(r1, &(0x7f00000001c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, &(0x7f0000000040)=0xffffffffffffffd3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'eql\x00'}, 0x18) 2018/05/18 19:42:51 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:51 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000698000)=0xe) close(r0) 2018/05/18 19:42:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:51 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) ptrace$setregs(0xf, r1, 0xba, &(0x7f0000000280)="47c770a58c7bcb94247e52f0081e845bfa786192f164956b715c875a0b7891342317630bb34a6c20dd4d9f13bf0667a3e0a07477fc37293c3c2654f04604414b14369a76689374966423b671b7c34872125c6d8a5ebbe9fe4578c6eed335b1972577967cefe1ca90e29397ccc6b4ed62d05892b396a2397b17d279b6196779d0f3581e97b7a8430fe352c5f38252a0eb3bf3833fcebc2db351fba9a0ed9e144178f60dd4e3ed1ecd296f88031833196d6aa4d063f6dc9881b8d25d440753defb4a486455dcea5980b333bc8419") ioctl(r0, 0x8910, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) r3 = gettid() gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r4, 0x4c08, 0x58) syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x400000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r3, 0x1000000000016) 2018/05/18 19:42:51 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:51 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept(r1, &(0x7f00000001c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, &(0x7f0000000040)=0xffffffffffffffd3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffdf7, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'eql\x00'}, 0x18) 2018/05/18 19:42:51 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x9) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/05/18 19:42:51 executing program 6: mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0x0, &(0x7f00000000c0)={0x0, 0x6, 0x94}) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000280), &(0x7f00000002c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x6857b21ff1155d93) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) mq_unlink(&(0x7f0000001800)='bdev\x00') 2018/05/18 19:42:51 executing program 1: unshare(0x400) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000008000)={0x2, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000012ffc)=0x90) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1) 2018/05/18 19:42:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 414.713999] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:51 executing program 3: r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'yam0\x00\x00\b\x00', 0x4016}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000700)={0x0, 0x4eba}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000780)={0x0, 0x7}, &(0x7f00000007c0)=0x8) sendmmsg$inet_sctp(r1, &(0x7f00000008c0)=[{&(0x7f0000000100)=@in={0x2, 0x4e22}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000140)="2e7334836a83e8fe3fd67bfa0521c1b85c5452b96bbf5c2a9c192978948423a878cd192ae576deebc6b46269f9c8e1db99ccd5e49cd9a9dadfe7d44fd6ea246d9a8d527530a01cba47b53fe90836e35cc315818a96e53d6a75fed0c305f1e55b5aefa3a0438e2682e93e6576ff0e3e0f66e332fce534cd588a6e3b4aa428dedce90fe111f8f6306d362c91412eac90168feae9111c63b68990d14378087ac54ae67c2fe1296076cd36b0e17a741e4b1d3b3371736e0bee06ce79cce154311d743232518fbc4610eae1ba8a75affcbd2ba6dbfd84fe915d4333aa42a2efbd6ec9577145d7346763f42e69c84f30", 0xed}, {&(0x7f0000000240)="dd68c8d48197438cd5485c3d78", 0xd}, {&(0x7f0000000280)="2411f1acca3a984c625f22b23e790553dd3de7c381ec68fa87f14ecfbb874115b13e84d9d8b20f4875847df8e9baeb70f921397d97496e3c98a0f56693f02fb6a0928e965fb3", 0x46}, {&(0x7f0000000300)="975364c3fc00294ef46b0a9c01acc1178226be5ce2cde6292176d10207688812b470246e013f250e55a4f22e787acfe477f02f694a09d9483ea84e55fc60bbccc3e7d1f3431bea3f745f600153793c3ecf5c100bed0ed1085194219ab874c9e4f0facde917445e539afe5de098d886649b84c50aca0ea51a1aef75937e93ff9719ac28765666892619b39c286bae86844473934db4b1f694cac2f65773decf701af164982fa087a8eeaea41ae687eee51caff86f37eabe00db7e4ae096ebbabd167556bfe9b0bc96230be73aa602", 0xce}, {&(0x7f0000000400)}, {&(0x7f0000000440)="bb9e9c33b00ba64a0430122004750dabb28cbeaf7f756008ef86f751b70ece0263eba8454caaa33b83dcccaefd407b", 0x2f}], 0x6, 0x0, 0x0, 0x4000800}, {&(0x7f0000000500)=@in={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000540)="62b3ae3c22df3e1f6c2fa916c2fd3956e7eea8e27ecb24bb7328e43d518a4de696c348b7cd720b595ef0adcf3da491d243d2bb24d7742439983964a6a3", 0x3d}, {&(0x7f0000000580)="421a050ead0fedb376831958f8171150f4f544b56415aaa3244e5a074e66f89ead1c3543aef5ed0080db67ade684c22a80ca1ce42981d2a89064c7cdf0a41b63c1fb8e670202c37d3963a5b6f17ba0248ee35e86aa59ace0698f4285faabc3a711371b4cf2d52ad3fb0fe765b2535fdaeaac080a1e17b2bb5304f7a8c3e5ee23a13de1da0b563e38c96349025eedea46144c306e364c2502b510b262b94056f52fae6dee3e", 0xa5}, {&(0x7f0000000640)="345d2bb91b03fd6b2b3bd9605a870b03575d63f18916c3a4eb52c81bf57ceeb5f9c2cd904c688b320d6942b690ec23e6612b8866b69a6592b8c197fda0e66658a4d6cbbb9d68ba497308d206bc6af04b0955c79a894ec5a4388101f9724eb26ed4d76067d1b80a66cca66c68fa7ab7abef5f379b9c7eb773f3", 0x79}], 0x3, &(0x7f0000000800)=[@sndinfo={0x20, 0x84, 0x2, {0x1, 0x8000, 0xfff, 0x8, r2}}, @init={0x18, 0x84, 0x0, {0x8, 0x401, 0x1, 0x101}}, @dstaddrv4={0x18, 0x84, 0x7, @remote={0xac, 0x14, 0x14, 0xbb}}, @sndinfo={0x20, 0x84, 0x2, {0x9d05, 0x8002, 0xffffffff, 0x8, r3}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x8001}}, @dstaddrv6={0x20, 0x84, 0x8, @loopback={0x0, 0x1}}, @authinfo={0x18, 0x84, 0x6, {0x3f}}], 0xc0, 0x8000}], 0x2, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000940)=""/84) eventfd(0x9) 2018/05/18 19:42:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:51 executing program 1: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='!', 0x1, 0xfffffffffffffffc) mprotect(&(0x7f00000bf000/0x1000)=nil, 0x1000, 0x2000003) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffb) socketpair$inet(0x2, 0x80000, 0x2, &(0x7f0000000780)={0xffffffffffffffff}) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f00000007c0)={'filter\x00'}, &(0x7f0000000840)=0x78) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)="2f602757fc5e96a933b25d96510cd5af078db4121c300ff18410ca7c25a2e040f2715f6b98b8d43d6a1b93a9baeb662fc7bcc7e7440c868abb1c53705a7cc0de5b026cd98fc50a5acd343dcd2f615ebc39738c94134daf152b903ea5d6ef3ce3284de828a7f8403f662a97bebe8792a825813dc24f31d50652321075ed9b6763ac1ee044f158b3c53e7bd8df7e2972c51ca55ad5bba43ee486714c869718c93fb239370f0d061e4669c7511b2a6bf8b5ed68b6d6c19dc0132a57989dd37fda866ec78a3d735f69a418861e678f1de5c3120a", 0xd2, r1) keyctl$describe(0x6, r0, &(0x7f0000000400)=""/140, 0xffffff70) [ 414.852551] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 415.498534] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 415.502910] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:52 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000100)=""/54, 0x3faa912f6e5489f5) getpeername$netlink(r1, &(0x7f0000000240), &(0x7f00000002c0)=0xc) ioperm(0x0, 0x5, 0x49e) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000080)={0x1ff, 0x800c, 0x0, 0x462, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={r2, @in={{0x2, 0x4e23}}}, &(0x7f0000000200)=0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000300)={r2, 0x7fffffff}, &(0x7f0000000340)=0x8) read(r1, &(0x7f0000000040)=""/51, 0x33) mkdirat(r1, &(0x7f0000000380)='./file0\x00', 0x1) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000003c0)={r3, 0x1000, "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"}, &(0x7f0000001400)=0x1008) 2018/05/18 19:42:52 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0xd0000) getpgrp(0x0) fstat(r0, &(0x7f0000001480)) fstat(r0, &(0x7f0000001500)) r2 = getpgid(0xffffffffffffffff) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000240)=0x2, 0x4) fstat(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@ipv4={[], [], @dev}}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0x41d) r4 = getpgid(0x0) lstat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000001880)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]) r7 = getpgrp(0xffffffffffffffff) r8 = geteuid() getgroups(0x4, &(0x7f00000018c0)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001e80)) sendmmsg$unix(r1, &(0x7f0000001c80)=[{&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000012c0)=[{&(0x7f0000000140)="58c15ab000e2060174d8ed44766bc88e46c852bd0a7330c3d969d46003087d4ac287bedbeb0c3d8adddb995738905bbf2f35f09bbdcfedd2d71096c4bcf7fe0b4379b942b2c19f2b8472b3345e6557da808f7dafabba0526fa15fd670c123c20a2af79d523f4c06be38779596ca8b3cdb18c0c49775a0c2de7b1771414d190051ab13dce33cc66bc25a54d3fca400edcd5a5cd80878ecdc51cfe73cfd683c098014f94c451dee54b057c4e0edd420db625d0b036bf0e3ec82cc11162b837c3b84588185b56348e67f8bafaafc523f25c2319762794", 0xd5}, {&(0x7f0000001240)="0472a4903a4cd8fa89cb27a7c7cefde4d6c968c54f189119b00c8ee759ebcc49237c6d368bca533731d4b681c11079900cda410bca3b77f6e2fb9ac9ffe46cdd77c8b964f9ba", 0x46}], 0x2, 0x0, 0x0, 0x840}, {&(0x7f0000001680)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001700), 0x0, &(0x7f0000001900)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, 0xffffffffffffffff, r3}, @rights={0x38, 0x1, 0x1, [0xffffffffffffffff, r0, r0, r0, r0, r0, r0, r0, 0xffffffffffffffff]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}], 0xf8, 0x10}, {&(0x7f0000001a00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001c40)=[{&(0x7f0000001a80)="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", 0xfa}], 0x1}], 0x3, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 2018/05/18 19:42:52 executing program 1: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000002c0)='net/ipv6_route\x00') unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x0) 2018/05/18 19:42:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/hwrng\x00', 0x1010c1, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000600)) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000440)=r2) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e24, 0x8, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, {0xa, 0x4e21, 0x6, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x101, [0x40, 0x1, 0x1, 0xffffffffffffffff, 0x4, 0x3, 0xffffffff80000001, 0x200]}, 0x1b8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x1e, &(0x7f0000000000)={@ipv4={[], [0xff, 0xff], @rand_addr=0x9556}}, 0x2d1) openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x400, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000380)={@dev={0xfe, 0x80}}, 0x14) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'nr0\x00', 0x0}) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000340)={'veth1_to_bridge\x00', 0x1}) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000480)={0x9, {{0xa, 0x4e21, 0x7, @local={0xfe, 0x80, [], 0xaa}, 0x800}}, {{0xa, 0x4e21, 0x3, @loopback={0x0, 0x1}, 0x10001}}}, 0x108) setsockopt$inet6_mreq(r0, 0x29, 0x17, &(0x7f0000000140)={@dev={0xfe, 0x80, [], 0x11}, r4}, 0x995cc45af1804af1) r5 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sw_sync\x00', 0x40080, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x10001, 0x30}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000002c0)={r6, 0x40, &(0x7f0000000280)=[@in={0x2, 0x4e22, @multicast1=0xe0000001}, @in={0x2, 0x4e20}, @in={0x2, 0x4e24}, @in={0x2, 0x4e20, @loopback=0x7f000001}]}, &(0x7f0000000300)=0x10) 2018/05/18 19:42:52 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2d, &(0x7f00000000c0)="cafb6da316fad93bd9d1eb9a43182007fe6c838e9b0f5f3f0163285cfcb5409d7c2429ce41194d5cdbf053f98130fe74624df15068400c5da8d5ec4ff68ed98aa0cba6f2b8547ca9f7eecd17b7520816d1fc9f4a0d526cf67b7d3aa318c269cf5188faa32f591aa41d59f6cb5b8fe1b15f7cf1cadb0c8301e4f85ad32534919d6002c0bb90a01be35859ac7cc56bfe8f1c42a7c04f06153732019c106742b0d72e8567da7885bae712b5177a9a10cd9a8b23517b8376154fc5c56f18b2af3bc299796642f722b339ab3851369e13305a08aca2def4", 0xd5) setsockopt$inet6_int(r0, 0x29, 0xc9, &(0x7f0000000080), 0x4) 2018/05/18 19:42:52 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) 2018/05/18 19:42:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:52 executing program 6: r0 = epoll_create1(0x80000) r1 = epoll_create1(0x0) close(r0) syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0x14}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)) arch_prctl(0x1007, &(0x7f00000000c0)="0d85efeb5a35c5a71fa8f8773dddd4f0dd921fafe0d91077aca00b50caeff35f04534f57efcf02f998552b1461cf926217fd2c2ab60b8c2798180b0c76061f8875c82aeec0cfcdc0ed09103c71190b4069543c440b92febc728c3439ea1db203306acb197ccade05425516d8603ceb913283bc1976135ead830231f33d7da546742b07b49bbefef8a2cca89962add234cd555b18e7b63b226f5407879d8a6a47ca302fa0c772f34fb31ec1afb956e6c982d814a9") epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000001c0)={0x1}, 0x1) [ 415.669887] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:52 executing program 4: mknod(&(0x7f000086c000)='./file0\x00', 0x103d, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x204000, 0x48) ppoll(&(0x7f00004fc000)=[{r0}], 0x1, &(0x7f000087fff0)={0x77359400}, &(0x7f0000fafff8), 0x8) open(&(0x7f000055f000)='./file0\x00', 0x2822, 0x0) 2018/05/18 19:42:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x69}]}, 0x10) sendto$inet(r0, &(0x7f00000006c0)="bd", 0x1, 0x20000000, &(0x7f0000e68000)={0x2, 0x1000004e23, @loopback=0x7f000001}, 0x10) 2018/05/18 19:42:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x7fff, 0x4) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x24004000, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)) [ 415.789527] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 415.820621] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:52 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x8, 0x0, &(0x7f0000000200)=[@increfs={0x40046304}], 0x0, 0x0, &(0x7f0000000080)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f00000001c0)=[@increfs={0x40046307}], 0x0, 0x0, &(0x7f0000000280)}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4080, 0x0) accept$inet(r1, &(0x7f0000000040)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10) 2018/05/18 19:42:52 executing program 7: r0 = socket(0x9, 0xa, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x6, 0x1}, &(0x7f0000044000)=0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) timer_settime(r3, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000016) 2018/05/18 19:42:52 executing program 1: r0 = inotify_init() r1 = creat(&(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd) inotify_add_watch(r0, &(0x7f0000000200)='./file0\x00', 0x84000482) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000ebf9dd2200000000000010000000000000000000000000000000000000000000000000000000005e4ac05ec2a2760e9a34205acd98f2de38d74700b8f816c150fd555177366259fda1adbe538ab62c29637b101bc68297df983d67025b4b89eac9f8191e1aabe27a18669f8a44247a0023de458a380b806e316a"], 0x78) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x40) 2018/05/18 19:42:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 415.907214] binder: BINDER_SET_CONTEXT_MGR already set [ 415.913143] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 415.947370] binder: 27822:27832 DecRefs 0 refcount change on invalid ref 0 ret -22 [ 415.962742] binder: 27822:27823 ioctl 40046207 0 returned -16 [ 415.980307] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:52 executing program 6: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e00000000000000000000000000400000000000000000000000000000000000000000003800020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff050000000000470000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) [ 415.992323] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:54 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f0000000080)=0x80000000, 0x4) prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x1000, 0x5, 0x3, 0x6}, {0x39, 0x100, 0x2, 0x6}, {0x3, 0x0, 0x7, 0xffff}]}) r3 = dup(r0) memfd_create(&(0x7f0000000000)='*\x00', 0x2) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/88) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f00000000c0)) ioctl$TIOCSBRK(r3, 0x40044590) 2018/05/18 19:42:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:54 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a06000000a84308910000003900090020000c00060000001900a30700000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) r1 = dup(r0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000440)) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000200)={@mcast2={0xff, 0x2, [], 0x1}, r2}, 0x14) r3 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000280)={0x400, 0x20d, 0xa, 0x8, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000300)=ANY=[@ANYRES32=r4, @ANYBLOB="c1000000d545efcbd9ffae3b4dbc3a4aa15f0c5f69822f1529fbc374d5c261236765b8985d1b4c7ebb92a754300aa8788a8138c7061cdf96661ca39260cd52b28f1575294b54ec3c8dd2a9b94c1771650705f23fceaaf28ee17f3885a9c9c83d2a717f0d49a082905d57ba611bf62e8a5ab6c0299c23e3bb6f57cf0143519bbb926aa0d9dc16b9bf5523f0c39e5cb912c415fad202c27a5cb054eafa1f4a9fecad6fee83f2f0e164c8e36687d81313ec67f54f87460efa41930a54caa8159b437936d0785c"], &(0x7f0000000400)=0xc9) ioctl$SNDRV_TIMER_IOCTL_INFO(r3, 0x80e85411, &(0x7f0000000240)=""/17) 2018/05/18 19:42:54 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xffffffffffffffff) read(r0, &(0x7f0000000580)=""/230, 0xff0e) 2018/05/18 19:42:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:54 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0xe092) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x3ea, &(0x7f0000000040)="c626262c8523bf012cf66f") r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r2) r3 = socket(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x33800000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)=@gettfilter={0x5c, 0x2e, 0x104, 0x70bd27, 0x25dfdbff, {0x0, r4, {0xf, 0xd}, {0xfffb, 0x9}, {0xfff2, 0x4}}, [{0x8, 0xb, 0x80000001}, {0x8, 0xb}, {0x8, 0xb, 0x800}, {0x8, 0xb, 0x6}, {0x8, 0xb, 0x6}, {0x8, 0xb, 0x4}, {0x8, 0xb, 0xfff}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x1) ioctl(r3, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") signalfd4(r0, &(0x7f00000004c0), 0x8, 0x0) 2018/05/18 19:42:54 executing program 7: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/95, 0x5f}], 0x1) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000016) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40080}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x11c, r3, 0x20, 0x70bd28, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9b8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6c}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfffffffffffffffe}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100000001}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2e}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0xd}}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100000000}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x100000000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9e23}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9b8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xf8d2}]}, 0x11c}, 0x1}, 0x8000) 2018/05/18 19:42:54 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 417.250434] IPv6: Can't replace route, no match found [ 417.262407] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 417.269690] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:54 executing program 6: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x8200, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000100)={0xd, 0x5, 0x1b0a, "1bc650242a94937842c7d65456"}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x969, 0x8001}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 2018/05/18 19:42:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:54 executing program 1: r0 = socket(0xa, 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp\x00') ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000300)=""/244) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000007000)={0x8, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="11634840", @ANYRES32=r3], 0x0, 0x0, &(0x7f0000002000)}) r4 = mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x11, r2, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000002c0)={0xc, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="036335babaad3000000000000000000000", @ANYRES64=r4], 0x0, 0x0, &(0x7f0000000240)}) 2018/05/18 19:42:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 417.292815] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 417.292828] IPv6: Can't replace route, no match found [ 417.358168] binder: 27880:27881 got transaction to invalid handle [ 417.374611] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 417.388357] binder: 27880:27881 transaction failed 29201/-22, size 0-0 line 3019 [ 417.400655] binder: 27880:27881 unknown command -1170906365 [ 417.412836] binder: 27880:27881 ioctl c0306201 200002c0 returned -22 [ 417.445891] binder_alloc: binder_alloc_mmap_handler: 27880 20001000-20004000 already mapped failed -16 [ 417.464314] binder: BINDER_SET_CONTEXT_MGR already set [ 417.469710] binder: 27880:27881 ioctl 40046207 0 returned -16 [ 417.475681] binder: 27880:27891 got transaction to invalid handle [ 417.481995] binder: 27880:27891 transaction failed 29201/-22, size 0-0 line 3019 [ 417.491412] binder: 27880:27891 unknown command -1170906365 [ 417.497210] binder: 27880:27891 ioctl c0306201 200002c0 returned -22 [ 417.512113] binder: undelivered TRANSACTION_ERROR: 29201 [ 417.518364] binder: undelivered TRANSACTION_ERROR: 29201 2018/05/18 19:42:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:54 executing program 6: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x8200, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000100)={0xd, 0x5, 0x1b0a, "1bc650242a94937842c7d65456"}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x969, 0x8001}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 2018/05/18 19:42:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:54 executing program 4: r0 = getpgrp(0x0) socketpair$inet(0x2, 0x0, 0x20, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r2, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x10001000}) rt_sigtimedwait(&(0x7f0000a72000)={0x563}, &(0x7f0000a77ff0), &(0x7f000044a000)={0x0, 0x989680}, 0x8) 2018/05/18 19:42:54 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$TTUNGETFILTER(r1, 0x801054db, &(0x7f0000000100)=""/196) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={0x7fff, {0x2, 0x4e21, @rand_addr}, {0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e23, @multicast2=0xe0000002}, 0x41, 0x0, 0x0, 0x1000, 0x1ef, &(0x7f0000000000)='ifb0\x00', 0x3e, 0x0, 0x8}) writev(r0, &(0x7f0000000400)=[{&(0x7f00000005c0)="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", 0x800}], 0x1) syz_open_pts(r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) 2018/05/18 19:42:54 executing program 7: clone(0x40080000, &(0x7f0000000340), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind(r0, &(0x7f00000000c0)=@ethernet={0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}}, 0x80) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x1, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffb000/0x3000)=nil) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x100, 0x10000, 0x400, 0x100000001, 0x2, 0x2, 0x9d6, 0x81, 0x1d30}) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000640)={@multicast1}, &(0x7f0000000680)=0xc) 2018/05/18 19:42:54 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 418.171289] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 418.184968] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:55 executing program 4: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0x4, 0x5, 0x5, 0x5}, {0x9, 0xffffffffffffff67, 0x80000001, 0xff}]}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x1, @thr={&(0x7f0000000000), &(0x7f0000000180)}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}}, 0x0) [ 418.264604] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 418.326379] IPVS: Creating netns size=2552 id=18 [ 418.334856] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:55 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x101500, 0x4) openat(r1, &(0x7f0000000280)='./file0\x00', 0x40, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000040)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000080)='net/ip_tables_matches\x00') syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x45be, 0x0) sendfile(r2, r3, &(0x7f0000000340)=0x102, 0x800009) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$IP_VS_SO_SET_FLUSH(r5, 0x0, 0x485, 0x0, 0x0) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) nanosleep(&(0x7f0000000100), &(0x7f0000000140)) fcntl$getownex(r7, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r8, 0x0, 0x0) ptrace(0x4207, r8) waitid(0x1, r8, &(0x7f0000000000), 0x1000008, &(0x7f0000000180)) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) 2018/05/18 19:42:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 418.423795] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 418.640556] IPVS: Creating netns size=2552 id=19 2018/05/18 19:42:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:55 executing program 7: clone(0x40080000, &(0x7f0000000340), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind(r0, &(0x7f00000000c0)=@ethernet={0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}}, 0x80) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x1, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffb000/0x3000)=nil) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000080)={0x100, 0x10000, 0x400, 0x100000001, 0x2, 0x2, 0x9d6, 0x81, 0x1d30}) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000640)={@multicast1}, &(0x7f0000000680)=0xc) 2018/05/18 19:42:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:55 executing program 6: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x8200, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000100)={0xd, 0x5, 0x1b0a, "1bc650242a94937842c7d65456"}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x969, 0x8001}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 2018/05/18 19:42:55 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:55 executing program 5: clone(0x100, &(0x7f0000000140)="3afecdfd59eef85f293b0100000003cb50dd0e00cffaffff7e0000000000", &(0x7f00002cfffc), &(0x7f0000000200), &(0x7f0000553000)) set_robust_list(&(0x7f00000000c0)={&(0x7f0000000000), 0x0, &(0x7f0000000080)={&(0x7f0000000040)}}, 0x18) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x22800, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000340)=""/212) 2018/05/18 19:42:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0x0, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 419.116189] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 419.120860] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 419.140929] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 419.152313] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0x0, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 419.186601] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 419.230801] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:56 executing program 5: clone(0x0, &(0x7f00000012c0), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) finit_module(0xffffffffffffffff, &(0x7f0000000040)='eth1\x00', 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r2 = dup3(r0, r0, 0x80000) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000240)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x17}}, {0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x14}}, 0xc, {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 'veth1\x00'}) fcntl$setown(r0, 0x8, r1) 2018/05/18 19:42:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 419.292161] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 419.314130] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 419.324469] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 419.392598] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 420.363892] pktgen: kernel_thread() failed for cpu 0 [ 420.369132] pktgen: Cannot create thread for cpu 0 (-4) [ 420.374560] pktgen: kernel_thread() failed for cpu 1 [ 420.380007] pktgen: Cannot create thread for cpu 1 (-4) [ 420.385351] pktgen: Initialization failed for all threads 2018/05/18 19:42:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0x0, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:57 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x1c) recvmmsg(r1, &(0x7f0000002a40)=[{{&(0x7f00000000c0)=@nl=@proc, 0x80, &(0x7f0000001580)=[{&(0x7f0000000140)=""/144, 0x90}, {&(0x7f0000000000)=""/5, 0x5}, {&(0x7f0000000200)=""/5, 0x5}, {&(0x7f0000000240)=""/185, 0xb9}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/28, 0x1c}, {&(0x7f0000001340)=""/95, 0x5f}, {&(0x7f00000013c0)=""/148, 0x94}, {&(0x7f0000001480)=""/204, 0xcc}], 0x9, &(0x7f0000001640)=""/240, 0xf0, 0x5}, 0x2ed}, {{&(0x7f0000001740)=@ax25, 0x80, &(0x7f00000027c0)=[{&(0x7f00000017c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xfffffffffffffffb}, 0x2}, {{&(0x7f0000002800)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000002980)=[{&(0x7f0000002880)=""/238, 0xee}], 0x1, &(0x7f00000029c0)=""/120, 0x78, 0x4}, 0xfffffffffffff800}], 0x3, 0x40010000, &(0x7f0000002b00)={0x0, 0x989680}) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000080), 0x14) 2018/05/18 19:42:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:57 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:57 executing program 6: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x8200, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000100)={0xd, 0x5, 0x1b0a, "1bc650242a94937842c7d65456"}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x969, 0x8001}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 2018/05/18 19:42:57 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:57 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0x0, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 420.519432] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 420.526347] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 420.572484] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 420.589685] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 420.649550] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:58 executing program 6: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) r0 = socket(0x8000000000a, 0x8000000000000008, 0x5735) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x20, &(0x7f0000000040)=[@in={0x2, 0x4e24, @rand_addr=0xdde4}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000180)=r1, 0x4) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") set_tid_address(&(0x7f0000000000)) 2018/05/18 19:42:58 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x400, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x7ff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="340000001400010000000000000000000a000000", @ANYRES32=r3, @ANYBLOB="082b7cde03c9b93871ffffffff213408373ea21919f644ce0000008100000000000000000000ae3a81844058645597b4789f208da574ce3600d10552002028838e7e81d093be4f3d7e8873a0440280cef718267c3b016f497a2d8a04efef651d94feee11ae0deeee31fe07364c71017164a5671d2b8fa2f28e6c5636c0d448eda9262df98ed22267451288a82d08750fb44fc45d567facad92dcfdfb1efd14991c66e4d51b482d6032e9976269655b653b5e521881d0512c26daaac7bd8e2ebb27dfb3000000000000000000"], 0x34}, 0x1}, 0x0) 2018/05/18 19:42:58 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 421.555913] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 421.562050] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 421.562924] netlink: 28 bytes leftover after parsing attributes in process `syz-executor5'. [ 421.574198] netlink: 28 bytes leftover after parsing attributes in process `syz-executor5'. 2018/05/18 19:42:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:58 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000009200)={&(0x7f00000003c0)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14e70054000000", @ANYRES16=0x0, @ANYBLOB="0000fdffffffffffffff00000000bf8003414a7c8b974fda2bc275e4a7ca796ec8"], 0x14}, 0x1}, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000080)={0x7, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000140)=r1) sendmsg$inet_sctp(r0, &(0x7f00000002c0)={&(0x7f0000000280)=@in6={0xa}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000040)='V', 0x1}], 0x1, &(0x7f00000000c0)}, 0x0) [ 421.598602] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 421.653479] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:58 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:58 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 421.727987] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 421.801153] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 421.843351] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 421.870942] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 421.880999] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:58 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000200)=""/54, 0x36) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") recvmmsg(r2, &(0x7f0000000780)=[{{&(0x7f0000000040)=@hci={0x0, 0x0}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/208, 0xd0}], 0x1, &(0x7f00000002c0)=""/221, 0xdd, 0x81}, 0x8}, {{&(0x7f00000003c0)=@sco, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000440)=""/241, 0xf1}, {&(0x7f0000000540)=""/91, 0x5b}, {&(0x7f00000005c0)=""/18, 0x12}, {&(0x7f0000000600)=""/16, 0x10}, {&(0x7f0000000640)=""/30, 0x1e}, {&(0x7f0000000680)=""/42, 0x2a}], 0x6, &(0x7f0000000740), 0x0, 0x5}, 0x3}], 0x2, 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000800)=r3) close(r1) [ 421.914039] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 421.916361] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:42:59 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:59 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:42:59 executing program 5: clock_getres(0x74bc773d67ac8189, &(0x7f0000000000)) r0 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/pktcdvd/control\x00', 0x1fc, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000100), &(0x7f0000000080)=0x8) 2018/05/18 19:42:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:42:59 executing program 5: r0 = getpid() sched_setaffinity(r0, 0x1b8, &(0x7f00000001c0)=0x10000000000001ff) r1 = socket(0x13, 0x8080b, 0x20c) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x5, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) getpgrp(r0) gettid() syz_open_procfs(r0, &(0x7f0000000000)='net/xfrm_stat\x00') [ 422.486300] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 422.499040] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 422.515439] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 422.568836] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 422.602547] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:00 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:00 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) recvfrom$inet6(r0, &(0x7f0000000040)=""/62, 0x3e, 0x0, &(0x7f0000000080)={0xa, 0x4e24, 0x3f, @mcast1={0xff, 0x1, [], 0x1}, 0x5}, 0x1c) r1 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r1, 0x0, 0x13, &(0x7f0000000280)=0x4, 0x4) sendmsg(r1, &(0x7f0000eeefc8)={&(0x7f0000fef000)=@in6={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000437000), 0x0, &(0x7f000056cda0)=[{0x28, 0x29, 0x2, "1d1a2d4ba2f2fffffffffffffffd060000"}], 0x28}, 0x0) 2018/05/18 19:43:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:00 executing program 0: poll(&(0x7f0000c58000)=[{0xffffffffffffffff, 0x2b}], 0x1, 0xade) bind$inet6(0xffffffffffffffff, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:00 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 423.399401] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 423.411350] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 423.414665] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:00 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:00 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 423.446110] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:00 executing program 5: setrlimit(0xb, &(0x7f0000000080)={0x3, 0xfffffffffffffffe}) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400400) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00', 0x7, 0x4, 0x480, 0x258, 0x258, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000040), {[{{@arp={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0x15}, 0xff000000, 0xffffffff, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, {[0xff, 0x0, 0xff, 0xff, 0xff, 0xff]}, 0x0, 0xff2, 0x6, 0x4, 0x5, 0x0, 'syz_tun\x00', 'gre0\x00', {}, {0xff}, 0x0, 0x108}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="7bf002637111", @multicast1=0xe0000001, @multicast1=0xe0000001, 0x0, 0xffffffff}}}, {{@uncond, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="c42ed98f944e", @multicast2=0xe0000002, @loopback=0x7f000001, 0xf, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) setrlimit(0x3, &(0x7f0000baf000)={0x9, 0x8001}) 2018/05/18 19:43:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 423.497476] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 423.503666] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 423.514334] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 423.566996] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 423.568343] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 423.623686] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 423.648685] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 423.664347] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:01 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:01 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:01 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:01 executing program 0: poll(&(0x7f0000c58000)=[{0xffffffffffffffff, 0x2b}], 0x1, 0xade) bind$inet6(0xffffffffffffffff, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:01 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:01 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 424.334566] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 424.359151] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 424.359166] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:01 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 424.445263] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 424.448134] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 424.480977] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:01 executing program 7: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 424.491046] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 424.538159] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:02 executing program 0: poll(&(0x7f0000c58000)=[{0xffffffffffffffff, 0x2b}], 0x1, 0xade) bind$inet6(0xffffffffffffffff, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:02 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:02 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 425.271375] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 425.289527] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 425.290573] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 425.310830] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 425.354749] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 425.397975] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 425.407078] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 425.437133] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 425.460378] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:03 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 426.237277] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 426.249384] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 426.259589] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 426.270679] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 426.275559] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 426.295908] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 426.350483] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 426.355802] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 426.379576] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:03 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 427.165961] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 427.166053] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 427.169771] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 427.211737] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 427.223956] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 427.232590] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:04 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0xa, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 427.266039] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:04 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 427.314599] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 427.391886] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 427.396494] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 427.442636] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:04 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:04 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:04 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 428.159111] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 428.165024] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 428.188798] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 428.189910] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 428.306496] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 428.314278] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 428.344402] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 6: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 429.074204] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 429.089483] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 429.106162] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf6") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 429.201187] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 429.210733] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 429.212212] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 429.243896] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:06 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf6") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:06 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:06 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:06 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:06 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:06 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 430.048508] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 430.051885] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 430.055622] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 430.111324] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 430.144511] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:06 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 430.147962] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf6") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 430.194586] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 430.272234] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 430.306052] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 430.350413] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 430.977638] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 430.992540] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 430.997711] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 431.066705] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 431.076747] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000380)={0xffffffffffffff00, 0x89}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000300)={0x3f, 0x0, {0x0, 0x3, 0x6f7f3241, 0x0, 0xbe}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) socketpair$inet(0x2, 0x800, 0x4, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000200)={0x0, 0xffffffff, 0x30, 0xe63e, 0x6}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000280)={r5, 0x3}, 0x8) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r6, 0xc04c5349, &(0x7f0000000140)={0x3, 0x2, 0x481ee15c}) [ 431.145665] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 431.155876] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 431.186472] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 431.208090] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'eql\x00', {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:08 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000), 0x0, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x240, 0x0) getdents64(r1, &(0x7f0000000140)=""/136, 0x88) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket$l2tp(0x18, 0x1, 0x1) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0xea0, 0x0, 0x1, 0x0, {0xa, 0x4e23, 0x8, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000380)={0x5, 0x53, &(0x7f0000000300)="6d829be4f20833c274da05c6f96798bf4230fa743f2e3ebdc18fb76769d792474ad1335c56ef30ab7f746a1e4d9936c1bf2d3e4b87c363535f4fe249384d082b6477a0235daa80fe57f9218e738210975a01a2"}) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x3, 0x6, [0xb93, 0x3f, 0x401, 0x1, 0xdf, 0x1f]}, &(0x7f0000000240)=0x14) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000280)={r4, 0x5}, &(0x7f00000002c0)=0xffffffffffffff37) 2018/05/18 19:43:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x802) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 431.907567] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 431.923016] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 431.936380] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 431.938870] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 431.975866] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 432.018918] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x8010, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)={r2}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000140)={0x4f, 0x1, 0x8, 0x5}, 0xc) socket$inet6(0xa, 0x6, 0x1000) syz_open_dev$urandom(&(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x400081) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:09 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000), 0x0, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:09 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r0 = memfd_create(&(0x7f0000000000)='.\x00', 0x1) mknodat(r0, &(0x7f0000000140)='./file0\x00', 0x8008, 0x8000) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x5, 0xfff, 0x1}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffff9c, 0x84, 0x17, &(0x7f0000000200)={r2, 0x4, 0x34, "d070ea725a7df5f679c670455bed8c7276cf6e96dc9962068b37b312fef314c0a9521c710746457e603484e03e2437acca22c9a2"}, 0x3c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) fsetxattr(r0, &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc\x00', 0x5, 0x3) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:09 executing program 4: r0 = memfd_create(&(0x7f0000000180)='\x00', 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0xc69}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000380)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000340)=0xee) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000240)={0xff, 0x7ff}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x90340, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'veth0_to_team\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1d}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getsockname$packet(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000004c0)={@empty, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @local={0xfe, 0x80, [], 0xaa}, 0x2, 0x400, 0x9f6, 0x500, 0x7fff, 0x100001, r5}) sendto$inet6(r4, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 432.905010] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 432.919694] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 432.919863] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x3505, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 432.947711] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 433.019973] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:10 executing program 4: r0 = getpgid(0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$getregs(0xe, r0, 0x3, &(0x7f0000000140)) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0x2, r0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x16) 2018/05/18 19:43:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000140)={0x2, 0x0, {0x3, 0x3, 0xfff, 0x1, 0x652}}) listen(r0, 0x9) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3e2c72467faac570}, {0x0, 0x0, 0x0, 0x0, 0x63c07390}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0xa, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f00000001c0)="6f57a3dc4286dc787cc5010000006d73431523ad9bdbce9ecc875ef1ce71f6b8d638076101697b9a4586c6a2d74e4dcfcec9", 0xffffff4e, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x13}}, 0xc5b697e369c1d31d) 2018/05/18 19:43:10 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:10 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000), 0x0, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:10 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001400)='/dev/vga_arbiter\x00', 0x40, 0x0) r2 = signalfd(r0, &(0x7f00000024c0)={0x6}, 0x8) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000002480)={&(0x7f0000ffe000/0x1000)=nil, 0x7f, 0x3, 0x11, &(0x7f0000ffd000/0x3000)=nil, 0x1}) read(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x556) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000001380)='/dev/null\x00', 0x38800, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000001440)=0x4, 0xfedc) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000026c0)=0x0) r5 = geteuid() lstat(&(0x7f0000002700)='./file0\x00', &(0x7f0000002740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000027c0)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002800)={0x0, 0x0}, &(0x7f0000002840)=0xc) getgroups(0x2, &(0x7f0000002880)=[0x0, 0x0]) r10 = getpid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000028c0)={0x0, 0x0}, &(0x7f0000002900)=0xc) r12 = getgid() ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000002940)=0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000002980)={0x0, 0x0}, &(0x7f00000029c0)=0xc) r15 = getgid() ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000003f00)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003f40)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000004040)=0xe8) r18 = getegid() r19 = getpgid(0x0) r20 = geteuid() getresgid(&(0x7f0000005100), &(0x7f0000005140)=0x0, &(0x7f0000005180)) r22 = fcntl$getown(r3, 0x9) r23 = getuid() lstat(&(0x7f00000051c0)='.\x00', &(0x7f0000005200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r25 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006580)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000006680)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000066c0)={0x0, 0x0, 0x0}, &(0x7f0000006700)=0xc) r28 = gettid() getresuid(&(0x7f0000006740), &(0x7f0000006780)=0x0, &(0x7f00000067c0)) getresgid(&(0x7f0000006800)=0x0, &(0x7f0000006840), &(0x7f0000006880)) fcntl$getownex(r3, 0x10, &(0x7f00000068c0)={0x0, 0x0}) r32 = geteuid() getresgid(&(0x7f0000006900), &(0x7f0000006940)=0x0, &(0x7f0000006980)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000069c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000006a00)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000006b00)=0xe8) stat(&(0x7f0000006b40)='./file0\x00', &(0x7f0000006b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r3, &(0x7f0000006d40)=[{&(0x7f0000002500)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002680)=[{&(0x7f0000002580)="f8480e255aed8e91cc7e4de7bd3f95ba50755cf223c79752dad4d237024b435586e61b1ca7c8ebd441a7d12a4c40e4bf77c7f77ea108d8876bb19334f47fd2458f8aaf911daa562f323d7c85d5e2d2e225e35bf8938292edcfab1b677acf2f5119896d1db3597eea6da3a0ed4ad9021a0b5199cbd00e59d0e3b22e5c3cf1281514a57c5f10f507a7237f273c5dbae46c61bb0337b225b4f33a2937c008273e551e44c739ff0706940b0dc043a456b121892d6d894a9cda96ba6c93c8139cb3d9119e3a4bdeacccdbde356a7dc7bdc0407c045b1d15047268ad5feafd9fc0e15f6b4686", 0xe3}], 0x1, &(0x7f0000002a00)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @rights={0x20, 0x1, 0x1, [r3, r1, r2]}, @rights={0x28, 0x1, 0x1, [r3, r0, r0, r2, r2]}], 0xc8, 0x40010}, {&(0x7f0000002b00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003e80)=[{&(0x7f0000002b80)="f8523b08031ed3284efafd9f749f6e165b9475856c1a8bfab077c47d9190870a0e14e9100d4fe9d4c1372f730dcdd0e661e8d1", 0x33}, {&(0x7f0000002bc0)="6cf9bc", 0x3}, {&(0x7f0000002c00)="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", 0xff}, {&(0x7f0000002d00)="818d973aee9aba66bb65a60de706fc01c8f355596246f8187689dcc13c1b1756f97a88342f65eac063a2ede594beed10d9221ac628bbaedbff1c1833fb4491a97cf150b271544ef2457c25713b76dc392b457af861d919cb5361b93851bf4a8dfd434ef41840", 0x66}, {&(0x7f0000002d80)="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", 0x1000}, {&(0x7f0000003d80)="1d8e3127e453dca9e8e95a58a23439435c6dc5fb47ca160f05", 0x19}, {&(0x7f0000003dc0)="6263f31279e1fbbad23d96e4fad9f3407d87a2e351f3776dbb0a2ddf8fb6d0068f290709afa27c09aa9c7795ee96d799f386bbad9be0d14e90ccd1440f48cec1136f758c982cb33cc0f3fcd5b829823a79fcfe", 0x53}, {&(0x7f0000003e40)="d54232247e518e5e91b83cd6bf73806b7580a0177271590e18d504", 0x1b}], 0x8, &(0x7f0000004080)=[@cred={0x20, 0x1, 0x2, r16, r17, r18}, @rights={0x18, 0x1, 0x1, [r1]}, @rights={0x18, 0x1, 0x1, [r0, r3]}], 0x50, 0x810}, {&(0x7f0000004100)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000004700)=[{&(0x7f0000004180)="2a7614a6a638fc48a0c14119cb15cad7523e86528087684c52825358e339eff60bf55d101cd61cad8b19cb190aad80f3dbc1f4b41ea8f134522b681e14d8d015284000db08a4092df1735378d48ee6e7c3bb01a9f0d54404919c8803bc6096cc31757546d9288fbe3d9a7618e8", 0x6d}, {&(0x7f0000004200)="ca73947df317bde89cee157a4815c4089adc7b40b91a25a5133a8084d2a6055f370b8f3d6de584bd2fcb77410a8d8b62da74a9c3e7fb55f5b5bf1775d75edd5ecc352510f3bb42922b669bfa283673175b4e61e3f8303fdf481107cacc5c3240a68f7295e83da7930526cd1e567a37dbaf26b7e343986b10df60be401eeeb7d95bd3a9dde8dc964a6c55d6a7baab95bf2186ecfdaa8201bff40c0cab1cf8aa2d115bb87128a639acc739e60ae1d029d489f784942c77ea2982b4ff34fe60da48d97f20fe3327da95fa", 0xc9}, {&(0x7f0000004300)="990018af2af29178cdf4e899750f1c7454c49613997b05a6cd4923408d78cebd77fe02028fe84967224e0e24f6ad5680812538d3514228929bb2658b00b090e23e7f647e02d97f58d1253b51ce2010de0e1522e4dd25280ea3250cf7ce8dfd94d82606df48bca5d08a8437fc93c3441edaa4fea00444d52f7b007de04fcea9ff95fd79422f5244a2e01a219bd148fb6c2a23303f22b9d8570c8070c52d7520aafb518809ce2077de0262b982b7dbd4e8e08ecb07d007626278d73f6e233a629a383c1c24d3ae9e06ce5c3a6bf5dc25", 0xcf}, {&(0x7f0000004400)="662e2c0134a12704701cdc0fd7ca10f9f4ebbd7abf4c1c561c90d671562a05962ea91105eb2875f3f8beca68a66666b245789d39997a05f2e8587ba697166db98a9712e450cd33c6d4992dcfaecb8a404a3e0a80c3f21a4c738120892d3a10d74313cddae127d0baa2d677714830a9d8645e27ca5c3885a3b78881398bca5bfc492ce472de9b740df0cd2c85204c79fc23edf2f9066628e9abca1624bf00500cacb5ecc70c77a67a7b5a7b0025", 0xad}, {&(0x7f00000044c0)="219605946d36b94b7555290c9e8d6820177eeb430ca2e6c295f8d70937bf5d75b540e738daff34191127a515d868f5a57da156e741d9b0b44be7e777b1825315f26e192ee245b12649742c3423e251d872961a7bf008d3aefa899ecc965b781fb9e3da45874f96851f34affb2520df94dd56262b640a32e20594c424dc9823485c106684c02ca30cb88b64cea9c864a684a1fd51f80d4357edcf7fa3e7fb6ebd28651f57336b3dcbde49d55921dbba76a638f46c1cdb7c6342f3ac2ee7c31444f1a76ce756d166bbfc328cff", 0xcc}, {&(0x7f00000045c0)="4864a7383ea701497c36b8ca921e7b625b645c14f856d603566968f689433ca294a03d933687", 0x26}, {&(0x7f0000004600)="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", 0xff}], 0x7, 0x0, 0x0, 0x8010}, {&(0x7f0000004780)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000004b80)=[{&(0x7f0000004800)="a6f32d7585c80254bc62dc8826fde12e3ccb01119959007d46508135b20f1a6c0c865c19b5888a6cf0cc606fcbb80008a8b4fdcfc676c19a8f78ca1eccc42bf88308334232a327097a817048ab1b8d25b693fee49f9bc2c1c4bf857c552c03eb8250d4f3096bedf965c02fe5ecb5f740aca1255d2e72077ee22b22fdfc3278b8cbaaa5d24566ea487c3c4ea2cefc90331d2b36c7fd54c67472f057fa7d3e4ad890102d1d695be4d533fd1db6d9d3460f9b51f4d2d1f82c46ffff9b1870235bb276eaf64b041080ca0b92bd5a795e4afd6744f7a7b7a75b25bbd9207a9e768bffe51889a6bd0a07119ca770cf8584d33d3f9eb52d342450f87a", 0xf9}, {&(0x7f0000004900)="5a48e56f1565125b4535ab7dd30ddfe7ba93c7c45cec53211538990cf4fc284933598db8dd61c9cbfb37e1bda7b684f7837e2f45d2379fa5d87c10ece681e8223773212169ff32f839715b", 0x4b}, {&(0x7f0000004980)="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", 0xff}, {&(0x7f0000004a80)="a8c6cadcaa3e5e6c238ce9409e30027acc7d4a9936729d9033e5e58a3804d8d8f5b2ee433c4ef14db0687d813bc2c2049d64c86c2b8b8e87227c2f1aace60359d6d1790573f016940ec50fc667676e0a2125bd442b038dbf0a2c50ebd04baf383c46880d169eee5cb5e5460d7f604640ebfd64f6b5deedc174d7979cd944a77af0f232a0e4c434b1501def7a6b197e9a5320f9cdf0d0910be7420dcd7a1867a27f0e5606c695b0bbf345bd4c1eac1e23a4cd8eebe806237f25fc09ed97f5dae8d0195143aca930d8594ce52d67073f74eb259ffb8a8e9d9506d6", 0xda}], 0x4, &(0x7f0000004bc0)=[@rights={0x18, 0x1, 0x1, [r2, r2]}, @rights={0x30, 0x1, 0x1, [r1, r0, r3, r3, r2, r3, r2]}], 0x48, 0x10}, {&(0x7f0000004c40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000005080)=[{&(0x7f0000004cc0)="790f385b83bdd20bdd0399ac0c7fbb45a0e926020fb04cc0a470c869c195be713ee2628610115e925ff1b2481e7e972d000122290c7bfc1aafba18aba05f3fe37947fc20e2f8b1fec32d2cfaf93f069367ec7c0d449b27dcef498c47376add669534095b42353bc808fd1fcc6200084664d9ff83a0a8c2994d4540dd208b89347b7557480f8378b6a44f3b06fa11af66ba0a283d641a0ec3d42af9a0c2bb59fd70858bd32104d7a7a67b2a2fea4e0231e4657e7197cf3f904cb16165035cce9f11a0326e80815559a6080d56e8543051b7e62fbc06d5", 0xd6}, {&(0x7f0000004dc0)="d4f19961b07fc8d6386271859db7c1ebd00d5d6d67cb88181ed7022c952905fc4480491fb661fab474d26b5dcd6726ad98aa25b5b79d224e89dc88a8c21d5359705818cee6cdc03194ad19fe32ead7f7d13066559be3f5a7d6433176a99baca2c21662586f1fc117bdb69c3fdbad6269b20d798907643ca6aa05443520b09616e3410688664565e26e10b246eaefda854912d57688d59be0e062b153f579a8d9593be204579a05e11f5a8cedc6ddf6b3e6fdadbe5f5c4d4b3919d91f", 0xbc}, {&(0x7f0000004e80)="0e063ec6cc6b20a7f7b3bf90dba242d70a2458e3f008672a22c70792ab48184d076567b1a87a1bba99b26921ab067eae6e2dec0197a87283bc14e0", 0x3b}, {&(0x7f0000004ec0)="97653560421b1be0a4f2c199d7cba7d8615cea99ff6e250e88dc1c9946718c836a528e8753f7b84f6a3be2e3f0ba9de558335cbfb6b737c5066cd50d18d819a0f948b66d4a2dbea72fa34e93fc365af6d9ec6ec78432c9a4fdfc4ed4ffa67fd2b8f9bc78758cd70761f34dd06122f8a2f9e81724af2ce9748ba6f247c0706ee6d7d3194d2defd511f5056a3ab6b6e361c7f3f2bb741a7ced1208218a06", 0x9d}, {&(0x7f0000004f80)="13c2f736b07ef6117b960b4746dac343e9c265530c07ca0b840083eec706e342839869c3f7a66effa94d1e9e3fc693363abc17663ad2346bc1c5aa273b5f9f3c9e203d69b4f96de52a27734590b8fc11edee7e54151062877d0a7b2401fd8b69a54cae4047bb722ddfb833fbb738893744ad1addec04925721dab5a22853e1f3e53d7c6aae6e2a68c6d143361909ccfc60a46f2a", 0x94}, {&(0x7f0000005040)="ce21e73ab93d13c855390e7d2772ec0b68199cc8623a741eb80a87207b9e0f14533a158f84d39f4ae36516fcafb7", 0x2e}], 0x6, &(0x7f0000005280)=[@cred={0x20, 0x1, 0x2, r19, r20, r21}, @rights={0x28, 0x1, 0x1, [r2, r2, r1, r0, r2]}, @cred={0x20, 0x1, 0x2, r22, r23, r24}], 0x68, 0x40000}, {&(0x7f0000005300)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000005480)=[{&(0x7f0000005380)="5d67167a01ee1d1df4ba935e12f6cf1d2d64f420440585bc7f815e46cb2caab3e789b0b25a45eaccd76b5a6cae7c1d133af3270b100aa9705283881017effd0c425bb3fd0f25711aad64e268262e6f4c458cd4a58105215717576c29a5f32eb91feb3e148147f0516357f9e829e32aca5fc24281ac55e7e4bd952814868f06511b712efb66fd219b774478f1768f9edf769c03f552f07dea01408c2b96a0d90dffc10f4b1f4f551b56a2ec55dbe1", 0xae}, {&(0x7f0000005440)="34de07501dab6af2bcc772e649b79ac183530771160b9599e58257fff80d9f01d2558050116c218c1d7d5994e2a5cb", 0x2f}], 0x2, 0x0, 0x0, 0x4000000}, {&(0x7f00000054c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000006540)=[{&(0x7f0000005540)="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", 0x1000}], 0x1, &(0x7f0000006c00)=[@rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r2]}, @rights={0x30, 0x1, 0x1, [r2, r2, r3, r3, r0, r0, r2, r1]}, @rights={0x28, 0x1, 0x1, [r1, r3, r2, r3, r3, r0]}, @rights={0x20, 0x1, 0x1, [r2, r1, r0, r2]}, @cred={0x20, 0x1, 0x2, r25, r26, r27}, @cred={0x20, 0x1, 0x2, r28, r29, r30}, @cred={0x20, 0x1, 0x2, r31, r32, r33}, @cred={0x20, 0x1, 0x2, r34, r35, r36}], 0x128, 0x40}], 0x7, 0x4) getsockopt$inet6_dccp_buf(r3, 0x21, 0xce, &(0x7f0000001480)=""/4096, &(0x7f00000013c0)=0x1000) sendto$inet6(r0, &(0x7f0000001400), 0x9f, 0x2000020000005, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r37 = syz_open_procfs(0x0, &(0x7f0000001140)='net/ip6_mr_vif\x00') getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000001180)={0x0, 0xb7, "7f798eeedb2a872e3e78bfc572cfbac17f582f944ab31bc0a077321ccc4f70ce33dcb4b9898e8087c6cb97129d80e69eea34be6e3deaac94d52c7aee5585701168629035938021b6e8cd58f7c3d9b5f3ca838754b079eeffadf3815eee0f40abf241060779298373cce3fdfc6b063ff04e7c6ef2ae54185fa5d78c770a45fdb28084711764b3376835d09f34215d210421e0a7049a230cf474c5afc5fa705778eef72768677955410cd17ce4408b2d9035511c66abca37"}, &(0x7f0000001240)=0xbf) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r37, 0x84, 0x6, &(0x7f0000001280)={r38, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}}, &(0x7f0000001340)=0x84) 2018/05/18 19:43:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x200000, 0x0) write$selinux_create(r1, &(0x7f0000000240)=@objname={'system_u:object_r:mount_exec_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x30, 0x32, 0x20, './file0\x00'}, 0x52) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_int(r2, 0x29, 0x9, &(0x7f0000000000), &(0x7f0000000140)=0x4) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e20, 0x3, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x1}, {0xa, 0x4e22, 0x7f, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0xa32}, 0x20, [0x80000001, 0x4, 0x6, 0x3ff, 0x0, 0x81, 0x1]}, 0x5c) 2018/05/18 19:43:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000001c0)={0xfffffffffffffff8, {{0xa, 0x4e20, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x4}}, 0x1, 0x6, [{{0xa, 0x4e20, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffff8001}}, {{0xa, 0x4e23, 0x27a, @mcast1={0xff, 0x1, [], 0x1}, 0x10000}}, {{0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0xb}, 0x7f}}, {{0xa, 0x4e20, 0x802000000000000, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x4e20, 0xd6, @dev={0xfe, 0x80, [], 0x20}, 0xffff}}, {{0xa, 0x4e21, 0x3, @mcast2={0xff, 0x2, [], 0x1}, 0x9}}]}, 0x390) getsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=""/107, &(0x7f0000000000)=0x6b) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:10 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 433.819134] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 433.835339] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:10 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) fdatasync(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:10 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 433.894073] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 433.907187] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 433.919342] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 433.929062] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x8686b07f84ff13a7, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x4e20, 0x3, @mcast1={0xff, 0x1, [], 0x1}, 0xffff}, {0xa, 0x4e21, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, 0x7, [0xef8, 0x1, 0x9, 0x0, 0x1, 0x1000, 0x10001, 0x4]}, 0x5c) 2018/05/18 19:43:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000200)=0x0) tkill(r3, 0x4) munlockall() r4 = dup3(r0, r2, 0x0) connect$ax25(r4, &(0x7f0000000240)={0x3, {"112fafbad0f9ee"}}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'security\x00'}, &(0x7f00000001c0)=0x54) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) gettid() sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 433.955498] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 433.967097] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 433.995273] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 434.024772] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 434.041864] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) 2018/05/18 19:43:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:11 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000180)=0x10000) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in=@dev={0xac, 0x14, 0x14, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x4a}, {0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x1, 0xffffffffffffffff}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000000)={0x9, 0x1f, 0xbada, 0x35}) 2018/05/18 19:43:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000140)="5a61d603c24edb7b9ebc1bdc06f4df354f349b1c9eb9cfba51d294e32a4e7e19a10320160266d8a64dc67a9baa17f02167eda8bff8258aeb20470bfeec03e02fa301304aeb466da1e9efb7", 0x4b, 0x40001, &(0x7f0000000000)={0xa, 0x4e23, 0x1, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, 0x1c) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x557ca370, @empty, 0xffffffffffffffff}, 0xfc36) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x80, r2, 0x600, 0x70bd27, 0x25dfdbfe, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'eql\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x47}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x140000000000}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local={0xac, 0x14, 0x14, 0xaa}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback=0x7f000001}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x4004800) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x2b, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e24, 0x4, 'nq\x00', 0x20, 0x0, 0x50}, 0x2c) 2018/05/18 19:43:11 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{0xffffffffffffffff, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sw_sync\x00', 0x200, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000140)={0x0, 0xffff}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={r2, 0xd8f3, 0x200}, &(0x7f0000000200)=0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1, 0x1000a}, {0x0, 0x0, 0xd40, 0x0, 0x2}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4d5, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0xffffffffffffff03) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) 2018/05/18 19:43:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000)={0x20, 0x3}, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) [ 434.775986] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 434.788980] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 434.793558] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 434.796839] IPVS: set_ctl: invalid protocol: 43 172.20.20.187:20004 nq [ 434.830439] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) accept(r0, &(0x7f0000000140)=@pppol2tpin6, &(0x7f0000000000)=0x80) listen(r0, 0x3) getegid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x1000, "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"}, &(0x7f0000000000)=0x1008) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000001180)={r2, 0x1}, 0x8) accept$packet(0xffffffffffffff9c, &(0x7f0000007480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000074c0)=0x14) stat(&(0x7f0000007500)='./file0\x00', &(0x7f0000007540)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000075c0)={{{@in6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4e20, 0x0, 0x4e23, 0x20, 0x2, 0x20, 0x0, 0x73, r3, r4}, {0x1, 0xfffffffffffffffe, 0x5, 0x6, 0x5, 0x3, 0xfff, 0x1}, {0x6, 0x2, 0x40, 0x40fe}, 0x40, 0x6e6bbf, 0x0, 0x1, 0x3}, {{@in6=@loopback={0x0, 0x1}, 0x4d2, 0x7f}, 0x2, @in=@multicast1=0xe0000001, 0x3504, 0x3, 0x2, 0x9, 0x40, 0x6, 0x3}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0xfffffffffffffd96) 2018/05/18 19:43:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) prlimit64(r1, 0x1, &(0x7f0000000140)={0x4, 0x835}, &(0x7f0000000180)) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000200)=0x1, 0x8) 2018/05/18 19:43:12 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{0xffffffffffffffff, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x2ef, &(0x7f00000001c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @link_local={0x1, 0x80, 0xc2}, [], {@mpls_uc={0x8847, {[{0x401, 0xffff, 0x1ff, 0x4}, {0xb5c, 0x2fe9, 0x2, 0x984}, {0x41, 0x6, 0x0, 0x4}, {0x8, 0x7fffffff, 0x4, 0x20}], @ipv6={0x10000, 0x6, "79fb8a", 0x2a9, 0x2e, 0x8, @local={0xfe, 0x80, [], 0xaa}, @mcast2={0xff, 0x2, [], 0x1}, {[@dstopts={0x62, 0x5, [], [@enc_lim={0x4, 0x1, 0xcc}, @enc_lim={0x4, 0x1, 0x60000000000000}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x20, {0x40, 0x6, 0x1, 0xb87, [0x100, 0x2, 0x3f]}}]}, @fragment={0x5c, 0x0, 0x33, 0x380000000, 0x0, 0x1, 0x66}, @dstopts={0x77, 0x0, [], [@enc_lim={0x4, 0x1, 0x4}, @enc_lim={0x4, 0x1, 0x42}]}, @hopopts={0xff, 0x0, [], [@pad1={0x0, 0x1}, @enc_lim={0x4, 0x1, 0x3e}]}, @fragment={0x3f, 0x0, 0x81, 0x401, 0x0, 0x1, 0x67}], @gre={{0x0, 0x0, 0x1, 0xaba2, 0x0, 0x1000, 0x0, 0x1, 0x880b, 0x27, 0x2, [0x2], "07cf2f935c78ef650d82a85ce224b6a487664eaf2500b49e4f275d6f61630dc019958c174f58ee"}, {0xfe, 0x0, 0x5, 0x4, 0x0, 0x0, 0x800, [0x72], "1e9d5f4b244d86f14dd342f12738481d4604d490e48b35f16f34146ddf29a5d13e73700f1c50e8f934d2027861ee10736d42f58b99e298fac30b69b5bf663960bcb39271cce07aa0e50097a3efe832f8103592c8dc2ee72fcabf0d9b55e294e54311d1750bf5ae42b5e78e180c6333b3cbd469ddd2a47f3a5ebe52a9165f6b9e86092df9f6d805409aeb9a027c8561886ad1c8e9f615096559dac0da962b7c6573dfdc3af41b37d815bca5914a944c7bc7b0d87000915d9f2f2bd1b171479973b460c01ee510e15546163f6f5cbc235888f57db8eee588"}, {0x7f, 0x0, 0x10000, 0x8000, 0x0, 0x0, 0x86dd, [], "bb6075ed6695f7b766e8cd77a042b4517a4c44ef337ff2f19e9b887b11aefab489f9a76acb2f19be3a29f8d6db22e1c404ad236546bc8412bf2d689b3935901b54a8f2df2332283811a46f506b66b49aec2a25db6a7e897769dd8928837be5f07655239523b24b9aeacb7bf39b6fda360582cce6e97a7de2777add342ef6a0ab436945741a07165114d3103014b6"}, {0x8, 0x88be, 0x2, {{0x4, 0x1, 0x5, 0x6, 0xfffffffffffffffe, 0x100000001, 0x3, 0xfff}, 0x1, 0x7fffffff}}, {0x8, 0x22eb, 0x0, {{0x1, 0x2, 0x3, 0x3, 0xffffffffffff7fff, 0x0, 0x2, 0xe52}, 0x2, 0x3f, 0x8001, 0x8, 0x80000001, 0x7fff, 0x1, 0xc7, 0x7fff, 0x7}}, {0x8, 0x6558, 0x1, "5465009e1c6b583a8f2aee23dfdc4a7cf731e4eb91d3fe495196a2e73ce9a48a20e6d1da09cd23d2c2e42e1d39895cee8ab50c009f3dc7b45060fc5e8059b3f1fc605b78d31290e8d3d7c778e27a396ccf7f2d413283fe70e870bdc9c7de61026e4ea013eabd0a626ead6c4d68"}}}}}}}}, &(0x7f00000004c0)={0x1, 0x3, [0x7a5, 0x5cf, 0x6b2, 0x752]}) listen(r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x480, 0x2) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x1, [0x2]}, &(0x7f0000000180)=0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 435.749070] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 435.761464] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 435.763600] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 435.768952] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000140)={0x1, 0x5, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x21}]}) [ 435.783685] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 435.811729] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 435.818574] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000140)=0x100001, 0x1) r2 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000000)='/dev/pktcdvd/control\x00', 0xa0000, 0x0) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) fcntl$setlease(r1, 0x400, 0x0) munlockall() 2018/05/18 19:43:12 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x1, 0x7fffffff) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000001c0)=0xfff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xc6c59e080f91c09b}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000180)={0x7, 0x0, 0x8000, 0x5}) 2018/05/18 19:43:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000300)={@mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80, [], 0x1f}, @mcast2={0xff, 0x2, [], 0x1}, 0x5, 0x7, 0x4, 0x100, 0x80000001, 0x800c0200, r2}) 2018/05/18 19:43:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) [ 435.839871] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 435.859090] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 435.872028] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:12 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000300)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@empty, 0x9, 0x3, 0x1, 0xf, 0x4, 0x401, 0x4}, 0x20) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) fcntl$setstatus(r1, 0x4, 0x3af7ae4a80a132c0) 2018/05/18 19:43:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000000)={0x1, 0x7, 0x1000, 0x1, 0x0, 0x0, 0x3f}, 0xffffffffffffff3a) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x2, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{0x1ff, 0x3, 0x1, 0x4}, {0xffff, 0xb07b, 0x1000, 0x5}]}) 2018/05/18 19:43:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x114) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f00000001c0)) [ 435.892332] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 435.910573] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 435.927356] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 435.964116] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 435.990701] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:13 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{0xffffffffffffffff, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sync_file_range(r0, 0x10000, 0x2000000, 0x1) r1 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sw_sync\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000140)={0x0, 0xffffffff, 0x6}) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:13 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = memfd_create(&(0x7f0000000000)='$cgroup\x00', 0x3) mkdirat$cgroup(r1, &(0x7f0000000140)='syz0\x00', 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) recvmmsg(r0, &(0x7f0000002880)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/250, 0xfa}, {&(0x7f0000000240)=""/126, 0x7e}], 0x2, &(0x7f00000002c0)=""/90, 0x5a, 0x101}}, {{&(0x7f0000000340)=@vsock={0x0, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000001400)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/40, 0x28}], 0x2, &(0x7f0000001440)=""/4, 0x4, 0x3}, 0x9}, {{&(0x7f0000001480)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000002740)=[{&(0x7f0000001500)=""/253, 0xfd}, {&(0x7f0000001600)=""/160, 0xa0}, {&(0x7f00000016c0)=""/80, 0x50}, {&(0x7f0000001740)=""/4096, 0x1000}], 0x4, &(0x7f0000002780)=""/234, 0xea, 0x7}, 0x401}], 0x3, 0x40, &(0x7f0000002940)={0x0, 0x1c9c380}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000002980)={0x0, @in6={{0xa, 0x4e21, 0x7ff, @empty, 0x23e}}, [0x7fffffff, 0x401, 0x8, 0x401, 0x0, 0xffffffffffffffc1, 0x8000000000000, 0x5, 0x0, 0x3f, 0x1, 0x20, 0x8, 0x6, 0x4e]}, &(0x7f0000002a80)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002b40)={r2, 0x68, &(0x7f0000002ac0)=[@in6={0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}}, @in={0x2, 0x4e24}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0xfffffffffffffffc, @local={0xfe, 0x80, [], 0xaa}, 0xbf}, @in={0x2, 0x4e23, @broadcast=0xffffffff}]}, &(0x7f0000002b80)=0x10) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:13 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:13 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x400, 0x2000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000001580)={0x0, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, [0xff, 0x9, 0x8001, 0x5, 0x0, 0x5, 0x480, 0x3, 0x8c, 0x0, 0x3, 0x3f, 0x8, 0x200, 0x80000001]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001400)=@assoc_value={r1, 0x66f}, 0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000180)={r1, 0x13, "b38c585ab284130fa5c6af90421fa385126adc"}, &(0x7f00000013c0)=0x1b) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) preadv(r3, &(0x7f0000001480)=[{&(0x7f0000001500)=""/114, 0x72}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f0000001440)=""/15, 0xf}, {&(0x7f00000011c0)=""/228, 0xe4}, {&(0x7f00000012c0)=""/203, 0xfffffffffffffe31}], 0x5, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 436.743326] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 436.744277] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 436.744826] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 436.781580] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:14 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:14 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000140), 0xffffffffffffff85, 0x20000005, &(0x7f0000000180)={0xa, 0x0, 0x3, @empty, 0x3}, 0x2c1) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x40240) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140)={0x63ec, 0x7, 0x7f, 0x200}, 0x8) 2018/05/18 19:43:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@loopback=0x7f000001, 0x40000000000000, 0x1, 0x0, 0x10000000000, 0xa}, {}, {}, 0x40000, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0xfffffffffffffffe, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) 2018/05/18 19:43:14 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x401) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x100000000, @local={0xfe, 0x80, [], 0xaa}, 0x16e}}, 0x1, 0x4, 0x1e, 0x6, 0x8}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r3, 0x100000000}, 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r0, 0x8, &(0x7f0000000180)="bc9b214b920b59eadf9e004577f5a28adbbfa08a07d0b287144c522ac1a170930a7d51a9264c19c921df92dc110c7c1705839921435a0b5c73b32bb0ba912bce395c69bad079d77a66deee0cfe2d53067279ba29c6db2ba1c6e137e6ab81667ac1128df72b4a31a11f97ad2f7c287a7d38436a13969117f67092299e65474a21f72b903ce141ef8598e62e4d6a07d3cd762e9e53389410331c4b196e807f20c7ddb00b3149805564fc2668706677111a139e2b6c6951fa19d2fb7672a05bc80ef2") setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x4000) r2 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x1000, 0x400) r3 = accept4$ipx(r2, 0x0, &(0x7f0000000000)=0x3d6, 0x800) rt_sigreturn() ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000140)='bond_slave_0\x00') sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:14 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x400001, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e21, 0x8, @local={0xfe, 0x80, [], 0xaa}, 0x100000000}, 0x1c) accept$unix(r1, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000180), &(0x7f00000001c0)=0x10) sendto$inet6(r2, &(0x7f0000000040), 0x96, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:14 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x40) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000140)=0x2) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 437.666413] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 437.680593] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 437.683471] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:14 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 437.745406] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 437.780165] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:15 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sync() bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) listen(r0, 0xb) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) r3 = getuid() ioctl$TUNSETOWNER(r2, 0x400454cc, r3) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r2, &(0x7f0000317000), 0x7f8) link(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') stat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000003c0)) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000180)=r4) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:15 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0xd7e96f8fab8918d1, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x6, 0x9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0xd53, 0x30}, &(0x7f0000000240)=0xc) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000280)={'TPROXY\x00'}, &(0x7f00000002c0)=0x1e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000300)="030e60afdbe9c67e6627ee3a6729114b5354694c6dfa85a3891697f2b0274f8722ad433a51e1ae1cf7b26c1876e078bef1b6f0ca8f27bd1b56705e9deb73ef5b003fe5fa19d2c4cb30dd6ec9a539a0d6218204982b802d94c5971bb2b57fc730b765756f70e4620a6573005d680c034096fb356dc7b5b4ed29bc05", 0x7b, 0x20000005, &(0x7f0000000000)={0xa, 0x4e22, 0xfffffffffffffffe, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0x1c) 2018/05/18 19:43:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x4e21, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:15 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x3, 0x0) read$eventfd(r2, &(0x7f0000000140), 0x8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x40040, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x1, 0x5, [0x40, 0x0, 0x5, 0xfffffffffffffffc, 0xffffffffbaaeddbf]}, &(0x7f0000000140)=0x12) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000180)={r2, 0x9}, &(0x7f00000001c0)=0x8) 2018/05/18 19:43:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:15 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000200)=0x0) tkill(r3, 0x4) munlockall() r4 = dup3(r0, r2, 0x0) connect$ax25(r4, &(0x7f0000000240)={0x3, {"112fafbad0f9ee"}}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'security\x00'}, &(0x7f00000001c0)=0x54) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) gettid() sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)={0x1e4, r1, 0x803, 0x70bd2b, 0x25dfdbfb, {0xa}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x43}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1=0xe0000001}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast=0xffffffff}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2=0xe0000002}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffffff7}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote={0xfe, 0x80, [], 0xbb}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x371}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10001}]}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local={0xfe, 0x80, [], 0xaa}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40004}, 0x20000805) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) [ 438.604035] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 438.619981] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x60000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x110, 0x70bd2b, 0x25dfdbfd, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe3e7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffffc01}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xabc}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e21, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pwrite64(r0, &(0x7f00000001c0)="a95dfc343b7f2c76e0da81afc0b4722adf0186b9bcf785086f940df9c31614c7c50a000d28447a84b9477809376efb6041c56b2205cddd2f0f5fad55a2be4f12b6dd8dcf380941368d7a3843f9dea58c0c5be40bd1c4c825849d0a6f3db8df515138ea400ef7a27425070db0ab974b349271c13237eab193c739dec428b27903973971b09f97c886117a5794a20f09a692cacd1f2808fdd3afdad4bc55b9e44ddfbfcff82aa2ad4158c6adc643d9a4c6817353fac7ecd80f2c765b43469d8ccfe48647849083f90c3a58ccc56196c2f8d47fb2b9ca2fa3487a23eeace20fbea0b40380f8b7f50067200a8ea7437a8c", 0xef, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x4, 0x0, 0x0, 0x0, 0xa, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9293}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x7c5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [0xff, 0xff]}, 0x56c, 0x1, 0x0, 0x8}, 0x20) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={@empty, 0x16, r4}) 2018/05/18 19:43:15 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x40) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffff39, 0x20000005, &(0x7f0000000180)={0xa, 0x4e22, 0x6}, 0x1c) 2018/05/18 19:43:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e23, 0x800, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400800, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:15 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x9}, 0x1c) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_stats\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000440)=0x14, 0x800) sendmsg$nl_route_sched(r2, &(0x7f0000000940)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000900)={&(0x7f0000000480)=@newtclass={0x470, 0x28, 0x300, 0x70bd28, 0x25dfdbfc, {0x0, r3, {0x4, 0x6}, {0xf}, {0x6, 0x1b}}, [@tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x2c, 0x2, @TCA_ATM_HDR={0x28, 0x3, "19a603804ba857027f7b7c942169bdc4592949d10d67d107ff253756296863235dcd0f92"}}}, @TCA_RATE={0x8, 0x5, {0xcd8f, 0x1}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x408, 0x2, @TCA_CBQ_RTAB={0x404, 0x6, [0xffffffffffffebf3, 0x4, 0xfffffffffffffff9, 0x5, 0x8, 0xffffffff, 0x4, 0xffffffffffffff76, 0x4, 0x200, 0x2, 0x9, 0x1, 0xfffffffffffffff8, 0x6eed, 0x3ff, 0x0, 0x9, 0x4, 0x9, 0x5, 0x3ff, 0x7, 0x3, 0x70000000000000, 0x6, 0x8, 0x9, 0x4, 0x3, 0x3, 0x4cfb, 0x80000000, 0x3, 0x9, 0x8, 0xc3c7, 0x1, 0x38e2, 0xa07d, 0x400, 0x401, 0x40, 0x2, 0x5, 0x8, 0x80000001, 0x4c, 0x4, 0x1000, 0x6, 0x8, 0x6, 0xc0, 0x130, 0x6, 0x3ff, 0x9, 0x3, 0x8, 0x8, 0x1, 0x7, 0x6, 0x400, 0x3, 0x4, 0x7, 0x6, 0x1, 0x2, 0x5, 0x100000001, 0x9, 0x10000, 0x8, 0xfc9, 0x3ff, 0xfffffffffffffff9, 0x4, 0x59c13485, 0x7ff, 0x1, 0x5, 0x9, 0x2, 0x9, 0x6, 0x7ff, 0x1, 0x7, 0x3, 0xd6b, 0x9, 0x1, 0x8, 0xff, 0x0, 0x8, 0x5, 0x7ff, 0x10001, 0x4, 0x7fffffff, 0x100, 0x4, 0x401, 0x9, 0x9, 0x8, 0x58c, 0x20, 0x0, 0x3, 0x9a6b, 0x4, 0x7, 0x7fff, 0x8, 0x1, 0x6, 0x4, 0x7fffffff, 0x7, 0x1000, 0x9a4, 0x4, 0x2, 0x7fffffff, 0x6, 0x2, 0x0, 0x100, 0x904, 0x4c1, 0x6, 0x4, 0x0, 0x9, 0x5, 0x4e, 0xffffffffffff2e2e, 0x5, 0x0, 0x7, 0xfffffffffffffff8, 0x8000, 0x7f, 0x8, 0x5, 0x12, 0x81, 0x5, 0x101, 0x3, 0x5, 0xea, 0x80, 0x7, 0x6, 0x200, 0x3f, 0x10001, 0xfffffffffffffeff, 0x3, 0x7, 0x3, 0x6, 0x0, 0x20, 0x4, 0x0, 0x23, 0x3e, 0x101, 0xff, 0x1, 0x3, 0x3, 0x4, 0x40, 0x81, 0x5, 0x6, 0x0, 0x8, 0xfff, 0x45, 0x515, 0xfff, 0xffff, 0x1000, 0x101, 0xff, 0x3, 0x9, 0x1, 0x4, 0x401, 0x6, 0xc1, 0x68fc3697, 0x8, 0x3, 0x2000000000000000, 0x4, 0x3a, 0x7ff, 0xbcc, 0xffffffff, 0x1, 0x80, 0x4, 0x1, 0x0, 0x80000001, 0x1, 0x4, 0x7, 0x3, 0xfff, 0xc10, 0x7ff, 0x5, 0x2, 0xff, 0x3, 0x9, 0x1, 0x81, 0x1, 0x3, 0x7, 0x4, 0x5, 0x0, 0xfffffffffffffe01, 0x5, 0x3, 0x9, 0x2, 0x57b, 0xe23, 0x7, 0x4, 0x0, 0x4, 0x9, 0x0, 0x10000, 0x2, 0x1, 0xa100, 0xa981, 0x5, 0x4]}}}]}, 0x470}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000980)={@in6={{0xa, 0x4e22, 0xdc, @remote={0xfe, 0x80, [], 0xbb}, 0xd7d}}, 0xfff, 0x7fffffff, 0x4, "288509939d292aaf3ad473d2b8512d92529b69f383a6014f5e7a96ea6424796b7e478237d6e5dbd579fe64216b0ea92a75a95dead9fe8e7523155c1137421cde7ac633bca83916d015808ee1b596af56"}, 0xd8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'syzkaller1\x00', 0x0}) fstat(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r4, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=@getpolicy={0x58, 0x15, 0x200, 0x70bd2c, 0x25dfdbfe, {{@in, @in6=@dev={0xfe, 0x80, [], 0x13}, 0x4e21, 0x0, 0x4e24, 0x5, 0xa, 0x20, 0x0, 0x73, r5, r6}, 0x6e6bb5, 0x2}, [@etimer_thresh={0x8, 0xc, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000800) [ 438.673390] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) socketpair$inet(0x2, 0x3, 0x6, &(0x7f0000000000)) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 438.765964] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 438.771662] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:16 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:16 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x7f, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:16 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x6, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000380)=0x100000000) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000280)={{0xffffffffffffffff, 0x3, 0x100000004e2, 0x0, 0x58a00}, 0x5, 0x20, 'id0\x00', 'timer0\x00', 0x0, 0x101, 0x10000, 0x4, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @local}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2, 0x0, r3}, {0x0, 0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0x9}, 0xfffffffffffffffd, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) listen(r0, 0x0) socketpair(0x11, 0x3, 0x800, &(0x7f0000000140)) r2 = socket(0xa, 0x2, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = open(&(0x7f0000000000)='./file0\x00', 0x81, 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x6c}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f00000001c0)={r3, 0xfff}, 0x8) 2018/05/18 19:43:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80202, 0x0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000140)=0x10001, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000140)="7ede8ea0030e0b00d8fe382954f5ee719b5c3de9fefc410400532afc771e20835f876d8121648aabaa3084d7ae1839a021ca13f385fc565fcbabab4629efcc416d295595758a6ab08cbf84bba71904eccfea095de826a3280510b970ffaa79b6fe8e26e1d0a22f26d73109ea358d0000000000000000000000000000", 0x7c, 0x20000005, &(0x7f000031e000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) 2018/05/18 19:43:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400000, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000140)="ac") listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:16 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) tee(r1, r1, 0xffff, 0xb) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000000)='/dev/pktcdvd/control\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000140)={{0x40, 0x3}, 'port0\x00', 0x0, 0x20, 0x5, 0x4, 0x1, 0x4, 0x3, 0x0, 0x7, 0x7ff}) 2018/05/18 19:43:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x200100, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000002c0)={0x78cb9752, 0x8, 0x10000, 0x1ff, 0x4, 0x5}) listen(r1, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4d2, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom(r0, &(0x7f0000000200), 0x0, 0x40000000, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x1, 0x0, 0x1, 0x4, {0xa, 0x4e22, 0x1000, @local={0xfe, 0x80, [], 0xaa}, 0x8e7}}}, 0x80) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000580)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000400)={0x0, 0x2, 0x80000001}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000480)={r3, @in6={{0xa, 0x4e20, 0x20, @local={0xfe, 0x80, [], 0xaa}, 0xff80000000000000}}, 0x6, 0x10000, 0xe663, 0xfffffffffffffc01, 0x3c}, &(0x7f0000000540)=0x98) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f00000001c0)=0x6, 0x4) getsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000140)=0x5, &(0x7f0000000180)=0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000380)={0x7, 0x70, 0x9, 0x6, 0x401, 0x5, 0x0, 0x8001, 0x2082, 0x4, 0xdd1, 0xfffffffffffffff7, 0x1ff, 0x3f, 0x1, 0x2, 0x2, 0x0, 0xfffffffffffffffd, 0x3, 0x8, 0x400, 0xffffffff, 0x3, 0x7ff, 0x0, 0x4, 0x141d, 0xbf, 0x85, 0x100, 0x4, 0x0, 0xc0, 0x3f, 0x100000000, 0xffffffff7fffffff, 0x40, 0x0, 0x4, 0x3, @perf_bp={&(0x7f0000000340), 0x4}, 0x20, 0x10001, 0x3, 0x4, 0x8, 0x2, 0x5}) [ 439.543614] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 439.547112] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 439.552161] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 439.582074] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:16 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'erspan0\x00', 0x2}) listen(r0, 0x800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e20, 0x0, @empty, 0x1}, 0xffffffffffffffa6) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x3, 0x0, 0x0, 0xa}, {0x0, 0x3}, {0x0, 0x2}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) clock_gettime(0x0, &(0x7f0000006280)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000006180)=[{{&(0x7f0000000140)=@hci, 0x80, &(0x7f0000001680)=[{&(0x7f00000001c0)=""/161, 0xa1}, {&(0x7f0000000280)=""/124, 0x7c}, {&(0x7f0000000300)=""/230, 0xe6}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/125, 0x7d}, {&(0x7f0000001480)=""/211, 0xd3}, {&(0x7f0000001580)=""/229, 0xe5}], 0x7, &(0x7f0000001700)=""/220, 0xdc, 0x40}, 0x9}, {{&(0x7f0000001800)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000002900)=[{&(0x7f0000001880)=""/15, 0xf}, {&(0x7f00000018c0)=""/2, 0x2}, {&(0x7f0000001900)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x1}, 0x3}, {{&(0x7f0000002940)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000004dc0)=[{&(0x7f00000029c0)=""/247, 0xf7}, {&(0x7f0000002ac0)=""/203, 0xcb}, {&(0x7f0000002bc0)=""/79, 0x4f}, {&(0x7f0000002c40)=""/4096, 0x1000}, {&(0x7f0000003c40)=""/53, 0x35}, {&(0x7f0000003c80)=""/4096, 0x1000}, {&(0x7f0000004c80)=""/158, 0x9e}, {&(0x7f0000004d40)=""/65, 0x41}], 0x8, 0x0, 0x0, 0x1}, 0x96}, {{&(0x7f0000004e40)=@nfc_llcp, 0x80, &(0x7f0000006100)=[{&(0x7f0000004ec0)=""/61, 0x3d}, {&(0x7f0000004f00)=""/26, 0x1a}, {&(0x7f0000004f40)=""/162, 0xa2}, {&(0x7f0000005000)=""/143, 0x8f}, {&(0x7f00000050c0)=""/4096, 0x1000}, {&(0x7f00000060c0)}], 0x6, 0x0, 0x0, 0x10000}, 0x6}], 0x4, 0x0, &(0x7f00000062c0)={r2, r3+30000000}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007a00)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000007a40)={0x0, 0x0, 0x0}, &(0x7f0000007a80)=0xc) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000007b40)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000007c40)={&(0x7f00000060c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000007c00)={&(0x7f0000007b80)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="000029bd7000fedbdf25040000002400010008000500c28dc697d3e2c37c01000000080001000a0000000800010002000004080009001600000008000600d9000000"], 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$unix(r4, &(0x7f0000007b00)={&(0x7f0000006300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000007940)=[{&(0x7f0000006380)="7e63edab3d3ebb972b38be6e4e88571cb5f98bff6fd94f", 0x17}, {&(0x7f00000063c0)="880a2a12b45fab9c284fd1f07cd7570ccae7dbe27f0162851db2b791e0c686482c74274bfbfbed5f0518425fb13fcbca64dea11f765ccc2bea8f2a3a6d8ed29fcb5b15cabca13f62620dad88ea", 0x4d}, {&(0x7f0000006440)="9cccd0b9509a65131e2d31b4c920ed51f51d50dcad303c89b2fec53680ed5af4791f9d977ed1d77eb8d9588619a606a3470a61582d63a886513e8ab88fd1e0061b52e473036ef09a8bdf7fc9031359ffc63ecd2a48f289b43f7fcdff661e5de7a790d8002350e6cf1267d8f62f387479c07f953d184715a7ba2cb2c2b278a38f35a226bf1e2439b6d107aab10ded73b123a50323443cae494a71f69a78775d9f5107135865da1e085774602c79bb410ab732288d3bba2c34c90f8e9b5063f90e333c1064ae53b4005682792d2dba5498fca54f05709b86e480fcebbbc2d3", 0xde}, {&(0x7f0000006540)="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", 0x1000}, {&(0x7f0000007540)="3d9d7964cad6f3550c967213f85675f25815f013c9bda9f78573c1ad6e4ec2742924091fc9eb476f2407196717b8d736c9d2ff1c4492fac80853507afe37d58976c4bc7024d71cfaefe787fd6817cfb0ef59c0bcf0aa12e99c2944bfc490f224344cb5d4732b1c20c685b9140741cfc89b2d4903012a921327501e475f430fe60e88ac1e74051215760e09c51d8d1e1e4c5ea10534dcdde23d", 0x99}, {&(0x7f0000007600)="f60fe8cb9e878a2ed58e981a6af2791d7f6e4dd7cf1f072c71724b17fce47e7b4b5062615e9bd48f379105e2b33ae65d53915396ec345c38b96ebac86587e82e8c268b0278d702bde1136fbfcabe1b1de05e521d8001e8e9d8d8c378d7b558ebcc0d5225b716d3dc97b9e5bcac6d83983cfa56aa0c201641253ac2d0944c7efae94408b3621ff1cdea87564d4a15d6465b1a8bc4a2158bfa2a52a5942b8bc3db98d69afdb2de04f956c4949369622bf74e49bc3d08e2f7cf38c121bcbed2789f5f24c4e21f3ba7d0d09e792d56", 0xcd}, {&(0x7f0000007700)="f15a20e8e0a418e2d6025f95362642a4f5ae37e5ab273848ce1b1a237401781c9b81eda58a601e8164ebe90fd59cf76b689da47fb7899bd6117dcdc96cc148d6141c2f59bcc00b4815199f5cfa0aa60bcc48bbe5f1240d0aadad2a8c4e37e0e777c513223280e1a5a4b11237629580012f499ef31f8cc5b1bce2020df43390db450acb1042b1d44d2a080c032b14a2ec80d3d6fd5c4639057ee45f05f29a7fa14c84c200e88ac3f5793ec275875479949b36", 0xb2}, {&(0x7f00000077c0)="da66fea37810b4778969ed0e437c781421325ec18d122b5c10842f2ece6b67b95548b55697a5d099a1c715eff8007469951833c6fb8f0846a6bc5e38c51bb23e567ba65b5b990fb576c955458c98b699b63a352cba9a8e4870b2cae7605fa8e25d09c822019feea6045b2e5c0b0d670e1b74f9376412ad14eb7d55c9979ab8c32f0125dbf289", 0x86}, {&(0x7f0000007880)="0ac5847f68d0", 0x6}, {&(0x7f00000078c0)="30a6e35c920228dfb208eb8c96d9ad227ef00cc01d8844bb7cc0905f1fd4898bae8d51560dafd7bc9f7588ff2fd609230841088dc318b6244cd8a389c74dd6bd126ceb66b6f0bedfef311f5dd254f396afca3c0223b8a1276d1e8ebf6cee21aecd7c4e6576f12f7602d718fbed9ce6235f835e", 0x73}], 0xa, &(0x7f0000007ac0)=[@cred={0x20, 0x1, 0x2, r5, 0x0, r6}], 0x20, 0x4008840}, 0x81) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xffffffffffffffba) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:16 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x2}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) [ 439.583213] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 439.631939] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 439.695615] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:17 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000140)="6f89eea31875e6ac9db40a28914d622ae6bef273c5cc94dd9a943d91a24d1b5c81b72f57102b8910d49ebb9cf8ae2505bde9a529f06e55a4707cdf37ee8e22dc441d757060a60d6a9ba53483db72d4a91286de62c68a3d04f9c23d7adacd04ee1cce44c949690c0e876e2f77449beb2aacc106f41072dbe369155c47b4b8f8b36e7740201aba963b3525329f528a85ff3b38ef6713e3d675ab5838c6d4926c807cab2b4920304b1ce30339ef1d10324c857c010650e59fb9dd09c59f66cd17d878850d694790badde05f271db65c1658b58573318d9ad44c2d", 0xd9, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0x13b) r2 = memfd_create(&(0x7f0000000140)='md5sum\x00', 0x1) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)) sendto$inet6(r1, &(0x7f0000000040), 0xb7, 0x40, &(0x7f0000000000)={0xa, 0x4e22, 0x3}, 0x1c) 2018/05/18 19:43:17 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x101000, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x1, 0x0, 0x2}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x2, 0x0, 0xfffffffffffffffd}}, 0xe8) sendto$inet6(r0, &(0x7f0000000140)="0736ebf0fc7dad72a4fd899596c9dc218735295a1f34fc2b2c18561e58054e18da58b202fec385fa9d1505ec", 0x2c, 0x20000005, &(0x7f000031e000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x40}}, 0x1c) 2018/05/18 19:43:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000000)='/dev/pktcdvd/control\x00', 0x10000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000140)=0xfffffffffffffff8, 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x1) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in=@broadcast=0xffffffff, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x8000}, {0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x8}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:17 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0x0) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000)=0x8, 0x4) 2018/05/18 19:43:17 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0xfffffffffffffffe, 0x80}, {0x0, 0x0, 0x4, 0x0, 0x8}, {}, 0x0, 0x0, 0x1, 0x3, 0xfffffffffffffffd}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000140)=0x4) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e21, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, {0xa, 0x4e24, 0xff, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, 0x7ff, [0x101, 0x80000000, 0x2, 0x1, 0x8, 0x7f, 0xc11, 0x1]}, 0x5c) 2018/05/18 19:43:17 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x800) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x7}, {}, 0x0, 0x0, 0x1, 0x4}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) timerfd_create(0x7, 0x80000) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000001c0)) [ 440.480316] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 440.494375] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 440.512437] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000001c0)={0x7, 0x7f, 0x4, 0xd4, 0xffffffffffffff81}, 0x14) setsockopt$inet6_dccp_buf(r1, 0x21, 0x8c, &(0x7f0000000140)="3565710c3565bdb9a058a31087393b3fea98ba196e2b59c2ebc14c7b490bab403291af6e925d4aaacffcddae9dc9f6d594a3566ddcc4d1be5a2e186847ee9aca40b64ff323cb77e14a09f2d824c091", 0x4f) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") memfd_create(&(0x7f0000000000)='\x00', 0x3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:17 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0x0) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 440.528958] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 440.529325] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 440.565350] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:17 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000140)=""/4096) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) 2018/05/18 19:43:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) keyctl$revoke(0x3, r1) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000006c0), &(0x7f0000000700)=0x4) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x10001, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) write$sndseq(r3, &(0x7f00000004c0)=[{0x81, 0x1, 0x0, 0x1, @time, {0x1, 0x8}, {0x100000001, 0x8}, @time=@tick=0xffffffff80000001}, {0x6, 0x100000000, 0x9, 0x3ff, @time={0x0, 0x1c9c380}, {0x6, 0x7fff}, {0x9, 0x59}, @raw8={"446974bdc344b1a0c80c872c"}}, {0x6, 0x8001, 0x6, 0x401, @time={r4, r5+30000000}, {0x1ff, 0x493}, {0x7fffffff, 0x7}, @addr={0xc1, 0x51e0}}, {0x1, 0x80000000, 0x7, 0x7, @time={r6, r7+10000000}, {0x7, 0x401}, {0x3, 0x5}, @result={0x100, 0x5}}, {0x8, 0x8001, 0x7fffffff, 0x7, @time={r8, r9+30000000}, {0x1, 0x3}, {0x5, 0x100}, @control={0xe26, 0x3, 0x6}}, {0xffffffffffffff8d, 0x6e068d78, 0xfffffffffffff934, 0x5, @time={r10, r11+30000000}, {0xbc62, 0x5}, {0x5, 0x9}, @raw32={[0x4, 0x3, 0x1f82]}}, {0x7, 0x3, 0x5, 0x6, @time, {0x80, 0x3}, {0x4, 0x3f06}, @ext={0xc8, &(0x7f00000002c0)="7f5827aa6e9f9f92da6ce759e99e906041e66e081f558116cf5ca7e13042f8115723941d57598fbfe7482feef35bd99ebb18ebbf9e2cff8ac2da046d2da7ef65dfa3f61852dcbfe866250d0d2825b2f2990d3bdd0bec909703118d2d8400543edca89b1ddd53aa68ccdb7bce647c46abf4e3d95587ffa16fe6491af71a96b39db8dc000e0cb858b3273d7d3162319676d8a6645de49966d7e4245cdfc98d83b2b3c17c9d6b2f725192637d678da122b4a28bdc0e373156ec7e5606fd877e01faefc11d2f2fd1dfe7"}}, {0x0, 0x3f, 0xf19, 0x5, @tick=0x20, {0x2, 0x6}, {0x2, 0x9}, @ext={0xaf, &(0x7f00000003c0)="1889a0277934321a53c0923e862a8a35b73433863570d1d0703ef9edac6c89d00ba441cbcb0376e3744e777198d9d2a7f0f16be9f04d2da42267fd92151cd37187103b761fa5e932efcec004a1fd7cf6eb7bc53783445c7d5de88f94b186019e93a8cc724fac3a8fa7af6d4f57067981ab5ff401633b880c4391441dc827f9c33de3c324ea3cebbd4d24c1e4007ee7844eea49ff040281380dad84df76dd3c10c8e39080c0c9b12adab16a9804b65c"}}, {0x4, 0xd1, 0x6, 0x9, @tick=0x3, {0x6, 0x1ff}, {0x0, 0x100}, @control={0x0, 0x1, 0x7}}, {0x20, 0x957a, 0xfffffffffffffffc, 0x4, @time={0x0, 0x1c9c380}, {0x9, 0x4}, {0x4, 0x2}, @quote={{0x7, 0xfffffffffffffffd}, 0x5, &(0x7f0000000480)={0xfffffffffffffc01, 0x4, 0x4, 0x401, @tick=0xfffffffffffffff7, {}, {0x4, 0x9}, @raw8={"216356327a64ce332a7bbd7e"}}}}], 0x1e0) 2018/05/18 19:43:17 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000140)=0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 440.565664] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:17 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0x0) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:17 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x9ca5) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e21, 0x9, @loopback={0x0, 0x1}, 0x7}, {0xa, 0x4e21, 0x8, @mcast1={0xff, 0x1, [], 0x1}, 0x80000000}, 0x200, [0x101, 0x8, 0xfd, 0xfffffffffffffffc, 0x0, 0xffffffffffffffff, 0xb86f, 0x200]}, 0x5c) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x589142, 0x0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000300)={&(0x7f0000fff000/0x1000)=nil, 0x1000}) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000080)="83", 0x1, 0xffffffffffffffff) keyctl$clear(0x7, r2) write(r0, &(0x7f00000001c0)="edaa0375a2604160efe013c897b0ccba0b8345c688bdd80c1e5ee239c45191de395fd34705f200e232dd2dbede36ba3bbcc199297253b11ad4c4979996ade10198f00ae3c54227d96c218a8462c20e90df0eea9ae77aa39102b0a5209fa5ad79871a352252957c3a660499b6f5002ecf80daebddcbabeb515f1a2bbd2024f138abc39aead4cd8549ba39e598d1ff0357460c15fce213b1980734618c822348f3bb1848d22b641953ef868383b7285b4268436de3af783113c12f77441cbfeb219e8968d477f828a241c575020f7d59890418513ae4752f380766f3204dbcad4bafb3d5fb15d2524e4390", 0xea) setsockopt$inet6_int(r1, 0x29, 0xdb, &(0x7f00000014c0)=0x79, 0x4) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000001440)='/dev/null\x00', 0x4003f, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000340)={0x0, 0x0}) ptrace$getregs(0xe, r4, 0x100000000, &(0x7f0000000380)=""/4096) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000001480)={'nr0\x00', &(0x7f0000001500)=ANY=[@ANYBLOB="370800000100000031060000c97b42f766eb46af4441e667526e6bc27af50a00846018a915f14e0726c93ffeec7eec739bd420d4673abbb49988c05807e4219c06b7f6e6f3e0cfc76af9e5b2b98944482fa8f33dbd7b8dd706a06eaeb6fd492329e74ab4ff50bd62e68123f5541b3e"]}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000013c0)={0x8, &(0x7f0000001380)=[{0xe0, 0xff, 0x4, 0x3}, {0x0, 0x1, 0xb4e, 0xe}, {0x8, 0xc96a, 0x4, 0x3ff}, {0x2, 0x6, 0x35, 0x8}, {0xdde8, 0x8000, 0x0, 0x3}, {0xb61f, 0x1, 0xf7, 0x4}, {0x5398, 0x9, 0x8, 0xfffffffffffffc00}, {0x9, 0x2, 0x2, 0xd8}]}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) prctl$setfpexc(0xc, 0x0) sendto$inet6(r5, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:17 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x28) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000180)=0xff, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000140)=0xe, 0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f00000001c0)=""/102) 2018/05/18 19:43:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in=@loopback=0x7f000001, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) listen(r0, 0x6) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @local}, &(0x7f0000000180)=0xc) bind$packet(r2, &(0x7f00000001c0)={0x11, 0xf6, r3, 0x1, 0x5, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xc}}, 0x14) 2018/05/18 19:43:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x6, @ipv4={[], [0xff, 0xff], @rand_addr=0x6}}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:17 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(0xffffffffffffffff, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 440.609209] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 440.622365] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:17 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e24}, 0xfffffffffffffffa) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000003000000000000000000000000d9ce9ed398058e3c00000000000000000000000000000000000000000000000000000000000000"], 0x58) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f00000002c0)="d82b2c68f611e44abef85071a3fdef76f8ef97382e4d0efda839768915359e37a52153cdad4db85ccc4a77c8d00bcfc6b213b633677cc055831be76e38a0c4362391cd88e322971fbd44532bd279cf05022a10e64e15b729fbfcafb14edfede5cb15f5bac40a05dcab892c8c3b7e7e61b6610c1729a4bc51e43ed241a5f8bdee471a153720f818b7472ca3d7fce2a6e388b4ab5986aeb360696f770fd74babd381cc015b8c581ab32cd8adae9921ecf6d2372e30359dc49559aca550c7f0f4353b09fd1f5ed42f51979d8ec08bf1d0de552256", 0x385, 0x41, &(0x7f000031e000)={0xa, 0x4e22, 0xfffffffffffffff8, @empty, 0x401}, 0x162) 2018/05/18 19:43:17 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'gre0\x00', 0x0}) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000180)=@req={0x28, &(0x7f0000000140)={'lo\x00', @ifru_addrs=@hci={0x1f, r2, 0x1}}}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x2, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) timerfd_create(0x6, 0x80000) 2018/05/18 19:43:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) bind(r0, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, 0x4, 0x4, 0x2}}, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/191) [ 440.682320] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 440.736522] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 440.743722] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x8000, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000280)=0x1000) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fcntl$getownex(r3, 0x10, &(0x7f00000000c0)={0x0, 0x0}) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000340)=0xc) sendmsg$nl_generic(r1, &(0x7f0000001800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000017c0)={&(0x7f0000000380)={0x1408, 0x24, 0x3, 0x70bd2b, 0x25dfdbfd, {0x1d}, [@nested={0x1e4, 0x28, [@typed={0xc, 0x72, @u64=0x7fffffff}, @typed={0x5c, 0x6f, @binary="c46272b6acd92c9a5a2801fe9bf0a4b054eb6b19e013fdd152aa3a64e353cc25299c5295569571863af70cba5505f3352d9ccf584a1e1d34f39df5049abc146d11c7b85d6e7993626f7521679ca316c6c6947580832719"}, @generic="f3feba80f995522fa2f7c4e7bbe6d2691264eb60822d3d4ef29b354be73f0dbebab1e79ffcd70aeb485b626d420a6ed307155da11d64cdb85863efa4c00142aebdd17934dd06b4629659784d0cd562e3b22b818750b352646ea39cc7387c5253d5ca96180816908bbdff83fca00fe132474633f7f43e45a0025a26b4a9d4ef9559b5c305510d482ffb30e269feb4add621985a4cb8242c19d7524e1f3a", @generic="b7a0d4e4f79ca24bcb172bcfd5c1f1f612efdc4b2fe2737b8c9c55aef35833f2c7ded575e11db003d76cb15f0911d6fc8106933662138c42f2c4f472e576b2168c9fc3f01a2bd821b88073ec91b8416365d014ce1278c36a0cb9a5216df18c6076ebcabe053aabdf30ab1f26ac", @typed={0x8, 0x51, @pid=r4}, @typed={0x8, 0x3d, @uid=r5}, @typed={0x5c, 0x8d, @binary="4b0a508e40ba3c97d883347646f15dee53d8825060622b4c6a598776d0328c8294e27051b5e324d196b7c349d96e6b545e0d7eec67a352b47329da7b27ec9d41f0b2e6bb06c79e8970e2ec64b89546551e0ee4651373"}]}, @generic="cf8dd6f07fb76b5c7f6aa82082d8dac164c0b4d293cbb31d53bdc4092c792693982391f2dae205168d5ffe9d713273adadf1151c1d59c13878a671892138bad70c40b451fe3e53e722ed69db3511d8afbf40e078577bda4930434f53aa0ec3001a54b5dd42f0f0fef2e381a49649100b6f9c25d6db3620b893d2bcc81a8e5e11db6e6f5a2516f810be1cf8fef8b5e4f45ce7ec4a92", @generic="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", @nested={0x104, 0x5f, [@generic="cada64bc4fbca2033c079a4c123794925a7638affedd371c0e934d8712c89b19dfac1638a2e4a05a4a56eba35ee5b1cd30fad05b367b441e475ae9720841bec6642d26f8be17a62eee1e0932ea35d7622af3a1f4f44ed8c5df9f4e93e774f969c22bf3515a7d22cf", @generic="2b028023bfddd18f670150cadf75a5c79821f2bc7986ed977b01fcc9fd9612783da288f27826add063fdaafb3548647d66e3467be6105206cde39be522b286eb49d8d3697d1fdc470e1de9aea655d953086f2437650d7dbab8bb62141650929658fea363408adc24a207971cb6369cededc4a9892253b3f87cecd7", @typed={0x4, 0x8b}, @typed={0x14, 0x5c, @ipv6=@ipv4={[], [0xff, 0xff]}}, @typed={0x4, 0x79}]}, @typed={0x8, 0x61, @pid=r6}, @generic="308ae6fe4ee8450c707e584c98e5de1e22b0779745feed2105c3ba258c1be771311e6da8bf34ffa93f57211a690d3254abcbceae7aa61fa15accaaa5f771f958a4c73a8cf143ae81651693e6d87f829e8d3ea803cd0571b61f20b3e78e92533f6f228ad5a4d5cfb33b22b98a5c6e"]}, 0x1408}, 0x1, 0x0, 0x0, 0x404c040}, 0x44) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000140)={0x1, 0x100000001, 0x3f, 0x2, 0x200}, 0x14) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040)={0x6ec, 0x5, 0x5, 0x401, 0xff, 0x9}, 0xc) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getpeername(r2, &(0x7f0000000180)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x80) sendto$inet6(r7, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x20000, 0x120) ioctl$TUNSETLINK(r1, 0x400454cd, 0x305) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x800000000000, @empty, 0xfffffffffffffffd}, 0x13) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={0x0, 0xbbbd, 0x3, 0xfffffffffffffffb, 0xe5, 0x3, 0x2, 0x7fffffff, {0x0, @in6={{0xa, 0x4e22, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x200}}, 0x7, 0x10000, 0x4, 0x4, 0x7f}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000280)={r3, 0x0, 0x30, 0x69e7, 0x500}, &(0x7f00000002c0)=0x18) listen(r0, 0x0) r4 = socket(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r5, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:18 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101202, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000240)={0x3, 0xdd, &(0x7f0000000140)="556cea6fdf2f40626c0f7de21a685190d9006872ebe9db84f82cfef51077962f59fcdd905be6b0a42f41db3b49f29ab165df3bc9ecb88c5e355e7a66336becc86b159c65574bc12093757a963f7cb246df86c191bddbd8d22d712f520ac5299c58205830f10df21aeb211bd60bfa848eda37515b105ba0522b071f90921a5c74470c9b64079b497027e4cbadfebcbc44747a0187491b52f01853f0ea0aa35f873d557a8f8ca63bc95f080f89fbce7494433eb57e890da9567b4c4546fc49e5b2206c52a94cd27f4cadbd4f0d3192fac584c7e38475156d6e1bb150f3e2"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000280)='/dev/pktcdvd/control\x00', 0x800, 0x0) r2 = gettid() ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) ptrace(0x4218, r2) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpgrp(0x0) ptrace$poke(0x4, r2, &(0x7f0000000000), 0x5d1) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:18 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket(0x18, 0x0, 0x1) connect(r1, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, {0xa}}}, 0x32) setsockopt(r1, 0x111, 0x0, &(0x7f0000f27000), 0xcb8cf6) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000)={0x0, 0xb8d}, 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) socket(0x8, 0x2, 0x28) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:18 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(0xffffffffffffffff, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:18 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:18 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0xd4100, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000500)=0xef) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000680)=0xfffffffffffffffc) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x201, 0x0) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000340)) r4 = open(&(0x7f0000000140)='./file0\x00', 0x200000, 0x40) ioctl$RNDADDENTROPY(r4, 0x40085203, &(0x7f0000000200)={0x3, 0xcc, "8be64a5f98a49e5256c647000d1c5b34aea6e4cb57a265c8c11cc3ab3f55287a975af889c26b2ff447eaf71e580c7ec6f9d176888e4f51f857c365fb6d78e43e59eb6cf2df4b848f4b03daa7ba51011992417fb9448c595dc56eeb5a84557fbc5cc962dc35f1f88a721c6ff6a2a747f635e910a85efe90aa6231607110033b8de5efcc48ee9c89f76c9da356c730ed4008483f0046e526ef989b0add49c51703bc51b808ecbe6230a64ae4a3f95878aff422310031d0346d7c700cf33d24510067c31d9c5f938cc3131ea596"}) ioctl$LOOP_GET_STATUS64(r4, 0x4c05, &(0x7f0000000540)) getsockopt$inet_tcp_int(r4, 0x6, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000440)) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x4e21, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000200)=0xffffffffffffc630, 0x204) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000140)={@loopback, @local}, &(0x7f0000000180)=0xc) listen(r0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x800, 0x0) r2 = socket(0xa, 0x2, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x80, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 441.599568] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 441.614557] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 441.616532] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 441.621820] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) r1 = accept$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000180)={0x1, [0x0]}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e23, 0x100, @mcast2={0xff, 0x2, [], 0x1}, 0xfffffffffffffff8}}}, &(0x7f0000000380)=0x84) getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000200)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000240)={@remote={0xfe, 0x80, [], 0xbb}, 0x6d, r3}) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sync_file_range(r0, 0x4, 0x9, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x7fff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f00000001c0)={{0xffffffffffffffff, 0x3, 0x8, 0x0, 0x4}, 0xe024, 0x200}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x602000, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x6, &(0x7f0000000140)=0x80000000000000, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x14) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, r4}, {0x0, 0x0, 0x0, 0x0, 0x7}, {}, 0x0, 0x6e6bb9, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x0, 0x8000000000, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000140)=0xc) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000300)={{0xa, 0x4e23, 0x7f, @mcast2={0xff, 0x2, [], 0x1}, 0xa2}, {0xa, 0x4e23, 0x7fffffff, @dev={0xfe, 0x80, [], 0xe}, 0x5}, 0x20, [0x7ff, 0x7d, 0x9, 0x6, 0x182, 0x6, 0x9, 0xff]}, 0x5c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in=@multicast1, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) r4 = getgid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={r2, r3, r4}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty, 0xffffffffffffffff}, 0x1c) clock_nanosleep(0x0, 0x1, &(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)) 2018/05/18 19:43:18 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sw_sync\x00', 0x400, 0x0) socket$unix(0x1, 0x7, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0x0) keyctl$link(0x8, r2, r3) 2018/05/18 19:43:18 executing program 6: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000540)={0x0}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000005c0)={r3, 0xfffffffffffffffc, 0x4, [0x8, 0x7, 0x7, 0x0]}, 0x10) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22, 0x5}, 0x1c) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000840)={'teql0\x00', 0x400}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @loopback}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) r5 = getuid() setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000740)={{{@in=@multicast1=0xe0000001, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4e21, 0xfffffffffffff001, 0x4e21, 0x3, 0xa, 0x80, 0xa0, 0x73, r4, r5}, {0x8, 0x7, 0x1, 0xda92, 0x5, 0x8001, 0x7, 0xfff}, {0x40, 0x1, 0x9, 0x7}, 0xfffffffffffffffa, 0x6e6bbb, 0x2, 0x0, 0x1}, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4d4, 0xff}, 0x2, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x3501, 0x2, 0x1, 0x4, 0x5, 0x7ff, 0x2}}, 0xe8) listen(r2, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000400)=[@in={0x2, 0x4e23, @rand_addr=0x8000}, @in6={0xa, 0x4e22, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x7ff}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x4e21, @multicast2=0xe0000002}, @in6={0xa, 0x4e21, 0xa6, @local={0xfe, 0x80, [], 0xaa}, 0x1}], 0x78) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0xd6, "43fe75b029101021f3b0323e11fbff34dc97e41d958f3ac41e2ea9a0dcd07a593b1d46518a76fc0a9d4b4fe5d1bc4fad159b50cccc9ce88d8b1d1c6b2126b546df6680a099b702f7a9d76f56cc09e8fa43fa1b3913e42795dca82a9cde0b0246f70e1d0c0ddfa7f61d5837e822e2663e6fdeeff3036c09f1bcd44d6a031755f4407c2fcd65e408e7adb369a11f6b064c44d0d49a50bad1daab541ddb4212ada1e32f93e6e46d6e4a1ecd2289a75afead61b4c8bbbd4439450adf4e5376a4ac3acccd7d10d21449f8efe4299b30c3468f9a6d80ce3114"}, &(0x7f0000000340)=0xde) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000003c0)={0xb84e, 0x8, 0x8}) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000380)={r7, 0xfffffffffffffffb}, 0x8) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$SG_NEXT_CMD_LEN(r8, 0x2283, &(0x7f0000000140)=0xd) sendto$inet6(r6, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) accept4$bt_l2cap(r1, &(0x7f00000004c0), &(0x7f0000000500)=0xe, 0x80000) [ 441.656209] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 441.670622] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 441.673196] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2a8801, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000140)=0x7e, 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:18 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$sock_ipx_SIOCIPXCFGDATA(r2, 0x89e2, &(0x7f0000000140)) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000140)=""/168, &(0x7f0000000000)=0xa8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000280)={r2, 0x18}) 2018/05/18 19:43:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0x0, 0x800, 0x4) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000140)=""/108, 0x7}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) write(r1, &(0x7f0000000040)="0cd465a6e3d24d6fd7e0cd5292692519d6ca0e03e00b9f92690ebebbd40de151305df1a606d70c1a0fc0a8748d188856d4a4612bf6230f0343ec2670b8bca17a1fc16041d0254dd5a5cd58df75977f0b494dbd5231194333b93de5f2afcab3b3d5b43fd2a42d6412", 0x68) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000200)={0x3, 0x0, 0x10001, 0x3f}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000440)={0x0, 0x7, "3788c51f14948a"}, &(0x7f0000000480)=0xf) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000004c0)={r5, 0x100, 0xfffffffffffff581}, &(0x7f0000000500)=0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000380)={0x8, r4, 0x10000, 0x1ff}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000400)={0x5, &(0x7f00000003c0)=[{0x800, 0x7ff, 0x2, 0x2}, {0xb3, 0x8001, 0x1, 0x8}, {0x2, 0x81, 0x3a32, 0x6}, {0x0, 0x6, 0x8, 0x6}, {0x31df, 0x1ff, 0x1, 0x3}]}) r6 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000000)='/dev/pktcdvd/control\x00', 0x400000, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'eql\x00', 0x802}) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:18 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @empty, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x14) [ 441.724436] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 441.731020] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 441.737428] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 441.819437] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 441.843869] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:19 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(0xffffffffffffffff, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:19 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10100, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$sock_ipx_SIOCIPXCFGDATA(r0, 0x89e2, &(0x7f00000002c0)) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x900008}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x4, 0x70bd27, 0x25dfdbfd, {0xd}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff633}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0xfffffffffffffffc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat(r3, &(0x7f0000000280)='./file0\x00', 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:19 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x200) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2f4b6659445e2348) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r3 = dup(r2) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000240)={0x4, {{0x2, 0x4e21, @broadcast=0xffffffff}}, {{0x2, 0x4e22}}}, 0x108) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000380)=0x4) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x10d300, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r4, 0x0, 0x82, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000000)=0x78) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000400)={'nat\x00'}, &(0x7f0000000480)=0x54) 2018/05/18 19:43:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000140)) 2018/05/18 19:43:19 executing program 5: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:19 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000140)=""/4096, &(0x7f0000000000)=0x1000) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept$ax25(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0x10) connect$ax25(r1, &(0x7f00000001c0)={0x3, {"64ccb5dafa9bc9"}, 0x9}, 0x10) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket(0xa, 0x2, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) signalfd4(r2, &(0x7f0000000000)={0x9c}, 0x8, 0x80800) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, r1, 0x1, 0x3f, r2) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:19 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000001c0)) r3 = dup2(r0, r0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0xa, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) ioctl$sock_inet_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000200)={'lo\x00', {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}) r4 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000000)='/dev/pktcdvd/control\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000140), 0x4) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x9, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) nanosleep(&(0x7f0000000140)={0x77359400}, &(0x7f0000000180)) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = accept(r0, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x4, [0x6, 0x1, 0x4, 0x1]}, 0xc) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x9, 0x10}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e23, 0x8, @loopback={0x0, 0x1}, 0x1}}, 0xc1eb, 0x9}, &(0x7f00000002c0)=0x90) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 442.547061] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 442.553085] IPVS: length: 4096 != 8 [ 442.554318] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 442.557798] IPVS: length: 4096 != 8 [ 442.559074] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 442.566683] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x408082, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x6) geteuid() r2 = socket(0xa, 0x2, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000001c0)={0x2, 0xfffffffffffffff9, 0x1, 0x100000000, 0x7, 0xff75, 0x81, 0xffffffffffffff50, 0x3, 0x14f, 0x101, 0x3ff}) ioctl(r2, 0x6, &(0x7f0000000240)="c626262c8523bf012cf66f") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$getown(r1, 0x9) getpgrp(r4) getsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0xe14e}, {}, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x3) recvfrom$unix(r1, &(0x7f0000000280)=""/160, 0xa0, 0x10000, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback=0x7f000001, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4e24, 0x1, 0x4e22, 0xb7b, 0x2, 0xa0, 0x20, 0x1e, r2, r3}, {0x8, 0x4, 0xffffffffffffffff, 0x1000, 0x2, 0xffffffffffff67eb, 0x8, 0x80000000000}, {0x7fffffff, 0x9, 0x7fff, 0xb67}, 0x8000, 0x6e6bb3, 0x2, 0x0, 0x2, 0x2}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d2, 0x33}, 0xa, @in=@loopback=0x7f000001, 0x3506, 0x1, 0x3, 0x2, 0xffffffffffffff7d, 0x101, 0x3}}, 0xe8) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000340)=""/111) sendto$inet6(r0, &(0x7f0000000140)="4db9f03da4aa11989a34086f4be8463a6e5a878ca5203c2a317b145855bf30d5eb163be97ddc6b7f46e88eddee28fe1fbdbf0a17de7086cf5d28275e051aa8b94d58fc120380e0da981838e1291552e4097276da551dc46574edfbee98b149ce83821422dd6cb5398c457e6bbd15335004ebe82f0e713d236fc3af3dfa3c44e2c446a4f7c114579140ace87a207b7ba697366360152dcdee859efcf4bc22db1fc18240aa4961198595837924bcf840dc2be32841265e290e462575efce0b12aea2dd7a066e5d0865b20d91540cf8c678d42972e9fd9a6b2b7a728532ce0f3bf60f107b7ba1c61d50c4c84ccb354526", 0xef, 0x20000005, &(0x7f0000000240)={0xa, 0x0, 0x4, @loopback={0x0, 0x1}}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f00000003c0)={0x0, 0xfffffffeffffffff, 0x4, 'queue1\x00', 0x9f3}) 2018/05/18 19:43:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) listen(r0, 0x100000001) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x181000) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000140)={0x588a3ca2, 0x0, 0xfffffffffffffff8, 0x8, 0x7fff, 0x4, 0x4, 0x0, 0xfffffffffffffb83, 0x3, 0x3, 0x8}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getpeername(r1, &(0x7f0000000a80)=@can={0x0, 0x0}, &(0x7f0000000b00)=0x80) r3 = geteuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b40)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e24, 0x7, 0x4e22, 0x3, 0xa, 0x20, 0xa0, 0xff, r2, r3}, {0x400, 0x1, 0x8, 0xda21, 0x54f, 0x8, 0x2f0df28d, 0x81}, {0x60000000000000, 0x3f, 0x400, 0x80000001}, 0x40, 0x6e6bb7, 0x0, 0x0, 0x1, 0x3}, {{@in=@multicast1=0xe0000001, 0x0, 0x3f}, 0x0, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x34ff, 0x4, 0x3, 0x200, 0xffffffff, 0x1f, 0x5}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000140)=0xc) 2018/05/18 19:43:19 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = dup2(r0, r0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) listen(r0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$lock(r0, 0x5, &(0x7f0000000140)={0x2, 0x4, 0xffffffffffffe3a8, 0x6, r2}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000180)={0x0, 0xa7, "7a86c09df9d45839b921e18d6b7f11b1a5aa12ed59ee63d6d95a2f9ea58334d917ac4da970aeab80896bec39e9651e5e3e73f46f93d38a5bacb049266cce4936c39d49600464d5a4452f5c8b876f64cb1ff67ac05a9617f17c283a0b587314c9206ee878608fdeeacf4dbc7cc9c20a519a06acd624b3347ec10793052cf1707ed24ea602a325b89a9266436fcbb10b69f55617b2687e3c636e1f53ed2e1b9361ab64f518485c47"}, &(0x7f0000000240)=0xaf) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={r3, @in6={{0xa, 0x4e21, 0x3, @mcast2={0xff, 0x2, [], 0x1}, 0x6}}, 0x3, 0x31f183f3}, 0x90) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r4, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r5 = openat$cgroup(r1, &(0x7f0000000500)='syz1\x00', 0x200002, 0x0) fstat(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000005c0), &(0x7f0000000600)=0x0, &(0x7f0000000640)) fstat(r4, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) ioctl$TIOCCBRK(r5, 0x5428) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0, 0x0}, &(0x7f0000000880)=0xc) sendmsg$unix(r1, &(0x7f0000000980)={&(0x7f0000000340)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000004c0)=[{&(0x7f00000003c0)="3abe3d3f27a583e73658fb41877c1ea14bac6c9bab3727d558b134ed9de1ab53ff7d79574c228b6914d8f80955cd33131e0ba50b2dfdfcf35ad2f36128c6e2e2371075836d495d4e74621240c15afdefe39bcdcc7faa47516421dff735d31b1844d65b494bda30712208bf65db8223550c7138e12ba8859a7dc418996d195cd6c214b23f7e33c3a31417ee4ab01c6e6d4f54cfad93bae53e93681290ba432cb19e1eb598e1ba6d4987dff6254099907d3f41bbc934ed527677d45ad37e280daaa43a45411af8d172c074af742a31bc6338da02", 0xd3}], 0x1, &(0x7f00000008c0)=[@rights={0x30, 0x1, 0x1, [r0, r0, r0, r4, r4, r0, r5, r0]}, @cred={0x20, 0x1, 0x2, r2, r6, r7}, @cred={0x20, 0x1, 0x2, r2, r8, r9}, @cred={0x20, 0x1, 0x2, r2, r10, r11}], 0x90, 0x40000}, 0x4000000) [ 442.604167] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 442.631855] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 442.632399] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 442.675239] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 442.690991] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 442.692285] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 442.713622] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:20 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendfile(r0, r0, &(0x7f00000002c0)=0x4f, 0x7f) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) modify_ldt$write2(0x11, &(0x7f0000000340)={0x6, 0x20000000, 0x0, 0x3, 0x9, 0x80000001, 0x1, 0x7, 0xf16c}, 0x10) ioctl$TIOCCBRK(r2, 0x5428) sendto$inet6(r0, &(0x7f0000000140)="17ae411fbff4cdb0e3a788393ffc8be3619abe59d0ba02c822616e9649da569a3de2069852d16bdf4d067d0ee81d07e8dd39b8fedcadbbb8bebc418f3b068b96db8eb0e2f49e8b1a7ccd098105467e2713bf95cc72ca1e2940154cd4a005494bc9b723a242f92e70c831a40b97289b3e26", 0x71, 0x20000005, &(0x7f000031e000)={0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000300)) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x7a, "a92f517434bab39662e708bc8d087cb04908c44ea29b88bbb2792ddf9518a2b0382cc99c738f83de77ebb6e8b54f15deda343f59978ab384d037ab6d9d3f847a50e2476114eda6a9384b951d8433e848605fc0b00bcf2ec097e14bbbfb411b5ae9eaa0982fca97c9eb2f4330fe5a12246b3719323a9245b27b29"}, &(0x7f0000000280)=0x9e) 2018/05/18 19:43:20 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101800) ioctl$sock_ipx_SIOCAIPXITFCRT(r2, 0x89e0, &(0x7f0000000140)=0x1) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140)=0x3, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e24, 0x0, @loopback={0x0, 0x1}, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:20 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x8001) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, &(0x7f0000000200)=0x80) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) bind$ax25(r1, &(0x7f0000000140)={0x3, {"98747132a96fdb"}, 0x6}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r3 = accept4$inet6(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c, 0x80000) r4 = openat$sw_sync(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sw_sync\x00', 0x200100, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000280)={0x5, 0x80000001, 0x5, 0x0, 0x7}) sendto$inet6(r3, &(0x7f0000000040), 0xffffffffffffffa1, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22, 0x83, @empty, 0xffff}, 0x1c) 2018/05/18 19:43:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000000)={'ip_vti0\x00', 0x9}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x400100, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0xf68c, @empty, 0x3}], 0x1c) 2018/05/18 19:43:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1002, 0xfffffffffffffffd) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e22, 0x1, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, {0xa, 0x4e22, 0x7, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x3}, 0x2, [0xaab9, 0x5, 0x2, 0xffffffff, 0x40, 0x1, 0x9, 0xd81f]}, 0x5c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r5 = dup3(r1, r2, 0x80000) ioctl$KDSETMODE(r5, 0x4b3a, 0x2) rt_tgsigqueueinfo(r3, r4, 0x3f, &(0x7f0000000080)={0x1a, 0x3ff, 0x1f, 0x4}) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r6) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@loopback={0x0, 0x1}, @in=@loopback=0x7f000001, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) 2018/05/18 19:43:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) vmsplice(r0, &(0x7f00000007c0), 0x3, 0x8) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000480)={0x0, 0xc, "35dee8de73429b2766c972c6"}, &(0x7f00000004c0)=0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000500)={r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x9, 0x6, 0x40, 0x7e}, &(0x7f00000005c0)=0x98) listen(r0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000600)={{0x0, 0x1, 0x4, 0x3, 0x100000001}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r4, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x541000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) getsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000003c0), &(0x7f0000000400)=0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e23, 0x101, @mcast2={0xff, 0x2, [], 0x1}, 0x787}}, [0x0, 0x8, 0x1, 0x7ff, 0x2, 0x7fff, 0x0, 0x1, 0x7, 0xcf65, 0x0, 0x7, 0x7f, 0x3d, 0x5]}, &(0x7f0000000380)=0x100) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000800)={'HL\x00'}, &(0x7f0000000840)=0x1e) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r7, 0x40087703, 0xfffffffffffffff8) 2018/05/18 19:43:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x40000000000a, 0x0, 0x0, 0x0, r1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x34d) [ 443.678505] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 443.696455] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x100, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000280)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, &(0x7f0000000140)="392e6d96e4daf69dd1665f3c6ce93c1d5d026de969051e2af85d62613dd4fa2cda286a23035aeee9e902b3e49169519a5dfe2322feccae493e970d729011029626fc1d922c520629c735f5b2f51b0f533adb28d0229fac63da61bb0c7160fb0a152eabbd8d9d176aa1ba78108f6aa3397274736982df37057a629a44ed69ab54cfb4ebc473", 0x85, 0x20000080, &(0x7f0000000200)={0xa, 0x4e23, 0x2d, @loopback={0x0, 0x1}, 0x3}, 0x1c) 2018/05/18 19:43:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$notify(r0, 0x402, 0x20) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000140)=0x2, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7, 0x3}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) 2018/05/18 19:43:20 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 443.730724] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 443.749684] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 443.770553] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in=@broadcast=0xffffffff, 0x4e20, 0x0, 0x4e24, 0x8, 0xa, 0xa0, 0xa0, 0x0, 0x0, r1}, {0x20, 0x400, 0x8001, 0x564, 0x2, 0xba84, 0xfffffffffffffffc, 0x8}, {0xc60d, 0x1f, 0x6, 0x8}, 0x5, 0x6e6bbe, 0x2, 0x0, 0x3, 0x1}, {{@in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x4d6, 0x3c}, 0xa, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0x3503, 0x2, 0x3, 0x8, 0x3, 0x3f, 0x8}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:20 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000)={0x1, 0x1000, 0x2, 0x800000000000, 0x5c}, 0x14) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 443.786517] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 443.791192] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 443.797195] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 443.827284] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40) setns(r1, 0x0) listen(r0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) socket$inet6(0xa, 0x3, 0x6) 2018/05/18 19:43:21 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_buf(r2, 0x0, 0x2e, &(0x7f0000000140)=""/86, &(0x7f00000001c0)=0x56) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x4000, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000140), 0x2) r2 = socket(0xa, 0x8080a, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:21 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sw_sync\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x8, &(0x7f0000000180)=[{}, {}, {0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000200)={r2, 0x2a}) listen(r0, 0x0) fcntl$setsig(r1, 0xa, 0x0) socketpair(0x10, 0x80000, 0x9, &(0x7f0000000240)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) umount2(&(0x7f0000000000)='./file0\x00', 0x1) 2018/05/18 19:43:21 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x80000, 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000200)) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = dup(r2) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000000)={@empty, 0x0}, &(0x7f00000002c0)=0x31f) bind$packet(r3, &(0x7f0000000180)={0x11, 0x0, r4, 0x1, 0x100, 0x6}, 0x14) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000280)={r5, 0x8}) 2018/05/18 19:43:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000140)=""/195, &(0x7f0000000000)=0xc3) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) socketpair(0x1d, 0x6, 0x8c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000140)={0x6, 0x6dc273de, 0x6, 0x2, 0x3, 0x3e}) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 444.619692] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 444.620986] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 444.636736] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 444.654317] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 444.659084] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e24, 0x4}, 0xfffffffffffffed2) getpeername(r0, &(0x7f0000000140)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, &(0x7f00000001c0)=0x80) sendto$ax25(r1, &(0x7f0000000200)="fff9f13f6c8364cd0889cbd0185ff2ff41c9f299cc27e8e619b4c5c1cc8d3135956a7c9cea0fdb6cb0582fcb3545d1e308e90609e5a4c8805817c45244b1d022a380df9721eef56904c91a7adf00853327a54ac84eefe362a69df8311d047ff10d10a065c7329e585c57fea0ec2ccbac3bb479a178258c4d54028b9d", 0x7c, 0x5, &(0x7f0000000280)={0x3, {"9679aeb9ae2d9d"}, 0xb8e}, 0x10) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xa400, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x40, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000140)=""/178) ioctl$TIOCSCTTY(r2, 0x540e, 0x3fc0000000000000) 2018/05/18 19:43:22 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x63}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x3502, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000280)="797c0caf0cca44e0f00c5c47f0b5c639abeff6f0811f99a8e97517d460d563b434d9e86e597a12ede953b1daa8e64a96f5f9f4d1561e2d2d12b3e1dade9000a9a5222e7119ed8c5ac98ec5aea702bf9c6a61439570acd9e7ee366d7840f5f3189e134ad43d3708c241e31daa74f6bf3cd36e875ccb451f2489c70c57e80143572f918694100a52478525a9c5ea36bf7de01fb9d1bff8ae71de1cd76b46de3175ca43c24e1e61a34fefde4b944d42", 0xae, 0x8000, &(0x7f0000000000)={0xa, 0x4e21, 0x7ff, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x3}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="af63505b2ee1abdf1b823dd37ff7878b182be75bd0580835cfe05095c2aa4cc8bddb900ec6e352f70b23801b01418485b8c41f7ca6573b33cefebb3452ee9171a57564e1d0f3954a7f4b27d0", 0x0, 0x20000005, &(0x7f0000000240)={0xa, 0x4e22}, 0xfffffffffffffffa) socket$inet6_tcp(0xa, 0x1, 0x0) 2018/05/18 19:43:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000140)={0x2, 0x4, 0x1}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x200000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000001c0)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) r2 = socket(0xa, 0x2, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x402200, 0x0) 2018/05/18 19:43:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101, 0x0) ioctl$TIOCSCTTY(r2, 0x540e, 0x3) 2018/05/18 19:43:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@ipv4, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KDENABIO(r4, 0x4b36) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in, 0x4e20, 0x7ff, 0x4e23, 0x0, 0x0, 0x80, 0x80, 0x3f, r2, r3}, {0x4455, 0x48, 0x0, 0x1, 0x7, 0x3, 0x601b, 0x8}, {0x1f, 0x4, 0x60, 0x4}, 0x7fe, 0x6e6bb9, 0x1, 0x1, 0x3, 0x3}, {{@in6, 0x4d6, 0x3f}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x0, 0x3, 0x4, 0x200, 0x2, 0x1}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:22 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:22 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffffffffffd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:22 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e20, 0x100000001, @dev={0xfe, 0x80, [], 0x17}, 0x5b}, {0xa, 0x4e20, 0x3f, @mcast1={0xff, 0x1, [], 0x1}, 0x7}, 0x9, [0xff, 0xf5, 0x3, 0xb39, 0x0, 0x2, 0x1, 0xffffffffffffffff]}, 0x5c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000000)=@buf={0xed, &(0x7f0000000140)="f18b139424ab23258f43d38e928792aad3850ef7f1acd67103303141f6a19932c365831d840b29c3c815865ea82d47eadfec33e748285d2c6628c6e4508add83d89972e23ddf35ecdea6cadd80dc07103e966b9753a9d89eae323a259c7137bc18396239d92713be2e5da2dde9fa3435bad2721970e55412b5f0fa83018715988755f189e393e88bfeb8b5e7601ec159c67614bb062726681b94311e64776cd83544c010552916572825479c8860b340c0445d26fd0d56e6896ac230323bf9ea6916e556397896c75dc0231bcb0d0545739926bf04d0cdd5494c3119c8e723aef7d966c14091c60d2507f64153"}) 2018/05/18 19:43:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) r1 = socket(0xb, 0x1, 0x1000) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$sock_int(r1, 0x1, 0x26, &(0x7f00000000c0), &(0x7f0000000000)=0xffffffffffffff64) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000140)=0x4) sendto$inet6(r0, &(0x7f0000000180), 0x0, 0x20000007, &(0x7f000031e000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x15}}}, 0x10) [ 445.555147] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 445.569753] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 445.577290] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:22 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001240)=ANY=[@ANYBLOB="2f10d0f14d000000d1d4a7e35d5fe1c9eff20451c41eac82d2b173015d2101edff2b000000000000000125932fb2944bee7e258da19d586328a697142f7a1ab099b6"], 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) openat$full(0xffffffffffffff9c, &(0x7f0000001200)='/dev/full\x00', 0x8000, 0x0) r3 = add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000200)="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", 0x1000, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000000180)=')[\x00') 2018/05/18 19:43:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000140)={{0x3f, @broadcast=0xffffffff, 0x4e21, 0x0, 'dh\x00', 0x21, 0x9, 0x57}, {@loopback=0x7f000001, 0x4e24, 0x2, 0x80, 0x8000, 0x7fffffff}}, 0x44) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80, 0x98) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000640)={0x0, 0x800, 0x612}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000006c0)={r3}, &(0x7f0000000700)=0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8100}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x50, r3, 0x0, 0x70bd2b, 0x25dfdbfb, {0x3}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xa459cfb013f1af01}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000010}, 0x800) [ 445.599825] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 445.613740] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 445.664321] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 445.678106] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 445.679989] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 445.704482] IPVS: set_ctl: invalid protocol: 63 255.255.255.255:20001 dh [ 445.716640] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 445.754760] IPVS: set_ctl: invalid protocol: 63 255.255.255.255:20001 dh 2018/05/18 19:43:23 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x0, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x121802, 0x30) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000140)={0x1, 0x8ce4, 0x3, 0x8, 0x8001, 0xfff, 0xfff, 0xe9, 0x4ca1, 0x8, 0x36, 0x10000}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) umount2(&(0x7f0000000000)='./file0\x00', 0x2) 2018/05/18 19:43:23 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mprotect(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x1000002) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socketpair(0xf, 0x80005, 0x8001, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$ax25_buf(r1, 0x101, 0x19, &(0x7f00000001c0)="cb11ca2c6df997f10f545829a23da39818e14d0a6a2ffea9257b69159fb2c0670200c230650fa5d3461eb587752095c3320ab02dece68a0dddb437943e96438800b6f5dd2da7d55fe0d51f371ee51aca979e577b94e625cdf6f9a49e68643935a41ef076555694ecbfe67a34316000e1", 0x70) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f0000000140)={0xa, 0x4e22, 0x10000}, 0x1c) 2018/05/18 19:43:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x13}}, 0x1c) 2018/05/18 19:43:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket(0x11, 0x3, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@loopback={0x0, 0x1}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = dup3(r0, r0, 0x2000007ffff) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x3}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000200)={r2, 0x7a, "c2a6dd8a8f68733855782a4f9de2e77301391150bf8c60aadf015f43990506244140838c622ae44780aadb61c49056d9f51acb44b91bcddd2dbbcaf8ae57671c22ea3ee3d29ea5b34f3fcb8fc625e8d3649cc56533037a324e877f40b6042db85efb839e121750510866a3da90102e026d45987c4b6f376feba1"}, &(0x7f00000002c0)=0x82) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000140)={r3, r4/1000+30000}, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r5, &(0x7f0000000040), 0xfdd3, 0x20000008, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @empty, 0x4}, 0x2) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000340)=@hopopts={0x7e, 0x14, [], [@ra={0x5, 0x2, 0x7}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @calipso={0x7, 0x40, {0x100, 0xe, 0x9, 0x0, [0x5, 0x7fff, 0x1ff, 0x6, 0x4, 0x1, 0x2]}}, @generic={0x100000001, 0x57, "d842541d4051096e019984004c6f07cf8d4adb1e033275bac0a4a8c58dafa12e5c442abd8cfaa27db26a04a5a67df0e9ea05023f9fa16dc8f42e7801d4785f3af6ba94dd6d76a885a94684f2331fd462ea538aa97ae449"}]}, 0xb0) 2018/05/18 19:43:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x80000) ioctl$TIOCCONS(r2, 0x541d) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getpeername(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, &(0x7f0000000000)=0x80) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000001c0)) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000140)={0xec7, 0x1, {0xffffffffffffffff, 0x0, 0x0, 0x3, 0x2}}) 2018/05/18 19:43:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x40) ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, &(0x7f00000012c0)={0x3, &(0x7f0000000140)=""/12, &(0x7f0000001240)=[{0xc0bc, 0x5a, 0x7, &(0x7f0000000180)=""/90}, {0x0, 0xd, 0x5, &(0x7f0000000200)=""/13}, {0x3, 0x1000, 0x101, &(0x7f0000000240)=""/4096}]}) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e24, 0x2000000000000000}, 0x1c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000001300)={0x0, 0x2, 0x30, 0xb062, 0x3}, &(0x7f0000001340)=0x18) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000001380)={r3, 0x5}, 0x8) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x0, 0x4) ppoll(&(0x7f00000023c0)=[{r1, 0x11}, {r1, 0xc497b129c9f09da8}], 0x2, &(0x7f0000002400), &(0x7f0000002440)={0x5}, 0x8) setsockopt(r1, 0x5, 0x16de, &(0x7f00000013c0)="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", 0x1000) 2018/05/18 19:43:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000000)=0x3, 0x4) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockname(r1, &(0x7f0000000140)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff}}, &(0x7f0000000000)=0x80) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e23, 0x87, @remote={0xfe, 0x80, [], 0xbb}, 0x6}}, 0x1000, 0x5, 0x800, "dd320c26789f77581d91972243d2285f9891dec8c629c2a01e2ae02b3ad3c203923359273861bf473c018a2df27f666a9b0409a63bedee4b7a7d48c9f1d01bb3716b31dcf708c0711186af77c2f93cfe"}, 0xd8) [ 446.505226] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 446.511477] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 446.529794] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000140)="21bfbe35f67d193c92783e91a39e0c0c2eb968ff79a0aeb42d53cf3c53a93bf488aa698a28893c6dfca646b9022e0419f4f13f3e3b9397506fdbeaf141f07133c62b2033621d059b82e2839a0f80e8ea997842cd553451e9ac4e85202e5115fd688adbddd351d6b70b429760c030394b67277cd9330838f2b34102427e0aa1fda9c722fe2835481c00593f51261f6bd3bc01b0a72284812226922c6071f0c71a9241a287e3f3432ae7fb219fd7983ed4ad1913a5f34b8ce5e59514916238d2bc3a8085cc9ac1523e26ef5eac5fcd343d643676986181d39ad529b625ce4c50576ed8bf9d8f980466479253695d962786d5dce0", 0xf3, 0x4000040, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x200}, 0x1c) listen(r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x4}) epoll_wait(r2, &(0x7f0000000000)=[{}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'ipddp0\x00', {0x2, 0x4e22, @multicast2=0xe0000002}}) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000140)={0x8, 0x3, 'client0\x00', 0xffffffff80000005, "039ff240f485813b", "176755e007202b7ecf307ef48a09eb6c8e0df414f54216a61492511976240d21", 0x6e, 0x8}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty, 0x4}, 0x1c) 2018/05/18 19:43:23 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x800000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 446.571067] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 446.572419] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket(0x11, 0x80000, 0x8) bind$netrom(r1, &(0x7f0000000140)=@full={{0x3, {"1d313e83a9b9d4"}, 0x4}, [{"a6789a1ab24a64"}, {"10c5b5bb7b477e"}, {"41c4a24c2288d7"}, {"74d4a3ffc70233"}, {"25bf2b9aa7ebbe"}, {"ce10090d09022f"}, {"ee628e9aa72d6b"}, {"1653dd35834b64"}]}, 0x48) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udplite\x00') openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x40) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090468fe0700000000000000ff3f03000000450001070000001419001a000400020007000a000200000800005d14a4e91ee438", 0x39}], 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000140)={0x0, 0x0}) socket$key(0xf, 0x3, 0x2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000001c0)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000200)={r3, r4, 0x7}) 2018/05/18 19:43:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000180)={{0xa, 0x4e23, 0x20, @loopback={0x0, 0x1}, 0x3ff8000000}, {0xa, 0x4e22, 0xc945, @dev={0xfe, 0x80, [], 0xd}, 0x3}, 0x1, [0xf9, 0x66, 0x6, 0x2, 0x3ff800, 0xfffffffffffffff7, 0x5, 0x3]}, 0x5c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000280), &(0x7f00000002c0)=0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000300)={0x3}, 0x4) accept4$ax25(r1, &(0x7f0000000200), &(0x7f0000000240)=0x10, 0x80000) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000340)=0x439c) 2018/05/18 19:43:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @empty, 0xfffffffffffffffc}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) mknod(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ntfs\x00', 0x10b000, &(0x7f00000001c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0xf0a, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0xe3}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:24 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x11}, 0x58, 0x0, 0x3, 0x0, 0x1, 0x8000, 0x6}, 0x20) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:24 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x0, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80000, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000140)=""/43) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) socket$inet(0x2, 0xa, 0x9) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = accept4$ipx(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) accept4$ipx(r2, &(0x7f0000000140), &(0x7f0000000180)=0x10, 0x80800) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x5a2a4552) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000440)=0x14, 0x800) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000480)=r3) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x14a02, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) [ 447.449314] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 447.452122] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 447.454860] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 447.459424] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = fcntl$dupfd(r0, 0x403, r1) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) accept4$llc(r2, &(0x7f0000000140), &(0x7f0000000180)=0x10, 0x80800) [ 447.497345] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 447.501961] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 447.520551] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 447.526061] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 447.569771] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) recvfrom(r0, &(0x7f0000000140)=""/213, 0xd5, 0x10000, &(0x7f0000000280)=@vsock={0x28, 0x0, 0x2711, @reserved=0x1}, 0x80) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000000)={0x2dc, 0xfff}) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x7) 2018/05/18 19:43:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80f, 0xff1) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r3 = dup(r2) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f00000001c0)="7d9cb6faaf2c4a9dc8fba250c07d04e9", 0x10) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0xe) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r4}, 0x8) 2018/05/18 19:43:25 executing program 6: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x7f, @broadcast=0xffffffff, 0x4e22, 0x0, 'dh\x00', 0x0, 0x7, 0x8}, 0x2c) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000340)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$getflags(r1, 0x40b) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x4}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x7, 0x8000, 0x3, 0x70ab9eeb, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e20, 0xff, @remote={0xfe, 0x80, [], 0xbb}, 0xc8d4e0b}}, 0x1, 0x8}, &(0x7f0000000300)=0x90) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x7f, @empty, 0x40}, 0x1c) 2018/05/18 19:43:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x10080, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000140)=0x17, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) write$selinux_create(r2, &(0x7f0000000140)=@objname={'system_u:object_r:dhcpc_var_run_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x32, 0x36, 0x20, './file0\x00'}, 0x40) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:25 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x0, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffff0001}, {0x0, 0x6}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x9, 0x7}}, 0xe8) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) [ 448.373551] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 448.387585] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 448.387704] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 448.390116] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x80000001, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x2840, 0x0) bind$netlink(r2, &(0x7f0000000700)={0x10, 0x0, 0x25dfdbfb, 0x800}, 0xc) 2018/05/18 19:43:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x100000000, @dev={0xfe, 0x80, [], 0x21}, 0x98}, 0x1c) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000240)={@empty, r1}, 0x14) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x80, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) listen(r0, 0x0) r2 = memfd_create(&(0x7f0000000040)='-lo\x00', 0x3) ioctl$TUNSETLINK(r2, 0x400454cd, 0x336) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r4 = dup2(r3, r0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000000)=0x4, 0x4) ioctl$DRM_IOCTL_IRQ_BUSID(r4, 0xc0106403, &(0x7f0000000080)={0x0, 0x7, 0x3ff, 0x3}) [ 448.397855] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 448.434778] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 448.457549] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f0000000180)=0x1e) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000600)={&(0x7f0000000280)={0x350, 0x6, 0x2, 0x100, 0x70bd2c, 0x25dfdbfb, {0xf, 0x0, 0x5}, [@nested={0x1a4, 0x7b, [@typed={0x8, 0x16, @u32=0x4}, @generic="153c86a794fc85f4843684e14509b0d36b898dd8fbac069fcd370a8177cd84719027c6cda88c7b8516d2309093b132125124b4486f9013b92ec9964c7fef093db23bc68629d63ba83aaa4aec3b9621322df3f9da22d88bebdf1fd08bdbffa0048ebf0a0e7f131ae103ec69cd69cfa86e400aec70a9449fecd6d5b57ffe0fbb6de33e961678cb8707fadfea3acc95118ca071fae36d346465b75926815772b99673c4c73508a3ab050fc5a77d092aa23752403ce754d2e902ad62a7323e2fc466f21d06a5388974b348", @typed={0xb0, 0x39, @binary="15b4f884256bc6dc9992db0fc2493d9e160f971e1ad516ef2890d60abbd4c620c6362a4f1ca25eeb9077ee160f170494b56ea57ecada4822b2ca3cc0e487705eb2327f74a4d1039afceca1baac815d00e339b36933e763dbd189a7883ea8a300b5b2f3248e2b4e212ad476e57a834cda4e59d9e3f06ab4775f1a4310743e58b982fd740afaf186eec6c313b2935d95de2c7fc6d8ce6a4b0923c891d5a9727b7ab1ef12eac45d7b5319466b67"}, @generic="89585d3ad765c70771d11f3cbb59d802aee793bdde7d98a125f948a1"]}, @nested={0x198, 0x5c, [@typed={0x98, 0x34, @binary="ce49bcd00974b93382bbec77078d64252435c6600e3e439ba711cfbad734d3e6d348ffce11a28c80a82df03ca6ac0e6758503245cb215622fe46e0f59a20d50356534380d7c706eacfb35ca15f961c1b023baa1289db734be644cf5df4bfc4e3162fd5261ba84c4d7bd8b0e112a1ac6bad82c53b9b677f3bf98d0e68be68bd783deb51ff8fa0317d962dc81631fe29956a6e"}, @typed={0x8, 0xc, @ipv4=@dev={0xac, 0x14, 0x14, 0x1a}}, @typed={0x8, 0x3a, @uid=r3}, @generic="db368f9e992f9d3f6c5941e5cb4cfde34fe2188d9459b89b771a07f53606e51a54f02c852c988f1cc578ac9c128b046db247f67b0ed17782e001d9ea90ce68296ad438462c7595e510c9424eef24ee1c0b9ddd83b3955a4b3f01a6e82ac0bd724123022a2a2c82f4fd0d69c4219c35c3be41aa627fb3f96e4a4bb25b50f9adfbdd5916b9ba91aea0907b9cbdb6ea9e", @typed={0x8, 0x2a, @fd=r0}, @generic="457e440f1571eaafe29b7e70eeec3d5875300db17bababc17afa64fc6c8ae31d3ebac2e9c74866947b49d95881617b4a60062d5bd48c681d2b08a55b8e4c836f1965b720a52704d2d106c5495ba0982f52118f"]}]}, 0x350}, 0x1, 0x0, 0x0, 0x40040}, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}}, &(0x7f0000000740)=0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000780)={r4, 0x8}, 0x8) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000007c0)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000800)={r5, 0x1}) 2018/05/18 19:43:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0x6, 0xa, 0x4) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x400, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000140)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000180)={0x9, 0x5, 0x262, 0x5, 0x1, 0x2}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000fff000/0x1000)=nil, 0x1000}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000200)={0x0}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000400)={0x74, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0e630c400300000001000000000000000b63000009631040", @ANYRES64=r5, @ANYBLOB="02000000000000000c6300000163404001000000000000000000000000110000273ff3fbf64159707700000000000000000038000000000000000000000000c0c9eadbc28cf35b50c85662a437ced9900fe66683fd888b7296626c46b5bff5c12dd25c2948192860acb93281360a36c201fa76dbeb2797de3359185b97f1c181d5dc3e2371478e049fbfd30c87f7f176", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="0000000002000000000000008561646600000000040000000000000002000000000000002000000000000000"], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x00x\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00x\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00h\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\vc\x00\x00'], 0x2e, 0x0, &(0x7f00000003c0)="8e88dde52db6c85b95395dfeea145a4087a7fa8f2023f8042a703f7c6892185f9c732eb5210875a0acf9472714f9"}) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r4, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000140)=0x30) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000180)={@mcast1}, &(0x7f00000001c0)=0x14) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=[&(0x7f00000001c0)='/dev/nbd#\x00'], &(0x7f0000000480)=[&(0x7f0000000240)='/dev/nbd#\x00', &(0x7f0000000280)='}B.!\x00', &(0x7f00000002c0)='/dev/nbd#\x00', &(0x7f0000000300)='/dev/nbd#\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='/dev/nbd#\x00', &(0x7f00000003c0)='/dev/nbd#\x00', &(0x7f0000000400)='/dev/nbd#\x00', &(0x7f0000000440)='/dev/nbd#\x00']) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x80040) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000007, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 448.460633] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 448.474577] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:25 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0xfffffffffffffd35) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000140)=0x0, &(0x7f0000000180)) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, r2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x1, 0xffffffffffffffff}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x3505, 0x0, 0x0, 0x7, 0x4}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 448.520663] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 448.537592] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 448.550138] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0xfffffffffffffd35) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000140)={0x3, 0x20a, 0x6, 0x0, 0x0}, &(0x7f0000000180)=0x10) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000001c0)={r3, 0x1000, 0xfff}, 0x10) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:25 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x100, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000140)) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:25 executing program 6: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000140)=[0x345, 0xa8e]) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) epoll_create1(0x100000000007ffff) [ 448.573859] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 448.592474] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 448.640664] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 448.653643] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, 0x1c) readahead(r1, 0x100000000, 0xca7) 2018/05/18 19:43:26 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:26 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:26 executing program 6: getrlimit(0xe, &(0x7f0000000240)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @multicast1=0xe0000001}}, 0x7fffffff, 0x20, 0x1, 0xf34, 0x20}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r3}, 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.current\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x3, @ipv4={[], [0xff, 0xff], @rand_addr=0x80}, 0x8}], 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)=0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @empty, 0xffffffffffffffff}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x8, @ipv4={[], [0xff, 0xff]}, 0x5}, 0x1c) listen(r0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x30000, 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x9) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000000), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000140)=""/162, &(0x7f0000000200)=0xa2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:26 executing program 6: rmdir(&(0x7f0000000000)='./file0\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x26e) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x3f}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x6c}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2000000000000000}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) waitid(0x2, r2, &(0x7f0000000080), 0x8, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$EVIOCSABS2F(r3, 0x401845ef, &(0x7f0000000000)={0x4, 0x3f, 0x401, 0x3f2, 0xff, 0xcb}) 2018/05/18 19:43:26 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x410100, 0x0) setsockopt$ax25_buf(r0, 0x101, 0x19, &(0x7f00000001c0)="defe68ff42f46ac058a9d144465fe93eda3fcbd8c8ff0a90699371ff447cb422f5fd1d82aec063", 0x27) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r1, 0x80000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000140)={0x1000000000000009, 0x100000001, 0xffffffffffffff80}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x9) socket(0xe, 0xb, 0xd89) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) [ 449.322797] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 449.328773] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 449.334034] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 449.362789] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:26 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_1\x00', {0x2, 0x4e22, @multicast1=0xe0000001}}) socket$inet_sctp(0x2, 0x0, 0x84) 2018/05/18 19:43:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) creat(&(0x7f0000000000)='./file0\x00', 0x14) [ 449.390474] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 449.415485] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 449.446461] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:27 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000140)=0x10, 0x800) ioctl$sock_netrom_SIOCGSTAMP(r1, 0x8906, &(0x7f0000000180)) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffff, 0x180) accept4$llc(r1, &(0x7f00000002c0), &(0x7f0000000300)=0x10, 0x16866b2eb046935d) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000500)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007400000011b52a4432118d4e6ddc1d68b2c3cf38741130d12c4b7baa9088342667924828cc1a057945eaac3ebc56253596109c841aa05645aa1806acbb20ce7c07702d6d1fc4cecfaf502718f7d9d91a4623ba5403789efa1be8de7fed66ee1bcd698d1c102128678ca77e86c9021034341a334c30cf8facd512154817e3b02df6016b46203013c04fce822d07c02ad11153f86ac805dcb3d69e126a2515b3757e47954fe8"], &(0x7f0000000340)=0x98) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) connect$packet(r2, &(0x7f0000000280)={0x11, 0x400000000017, r3, 0x1, 0xb5, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0xb) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000003c0)) sendto$inet6(r4, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000000)={0x5, 0x3, 0x200, 0x5966, 0xfffffffffffffffc, 0x1, 0x9, 0x7, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r3, 0x10001}, &(0x7f00000002c0)=0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) ioctl$fiemap(r1, 0xc020660b, &(0x7f0000000140)={0x6, 0xfffffffffffffffc, 0x6, 0x7ac8, 0x3, [{0x9, 0x6, 0x40, 0x0, 0x0, 0x800}, {0x15, 0x1, 0xe297, 0x0, 0x0, 0x1000}, {0x9, 0x69, 0xa000000000000, 0x0, 0x0, 0x800}]}) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:27 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r1 = openat(0xffffffffffffffff, &(0x7f0000002240)='./file0\x00', 0x40, 0x140) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000022c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000002400)={&(0x7f0000002280)={0x10, 0x0, 0x0, 0x40008004}, 0xc, &(0x7f00000023c0)={&(0x7f0000002300)=ANY=[@ANYBLOB="b40000c5", @ANYRES16=r2, @ANYBLOB="000126bd7000fcdbdf2506000000080006000100000034000200080005000500000008000600a909000008000300000000000800070003000000080005000000000008000800060000000c0002000800040003000000080006000100000008000400ff03000008000400050000003800030008000500ac1413aab2efb534c6b572850800010002000000080007004e22000014000600000000000000000000000000000000010800060040000000"], 0xb4}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) getsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$ax25_int(r1, 0x101, 0x6, &(0x7f00000001c0)=0x2, 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) pipe(&(0x7f0000000000)) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x2) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000240)={0x6, [0x70f9, 0x4, 0x67, 0xd7, 0x1912, 0x8]}, &(0x7f0000000280)=0x10) ioctl$sock_proto_private(r1, 0x89ec, &(0x7f0000000140)="f23c46c1a3a6b44d4c97b8ccb4c34a6583f64de138456b59f4c0ca3b6a17b8840c4189b132a9b4a6466bb7292ca2b581023e000bfbafd2cc5a37204f86d302c86469ee21c88406b3220ac65c761f4d46b4c1c31135c9ab4e278014f03bd171d8df8cc072b5fd4bc25952a6b78c0341e5febd9896da588e7928d4b162dd597bb8671bc1f6a9e6aff0588c84fddb4807f0122d1733220720033e6d527d4dbbd0403eb6638930d9fb590929a48f3ff7342bf71e754cbbd4c10d12ab433b80a255ffcd24b6e7ceafe99ce02fd90b1b1a69e124ae6f04bd2379520266b544c1ab209c15bdedd44ae3c31481") 2018/05/18 19:43:27 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:27 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000140)=""/1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @empty, 0x2}, 0x1c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x759e2a5}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000180)=r1, 0x4) listen(r0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000280)='/dev/keychord\x00', 0x200, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="580000001a0002002abd7000fedbdf251c201001ff0000010010000008000400", @ANYRES32=r3, @ANYBLOB="4808ff81", @ANYRES32=r3, @ANYBLOB="2c00010000010000000100000000000000010080000600000000000000000000000e000000f0ffff00000000"], 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) ioctl$VT_WAITACTIVE(r2, 0x5607) r4 = getuid() setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e21, 0x5, 0x4e20, 0x80000000, 0xa, 0x20, 0x80, 0x43b, r3, r4}, {0x3, 0x5, 0x7, 0xfffffffffffffffb, 0x3f, 0x0, 0x100000000, 0x5}, {0x5, 0x4, 0x7f, 0x1}, 0x0, 0x6e6bbf, 0x0, 0x0, 0x1, 0x3}, {{@in6, 0x4d6, 0x3c}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x1b}, 0x3506, 0x3, 0x3, 0x8b1, 0x3, 0x2b, 0x9}}, 0xe8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r5, &(0x7f00000001c0)="2ded7b326494beb18d461d0b97a310b96443cd014246db70b4cf9c6837c0d44123163b6ef27e76fa834dc1ba25772f5299f9f4fc4f4b098a7ca350e5f9f2a19769664da0360c91e295caa72cac85dd3294070620892eb97b6c8490b183f1640a740d", 0x62, 0x20000005, &(0x7f0000000240)={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, 0x1c) r6 = gettid() fcntl$setown(r5, 0x8, r6) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000340)={r1, 0x5, 0x8}, &(0x7f0000000380)=0x8) 2018/05/18 19:43:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x2, @mcast1={0xff, 0x1, [], 0x1}}, 0x11a) listen(r0, 0x0) finit_module(r0, &(0x7f0000000140)='@\x00', 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:27 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f00000003c0)={0xffffffffffffffff}, 0x4000) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000440)={0x6, &(0x7f0000000400)=[0x1d, 0x8, 0x6, 0x7, 0x100, 0x2]}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @loopback={0x0, 0x1}, 0x1000000000000008}, 0x1c) listen(r0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x2, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@rand_addr=0x1, @in=@rand_addr=0x2994fe, 0x4e24, 0x8e, 0x4e22, 0x2, 0xa, 0x0, 0x80, 0x2, r3, r4}, {0xba, 0x994, 0x2, 0xffff, 0x1444, 0x1, 0x7, 0x1000}, {0x5, 0x364f7dd4, 0x85, 0xa4}, 0x0, 0x6e6bc0, 0x1, 0x1, 0x1, 0x3}, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4d2, 0x3f}, 0x2, @in=@multicast1=0xe0000001, 0x0, 0xd61c60adf012cedf, 0x5, 0x3, 0x100, 0xffffffffffffff74, 0x10001}}, 0xfffffffffffffe51) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r5, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 450.285480] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 450.297527] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 450.299588] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 450.302414] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000580)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000540)={&(0x7f0000000180)={0x254, 0x10, 0x3, 0x312, 0x70bd26, 0x25dfdbff, {0x0, 0x0, 0xa}, [@typed={0x4, 0x20}, @typed={0x14, 0x5e, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @nested={0x84, 0x58, [@typed={0x7c, 0x81, @binary="e0d80098c942eb29f564977bbdbfce4a8346924bf27281845f650f5f29309f58f475c0325a004ef0ea4f958d8c81b42eb3ecc4cc509734bc040f5d49cfb21bb633c2754b0a1386231bf0dd6dfad3755db57697adad131ffea602d2ad3cd27e73941b75a6b2afdc47cb9f5fb1e67a739b8a84acf549a2da"}, @typed={0x4, 0x7}]}, @generic="badd606da0069d4f10f031dfb2e519b84bdf7f2f024e2ba55a3581b83868aabb3532393395760a917e5ac4b4639408f6332431f9509ba323ba6d13dc72908dbded666e8fb8608821f47daaf2d965b8990848bf85294aad89393b03af65c71374f54a9d9ac328f5960a238e67cce1c58be43529bffdeaa6b16b", @nested={0x18, 0x88, [@typed={0x4, 0x1f}, @typed={0x8, 0x92, @str='$+\x00'}, @typed={0x8, 0x96, @str='\x00'}]}, @generic="c1bf73", @nested={0x24, 0x6c, [@generic="746028a79ac305e792cc7b687bb5a738b8bbfc0cb437907a38676c344b"]}, @nested={0xec, 0x35, [@generic='hS', @typed={0x4, 0x6f}, @typed={0x8, 0x40, @u32=0x100000001}, @typed={0x14, 0x71, @str='\')em1vboxnet1'}, @generic="922754370e34681bee27b7f07de1cb866446b4268242d853b7760c65ec2747f30ba74298a45b4051f487a48a664cae6c178e2730b92863cfb5865bdbc349cbac052e2910784758ca9b7d23c21cf8162405f3e01384442b254c89d81bb2ca498fe23f9fbcaa59d9481879c08abe71b29c840cc1bbdae3dece4b8003ff20f2db6b4984da56f40c8602a468599bd5d409db9f2288d1c66eedfd239206eb92524c503a7e6c9b9c4baa4c4564085ecc540182b5335aceef77f031ffc5a69baf747b20fc8b6b7983ae"]}]}, 0x254}, 0x1, 0x0, 0x0, 0x4000001}, 0x4040000) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:27 executing program 3: r0 = socket(0x3, 0x800, 0x1) accept(0xffffffffffffffff, &(0x7f0000000280)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000300)=0x80) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000340)={r1, 0x1, 0x6}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0x10, &(0x7f0000000140)=0xfffffffffffffffb, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r5, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:27 executing program 7: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x101000, 0x0) connect$bt_l2cap(r0, &(0x7f0000000140)={0x1f, 0x7, {0x9, 0x7, 0xffffffffffffff47, 0x3ff, 0x7, 0x3f}, 0x6, 0xffffffff00000001}, 0xe) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000180)=@generic={0x5, 0x7fffffff, 0x3}) listen(r1, 0x9) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$session_to_parent(0x12) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000200)={@loopback={0x0, 0x1}, r2}, 0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r4, 0xc010640c, &(0x7f0000000140)={0x3, 0x6d2e}) [ 450.363002] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 450.387827] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 450.399367] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 450.425837] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$sock_ipx_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={'\x00', {0x4, 0x5a5, 0x3, "3b17b095ca3e", 0x100000000}}) personality(0x4100011) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:28 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0xd}, 0x3}}}, &(0x7f0000000200)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000240)={0x4, 0x200, 0x6, 0x3, r3}, &(0x7f0000000280)=0x10) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="aec2ee8db772e1e3dfefbe6615b28513999dc0f24a74cdc16f922b0b58fc401b2483129914057d336155ab5722a4247082bbedba9dc80cbaa8e48107e1218d3d73ecc6d8c9550f5000bc51cb17adce322708fcb83b09acc99e22584c22052f2fa0621966ff22dadbb8fb1876f62b97f49f31d7b24d21b3ad49aec61093cebe0e319de13fbc", 0x85, 0x24004000, &(0x7f0000000280)={0xa, 0x4e21, 0x7, @mcast1={0xff, 0x1, [], 0x1}, 0x9b}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f00000002c0), 0x4) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000300)=""/170, &(0x7f00000003c0)=0xaa) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/snmp6\x00') socket$nl_xfrm(0x10, 0x3, 0x6) accept4$packet(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0xfffffffffffffdeb, 0x807fe) 2018/05/18 19:43:28 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x80) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)="0ba89b8ef89a4c18e5a0feb0cfbb57f1535f5557cc9d5256ad86f73e3b070c51f6a4fbb5145bc4e1006de96d99de588a5f649cef68007120e0a89b29be0e13e21c5df5779496d4535cf0d67e7e4c83d1c734ab387bb7f5bff68ec8ffd8cc1dbc060ccc9f9e2a323d1ea6e00ed0e3cc17033a16f864e9e5294065cb7b273564197e11f0047feef6dfce5c2016687721e4ada8044f78d8c8e424370b6ac962bc4ebd141cb393a060", 0xa7, 0x20000005, &(0x7f000031e000)={0xa, 0x4e21}, 0x1c) 2018/05/18 19:43:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x42) bind$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x0, 0x1, 0x7, 0x10001, 0x100000000, "2bc7e83bd162cb67ae659b58a52038785771a0509299fb3704f1d7c07a01948186426902f7109bf139de8e46da5f935b50d21f6f252af90c8dcbf66806529b", 0x12}, 0x60) 2018/05/18 19:43:28 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}}, [0x2, 0x7, 0x1, 0x80, 0x4, 0x8, 0x1, 0x61, 0x0, 0x40, 0xfff, 0x8001, 0x9, 0x8000]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000600)={r2, @in6={{0xa, 0x4e23, 0x2d3, @mcast1={0xff, 0x1, [], 0x1}, 0x3}}}, &(0x7f00000006c0)=0x84) r3 = dup(r1) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r4 = socket(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x40, @local={0xfe, 0x80, [], 0xaa}, 0x5}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000280)={r6, 0x1c, &(0x7f0000000200)=[@in6={0xa, 0x4e22, 0x3, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}]}, &(0x7f00000002c0)=0x10) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000740)='vegas\x00', 0x6) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000700)=0x800) sendto$inet6(r5, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_group_source_req(r4, 0x29, 0x2f, &(0x7f0000000300)={0x1ff, {{0xa, 0x4e23, 0xfffffffffffffff7, @local={0xfe, 0x80, [], 0xaa}, 0x9}}, {{0xa, 0x4e24, 0x4, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x3f}}}, 0x108) 2018/05/18 19:43:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x0, 0x20000, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x800, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x48, r2, 0x100, 0x70bd27, 0x25dfdbfc, {0x2}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}]}, 0x48}, 0x1}, 0x8000) 2018/05/18 19:43:28 executing program 6: r0 = socket(0x9, 0x1, 0x6) recvfrom$inet6(r0, &(0x7f0000000180)=""/103, 0x67, 0x40, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000240), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f0000000140)) 2018/05/18 19:43:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x400, 0x8009, 0x3, 0x4, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={r2, 0xfffffffffffff000}, &(0x7f0000000200)=0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r3 = socket(0xa, 0x2, 0x0) ioctl(r3, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r4, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@dev={0xfe, 0x80, [], 0x1d}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x4}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000000)='/dev/pktcdvd/control\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x7f, 0x1, [0x1]}, &(0x7f0000000180)=0xa) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000001c0)={r3, 0xff, "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"}, &(0x7f0000000300)=0x107) [ 451.240795] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 451.246271] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 451.266790] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 451.279077] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuset.effective_mems\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x100000000}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000200)={r3, 0x2}, 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x2}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7, 0x20000000000000}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0xffffffffffffff74) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'lo\x00', 0x5a}) 2018/05/18 19:43:28 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000300), &(0x7f0000000380)=0xf4469f415f41fb92) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)={0x2, [0x0, 0x0]}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000001c0)={r3, 0x6, 0x3, 0x5, 0xab, 0x3}, 0x14) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 451.307568] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 451.311182] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 451.333669] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 451.386652] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = dup(r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa0000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, r2, 0x122, 0x70bd26, 0x25dfdbfc, {0x6}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xa9}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x101}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x70}, 0x1}, 0x80) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000140)={{0x4, 0x4}, 'port0\x00', 0x80, 0x42, 0x8000, 0x3f, 0x6a9, 0x5, 0x5, 0x0, 0x3, 0x8}) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0xfffffffffffffbff, 0x1}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000001140)={0x6, 0x0, 0x1000, &(0x7f0000000140)="816a4731e9fd9a7c5330c19bd41cc8e33b11052c1553ebbd2963fe2ed9cde79682b6dfb8c9dfac3648fcb5e43345672709c59c322cdecb3cf906ae1e90ed2f1cbe6862e9f6847102e9a605c5f433fa807da5b69dd58ee60852b4f2c4583a6242f6333f34f2944e972845ecf3ce16841e4cda97e47e21e74047a824f39b502191267c6fd2e6b93cf119e32789234603f60e414791254ad5d331efc45cac1c050fb1e3410963bd78c1a0d89f5e52b825f403819db34ad7cc6cf272d142277c251cbbde88ed53b67291ae2fac8b53ef9c50b928c8628a63b13da894d0bd17154322561063d426b965ac706576569347bb5aeb156939a137fb6af5bc73832be492b80a6c2c19237867eeb4246580f83afacf439c2d03697305b03736b9f708caaac0d5aa00270488eb1a20571b87c71dffd82fd3ddfbcf44d4e34d58c8797ea313d8aee9b06f9c6bc297d5815ed05feeca0a25f81e348d53625507b0ba147b2b2bcf0507640abb6f006239d0a423ccbfe30d0694933dbb7a6d478fe900de588f6905fad3e6d99afd2d19a48175fda15f2d6f1ec6f320525dcac4a93d675607854faafea305a2c9c4d74b2be8f6da2e1809169af4dfa7eb13ab69832bde646061af0614d0bcc03b98dcdbfd5177bb5cc8047d3a68f3f8f697fe506c46f2544911f078d866cd0afcf900c24f0638c7b14d4af7ff68b56fa2e971de3b19f5cf533531c5207d9532445f03adbd7736271b665d72897389dc378cc07da628ffc0f9e874210c8cba31a59fb9a55cce71d1a79d95e91ba5736b014317443e2d6b82ffb8edb5c7a36c0a08f8eddf4e866fb440567f35c683836d81456109ed9ee2b24aaa754c756c2a073227d0b586c84b8f30440f67e10a33795ea72c29c637ff7ef0b45566c4e64c5c1d67b1b64444ce3423c0b673ca970513b8653a271f52a005ebd07cebd880b0e9a5c45fb46bae035b890105cd4fb440db30b0cd29001dad4e14905bff4ada29d23c3aabd3af6f1fad7ae480fce0abb53be122d823832244120c7e592af9a93adab23289173394d0169b4c08ffb91ff7f354d2cd31b21462e5e4b75dfcdb4072192d1aab11b7db77488879293446be31df0910ccf51f8fba5da3418318501160dd92a91d6eac53b352af96392d49d4ef459456dd613a2c8b89e6ebc0ebf97f7a9a2466ef87a9b583ffc9bb13d8cb31dd0d420363e39cc20a9b98d20e8aa1f39da7e5e934152d531edaed4579b8e8a270937b37d807eb3fc0535adb04e512e132370249c14d80e1bec69bef8d853aa1e21ca1f14bff0e0cbe4cd73799655c7b06a27e7afd0fa87e22fff3b5dba1e4f6b53d3d071a676425c27f87b5d10ad4b3bffc4a311206faa4407a0ef89d6294dd17e54daa813abdb04e783ce4ea7acfc7854f390f3b7ca5f91fe57239ee78f1ecca8d387df732559bead79beaf706a2bfc2c0b72c1df81aa8ee90feedcef7f1bbe85e2cd8842e3d963fd7a9377f3e05027e6c77e6ebca46974b1726a8bebd80440a567490fa8ab59fa7fc64a00e119317dfec3f95192c6873f43dd631e3c054afee1c8396452ba19f85d734fb8033566063216d45b0215ad3e92601f54498fd2acfd533a666db3e2d1318c361668645a3d4163334dd34d55d1168f1efc4208a864d347b198e007bec64be7f88a55429a6acea148fd19a867dc0fea2576c60e9e0e988e7e084ebae8b316daa6901500e0efee7650dbda030afb5f3c3971db215072d1ea3775ad93dfa22312e645f6248e039354dfe60c57f8be47138f357b511d5da3db473365bcf45fe0ab6ef25c6f9a1d56f52983162e058f773d9a1b746bbe39af37084561d16c7f7032159ed18d11a8d2498d8ac349d5c43babc293460e9ba3e608e500a6fec8aaa579680d3b867bb1fbc89fda82d1e85b542496c9fc8318a0a33be0cc6cb40cb58d8f4332ebe01c6c81b372ea7fc0618e70d515e30c6f187406c32393ad0b015318c67840d95a95d08617f5114122ef180c3affc8fb05b34e9686c1096176161e6f754b2dbbe9f0521719b6aa138b6feeb2d799261718506b4eeee78726e5c901958d0b1e10e538787cf711bf6b13ecd661fb32422eaf27fa1791e3d15a8e0f1020fcec87c2f94473f2f6765c5dbbafcc1be21bce999032bfddb2699fe6ed23dd7bca9d258b330177759b8b283dfdaf245f2c0919009bcaede13766d009587a3d87f29abac8cfa7bdfe524838a50c2574205fcbfbb81f5e9ffdace1a1269e4ebd47f9ea7a404276e09776fcacdb0680c6f1c9184f8c4a4314958398030fdc9085d502d40734287f44bc260db05e0732f5c56c6c22b1f7ae924f5f4bb5ce49246f09045d09c35c970f4b7521e048068fc2c573526428ed9b3b47cf279dbc9b1d5eee463bd0e23c73a2028fd863cfe8b569fbd2937722f6d8e21a408e09642d83bd62029fac6b8d2e82821339e99cc4146b71a4e1549de39235dbb75d8f734df51e52a8019aa678dc795d4adfc71ea06f159f4fe92e807b6e17bba49f66640c81eba4046c610133faf16116af83385ec923b7a13163342941aa05f393c9d316b0b60f05bc2e19f17ba954320330e30453d979c16465dc1932899835c7f5cc84be58871695b2104622e1e4cd92ee091f4c95d0d72f65cb5d901acbeeaa6259cf66716260cb64af1667aa09bf06ae21156c07c36f1e5872f2522e7bc46b6f91ba86b337dafb4dbfd39070dbccda1f0fa40d501adba7a3186f008d082085d8df00b1253c2d808dea94af9703d7a9aa7f94f66183751038640aed26ede35c4517dc9e32e94f158f674f536aa59d3afdc9d5bbf49277e59c1b84012555b5b6e6f4ae273d31e9f5baaf33c4185dc0c89ea25265f14942710ca059c763002e44314d24cece9ada6d951880cd7531625ea2f1c3fb44c34d3a8389619f39e048adc66901605eb0c2bf42486c91be9117b30eedbfed12a13147dacd41eb933b48035dcee21474c65649275f209d35801e8215b17c50ca3a92d53f5242f5f0945e5d89cb2cfcc8507dfcbaa8dcd515a64706d85008f3b59d7b79dbf07a0448d1709f0006ab42e3fa5e19e7181aa05070c40d107bc72ea70303c6b35d0e739e2dbd7e00ad4e615559f555f7e58f5fa7f404dd50df6fc7b2fe447d1cc82db9351a9bdaa977002acb74578c4450e35f994ceba3aa5c5ad253af5571c77705d192c9f1530946fe44c508ff81a8f8a2834caa8795fefd7460ecb0844e1ea84a7f0be7756e8539cfa144477523633913fbd9f2e8821429f28eba913e51909bf172d7b5bf7bc2c075815d4762f9a600a7f4215d2a324a8a8d6cd1f392175d35eaa26d75ee97264cd2ce3fbab2dbee53a9bb38ee1b0f220e2e07b3c4bf84d992bd3858ea1f84e612336804dea703e6634d44571733d195d88450a46981d120e3ea76db094a00d9ff00bef2cb599993cd7c23688ae4a172145a74cca55ec3f5f05aa4488648c9c9a52a2fb5bda8b5d6f98ff0685bb0ab771ff9d4422c895b1155759a1b86ae67372035d13a13b9b92c232fd7c2f41149fbced307fe3a92bfff46b301db5db84b4564d30e1a2eaa9321ab1786bd6fa40052ad545e5f90b0929a08093f9b7d205074ffae99ad1a310238b347d172e3912fee2a203134c957bd876e164ae9cd4f2da9f0c8257809a6bdc8dfef5c1864f0bd45988c7a23d52cff052a01cd49d7041126e8a1ba9ebbe95cb680fa02f03e4e8d4978b2d417822bbf7c381b0cbb67225c4c56dcfca29e22549d6a503279cb48c276ba0d782b52192a8d480287349fb50a4a9738e3016728d4299d85a907f2bc48ee99dc236024032466d5a91f6ea09e42705438df3b22ee7613169d902457085e7b45f5e45a5892d81819ff7094b6b93a66940cb234b0294403fe3a9b40529d86c73013fb7ea58d85b9963778b933832150a711c7024c4479c819e703829f5ac8b71c938a111df55df0201ea5b47aeda4ada11ea9a854e6a8881957a123904a812fe4c75197e1974dda666c7cec0ebe4aa6ee44fbb59c45ac1e6acdbf87c570f979f4d31bd4dd7b7e34deb1822609b7f9f433dd41732366d5f7b7ad5e77c17d030eab599e6b230a07f4f0f005ea75acc3b71929f71b8cb59ef88033f50f93e946764ee5979de0efc2e08edd37e839370b92fc3b6acf8e4bbf3b353c23d45ed1ff84c8041ad6a37e760a143fe31ef699e295c1581bde22ffe1880090e1fd79bfb050ae6bec93faa7c818d05ee67a43ebfe70beadfac2f15c793b556e4697d8984f12faf4b11bb6915a27ee6505948a637775d7ff06b6c84f215325b99003ade4f545bb1bde6c51004a7a12be3f99cb69246de13c5947b9d3cc5770108701651654c4a78550d631b007fe0db37327d20771a155b5f165419ab3710a3e3f710d58ba0979f63326584c34e2c17c991d3000c66e5d02ed4a7f609d294c556ef1ca0a1aa748822cd223b5f0ddf0e748cb9811e1f2ad34f6b89c2542bb4cd262e97b958afde74a5ec0734a3cfd1ecb1db24ec183473e745d9144aea8a2cfeaf5ace8e67c941f666f4fec8d40d94d02860ae86ff8e83672a2d6cff034f7041730215d73d35b48956f9e09d26c29a31d5c492fc60c172d9b1e7ac64f45226902d8b1c30662a88e36d94cdc2be9b13dec92e64cd2d2e65bedf628449abaf7ad877d0850d3420141fb5f3ab9fcb6070c45184091e055597e8a56f15ad7236117a2d2969229d47a63c596a1da81ebe646e0a53dbaaf8cf8d159ba10ff75b3f6389903c5c558ceb1c54134a6f2d75449a872f762f43ea9511b41088f7ad2044ed9d50f387808c7e2f1d7140b3fcd50bd37f219d9df7eb7bbb5f23a71c8dc4e1a35a21ae9162931c6c9fedce84fe9ffa927c9ce71a7b63c7942d30feb061f58a7cace52d333483b881a5a493b0cb2d387545210ff64d2daa07150e982a6b28508869b7a4777eb6e9431d4ddc5d0c7f535f709f1a5ce213aec854fa0fc5398dafc6d981cf032764c4afcc528ff6a892fd40fa0fb01e8ce995ee3f8f657988b571efd61c0f1b84c679aea66c49996ba94cf3790966392336903696dd9723aab74c697ee329200524103b55b2e41a912e003b00e2d167290aa93186e98880e43cd31449d787dd609c287ed827570a259ad926b3e2d9e293cce96a0dbf80cf6142a7a0348869557f974547ce9ad599fb54c270d096eda919c76a91f4b1ecddf0c24c0ddcef37ee024335f3116c87c21d0da4bdda8c9ece097da978cbb641e83035b09e7573acbca51cfb66f85f958274b021a1453db92e3f9a6888b0794b89b99dc2fecb343eb097f7a23329e330d48a79085efcf67126959ee1bd9289d79fb2383320859f37d3b491f1236d40014368095e9c77b5a6bc1b5bd7abf5a566d9e132bffcef54dd3e85562b8c54338d2e4e9549411736ca961b124ae0d9d3d8499dbb1a8d667c1f3e7659ea1a8d90bd35496c517e3f43752680c697e9ec3d5e490fe45591698bff02cd53938c9e1ab64b3e8050b2de773c540a8e01e65d3aaba0b6d415b19d8468e617b3e10920016b209ac1b26cf2b891875bd42f2eed3eaf820c32653d9dfa001047616da7ea5fcf95fbae26bb182fcbe2e7d2d04b8fb37c7e1e5d702d4e17e9f45bf499fd8b16266e5d75d038cdeca3f0a73b2daf76805742a3b99ebef238c439bbbdca86f9f02d485fc571411f69d2359c13b30157d100be986c1d627faa88d3b9b20a81aa600ed53faccab0bc6db9b3377b261e536cf16338f3850a81a5e8db3fd3dd7c508856320719a7041eff4a2b6c305d409aec5ef9569e1eb3f9"}) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000140)="c58b69d68517a98f8ef780b0e6d4ce325cda4454b8996fc05c28cfb92be2aeaadf80716f1a69bf4866815864a749c00b2666c3b6ba1073c1813f41271407dc3492ac91723ee19b6711536ed05d5b51007f494b1239cce19282782f5441feece4494745db81eea6e35e4361e885fce9463cb73fb56b4760d6cfd7d41acc65f384", 0xffffffffffffffa8, 0x20000005, &(0x7f0000000000)={0xa, 0x0, 0x3, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0xb) 2018/05/18 19:43:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e24, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x3}, 0x1c) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x40, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000200)) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x3, @empty, 0x4}, 0x1c) ioctl(r2, 0x8912, &(0x7f0000000340)="c626262c8523bf012cf66f575ea43dd6333dfd824b9d3f27ec158eb0369f6423c6b986c24c41397966700689bb486f95f98dacf4d43d0b68facccdc018329428f136a9083ee1aace67df2497c1b0f4fbfaef9fdec030df049f0b994e69f0f42a0fea541ecb193cfe9e66eaab68c1fab9b42a54a588770256c74ba03fa2") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000000280)={0x0, 0x2710}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, &(0x7f0000000140)=@can, &(0x7f0000000000)=0x80, 0x800) getsockname$netrom(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x10) socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x10000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000280)={0x20000000}) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:28 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockname$packet(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000140)=0x14) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) mknod(&(0x7f0000000180)='./file0\x00', 0xc001, 0x7) 2018/05/18 19:43:28 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:28 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) restart_syscall() bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:28 executing program 5: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c, 0x800) listen(r0, 0x8) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0x5, @dev={0xfe, 0x80, [], 0x12}, 0x1}}}, &(0x7f0000000200)=0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r3, 0x2}, &(0x7f0000000280)=0x8) time(&(0x7f00000000c0)) ioctl$KDMKTONE(r2, 0x4b30, 0x7fffffff00000000) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x0, 0xfffffffffffffffc}, 0x1c) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x2000, 0x0) ioctl$LOOP_CLR_FD(r4, 0x4c01) [ 452.179999] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 452.199243] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 452.204112] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 452.204618] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:29 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000001c0)={@multicast2}, &(0x7f0000000200)=0xc) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)=0x6) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x80200, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x400, @empty, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x200, 0xd12a, 0x5, 0x7, 0x100, 0x8, 0x400, {0x0, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x8cee, 0x4, 0x9, 0x4, 0x31a}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000240)={r3, 0x8000}, &(0x7f0000000280)=0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 452.208688] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:29 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x98000, 0x0) accept4$unix(r0, &(0x7f0000000180)=@abs, &(0x7f0000000040)=0xfffffffffffffc1d, 0x80000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) socket$unix(0x1, 0x1, 0x0) 2018/05/18 19:43:29 executing program 2: r0 = add_key(&(0x7f0000000580)='pkcs7_test\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) r1 = request_key(&(0x7f0000000540)='id_legacY\x00', &(0x7f0000000600)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000640)="7115554433f4673f25aa1cd9956a0b9eea141c785f6163", r0) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r1) keyctl$link(0x8, r1, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r4 = accept4(r3, &(0x7f0000000140)=@l2, &(0x7f0000000000)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e22, 0xffffffffffffff27, @dev={0xfe, 0x80, [], 0x19}, 0xffffffff}}, 0x5, 0x7fff, 0x0, 0x5, 0x20}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000340)={r5, 0x7ffffffb}, 0x8) sendmsg$nfc_llcp(r4, &(0x7f0000000500)={&(0x7f0000000380)={0x27, 0x1, 0x2, 0x7, 0x0, 0x5, "f371aff9fc5dfc3485429d53e7f7efea79f86181e82c54e0c291ea264ddb04bc52b207502cfb5ab1c01137134a2e81d397005f39b229383eb4d6201e77a8f6", 0x12}, 0x60, &(0x7f0000000200)=[{&(0x7f0000000680)="bef1f2fbf13114ff4a8dd22e58d88c4405f79e8489747682d1552327b076f03c122e4bcbb7d4465c6436fc3afb6b2d854cc33f920c17dda1e47397eb0c5fe025db731a400ef88d6c17938df7654f869ea1fc19628450978e770c177dd52008dfdd7de87fed219ec99554bfe3c5a8b23456d786fe3638bd050df22e6ebe404c3b3557f443f8d9d0818c436236f495506df0a379aa8d999dd1e36f296481bb5865cc6e33cde2777215c926d0a75bd19edd8dd6e805495f820c967b821e4dd60dea4f41896dd43101a334b1a1d53481ba1598db7befb624c68bce0bd313ba451e2716725ba525a757113a5ba5ed7b2a", 0xee}], 0x1, &(0x7f0000000780)={0x50, 0x1ff, 0x81, "5c1b153b027664111a48087389cc0a2a10c65e080f3c9b2032a650431be2f940ec1be408f0f54b25ffd3e42110155e97c843ad264880011726da3000a69d36"}, 0x50, 0x90}, 0x40880) listen(r3, 0x4) socket(0xa, 0x2, 0x0) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000800)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VT_RESIZEX(r6, 0x560a, &(0x7f0000000840)={0x80000001, 0x1, 0x20, 0x1, 0x593, 0x8}) ioctl(r3, 0x8912, &(0x7f0000000240)="c626202c8523bf012cf66f") r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000400)='/dev/keychord\x00', 0x103900, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r8, 0xc0106403, &(0x7f0000000480)={0x80000001, 0x4, 0x6, 0xfff}) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r7, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:29 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0xfffffe2e) listen(r0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x10) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000140)=0xffffffffffff9b7c, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 452.274475] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 452.299806] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 453.005782] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) socket$inet6_sctp(0xa, 0x1, 0x84) pause() 2018/05/18 19:43:30 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8040, 0x0) accept4$vsock_stream(r2, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @reserved=0x1}, 0x10, 0x80000) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) listen(r1, 0x2) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x159100, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000140)=0x2, 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x8, @ipv4={[], [0xff, 0xff]}, 0x3}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r2, 0x1}, &(0x7f0000000240)=0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffffffffffe) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = getpgrp(0xffffffffffffffff) ptrace$getregs(0xc, r2, 0xfffffffffffffffe, &(0x7f0000000140)=""/4096) 2018/05/18 19:43:30 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x400, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000380)=0xe8) r3 = getuid() sendmsg$nl_xfrm(r1, &(0x7f0000000640)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000600)={&(0x7f00000003c0)=@delpolicy={0x228, 0x14, 0x400, 0x70bd28, 0x25dfdbfd, {{@in6, @in=@dev={0xac, 0x14, 0x14, 0x17}, 0x4e22, 0x80, 0x4e24, 0x3, 0x2, 0x0, 0x80, 0x1d, r2, r3}, 0x0, 0x1}, [@algo_auth={0x118, 0x1, {{'sha512-avx2\x00'}, 0x670, "d9e548481bcd942978b94240ef548bf6e8140a16a505a80e0fa77df8be4df38934fda21bd3a424de73e4673af7e8c443a853762bce3fd3d12796aa12722ff9df816150d804693e5a74578229d3370702a0bad21c84b3de73c93d049564377865b8dbcb3b0030438d0dfd8578419e94f848e5268e442e6d40c56bdb9e271ab1c0fad8b52ccb89a6ed942b03ee5ff12d616491603e23b9eeb934d14f893af70f0d3db3bd5359210c27d746ded1c56dbd42fa1e351c6e7f79e6e0817ecb18e234ff8636787fb9d3bd15188f0b83ebb0"}}, @sec_ctx={0x80, 0x8, {0x7b, 0x8, 0x0, 0x81, 0x73, "18f1c563a4a6b9d36786cb06e89cb13b56551471f52a427f1f655c7eddf1c20d38283f0ffda0b1515f22152d7ff5887d5c9aa911dd7b4a5b03961f28b7e46a01271772f0f8c0a789ea3f98601a40e98a97341c84d9c29407105c61f1cc3a51cf8a8ce24ffaff9e4e40f1569a47932b16ba8536"}}, @mark={0xc, 0x15, {0x350759, 0x1}}, @address_filter={0x28, 0x1a, {@in, @in6=@loopback={0x0, 0x1}, 0x2, 0x7, 0xdbd}}, @lastused={0xc, 0xf, 0x8}]}, 0x228}, 0x1, 0x0, 0x0, 0x8044}, 0x8000) listen(r0, 0x0) r4 = socket(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r5 = socket$inet6_tcp(0xa, 0x1, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r3, r6) r7 = getpgid(0xffffffffffffffff) fcntl$setflags(r1, 0x2, 0x1) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000800)=r7) getxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000700)=@random={'btrfs.', '/dev/null\x00'}, &(0x7f0000000740)=""/145, 0x91) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r5, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x8dd) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[{0x3, 0x8}, {0x7, 0x6}], 0x2) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) 2018/05/18 19:43:30 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x80000) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty, 0x80000000}, 0x1c) 2018/05/18 19:43:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x400) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x2) r1 = memfd_create(&(0x7f0000000000)='lo\'&wlan1trusted\x00', 0x1) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 453.246355] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 453.264727] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 453.277473] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:30 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000240)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x100000000004) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000140)=0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) setsockopt$inet6_tcp_buf(r3, 0x6, 0x0, &(0x7f0000000180)="c17747cac19bce80f73a4757930a8bd20fc3a19c328a6045fa51327122fa00bdd2408901d5c499b85a36c89edd20c697f2f63f19f96232936468b481e71fde8448083d26318f31b43e66b432470db1eb8a789df0e66fb8", 0x57) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty, 0x101}, 0x1c) 2018/05/18 19:43:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000180)=""/4096) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x4, 0xfffffffffffffffc}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7, 0x0, 0x80000000000000}}, 0xfffffffffffffe72) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r0) 2018/05/18 19:43:30 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="080000000687150067e978aa47f3a64e00050001"], 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000380)={0x800, 0x5e81552, 0x4}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x8c7}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={r3, 0x10, &(0x7f0000000200)=[@in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}]}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000003c0)=0x7f, 0x4) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000002c0)={0x0, {{0x2, 0x4e20, @multicast1=0xe0000001}}}, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 453.324340] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 453.349510] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 453.394562] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 453.422126] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200000, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}, 0x1}, 0x0) socketpair(0x11, 0x5, 0x9, &(0x7f0000000540)={0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000580)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f00000007c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000800)={{{@in6=@dev={0xfe, 0x80, [], 0x13}, @in=@loopback=0x7f000001, 0x4e21, 0x7, 0x4e23, 0x1, 0xa, 0x20, 0x20, 0x89, r4, r5}, {0xff, 0x3ff, 0x2, 0x100000000, 0x3, 0x5, 0x1000}, {0x1f, 0x2, 0xfffffffffffffffd, 0x9}, 0xb1e2, 0x6e6bbd, 0x0, 0x0, 0x1, 0x3}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4d5, 0x3f}, 0x2, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x3507, 0x1, 0x0, 0x8001, 0x8, 0x5, 0x8}}, 0xe8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0x20, 0x8200, 0xffff, 0x5, 0x0}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x9, @empty, 0x80000001}}, 0x4, 0x9, 0x7, 0x5, 0x2}, &(0x7f0000000300)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000340)={r6, 0x7, 0x6, 0x100000001, 0xfffffffffffffffd, 0x7, 0x9, 0x8, {r7, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0xe}, 0x8}}, 0x100, 0x1, 0x6, 0x3, 0x4}}, &(0x7f0000000400)=0xb0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x9}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) setsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000440)="0b91", 0x2) sendto$inet6(r8, &(0x7f0000000140)="2f3b437bcbebcb0a4ee84eed4f091745be8e4fa479d4ce06e9f022befa711afc2d6197524fe1703b94090039c7849116385f5af073964e115a68409a", 0x3c, 0x20000005, &(0x7f000031e000)={0xa, 0x4e1d, 0x8, @empty, 0x81}, 0x1c) unlink(&(0x7f0000000000)='./file0\x00') 2018/05/18 19:43:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0xfffffffffffffff4) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @empty, 0x2004}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sysfs$2(0x2, 0x126, &(0x7f0000000000)=""/25) 2018/05/18 19:43:30 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x29}, {0xa9}, {0x0, 0x0, 0x92f}, 0xffffffffffffffff, 0xfffffffffffffffe, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xffffffffffffff20) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:30 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) socket$nl_crypto(0x10, 0x3, 0x15) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f0000000000)={0xa, 0x0, 0x5}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x4e23, 0x1f7e, @dev={0xfe, 0x80, [], 0xa}, 0x8001}}}, 0x88) 2018/05/18 19:43:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getsockname(r0, &(0x7f0000000140)=@pptp, &(0x7f0000000000)=0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10001, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @empty, 0x10001}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) r2 = dup(r1) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000140)=0x7, 0x4) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 454.209538] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 454.225909] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 454.237862] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 454.240725] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bpq0\x00', 0x10) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @empty, 0x8}, 0x1c) r1 = accept4$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c, 0x0) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}}, &(0x7f0000000380)=0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000003c0)={r4, 0x2}, 0xc) 2018/05/18 19:43:31 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10100, 0x0) connect$unix(r2, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 454.255965] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xa, &(0x7f0000000280)=0x7f53, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000240)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = openat$sw_sync(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sw_sync\x00', 0x1, 0x0) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000300)) sendto$inet6(r1, &(0x7f0000000000), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, 0x1c) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r3) 2018/05/18 19:43:31 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000140)=0x100000001) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = open(&(0x7f0000000000)='./file0\x00', 0xc0000, 0x1) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000140)=0x7fff) listen(r0, 0x40080400000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x1000000000}, 0xffffffffffffff16) [ 454.311359] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 454.348944] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 454.349088] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 454.370191] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) getcwd(&(0x7f0000000280)=""/4096, 0x1000) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) tee(r0, r2, 0x5, 0x1) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000140)=""/95, &(0x7f00000001c0)=0x5f) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) syz_open_procfs$namespace(r3, &(0x7f0000001280)='ns/pid\x00') setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000000)={0x2c, @multicast2=0xe0000002, 0x4e22, 0x1, 'fo\x00', 0x10, 0x2, 0x1f}, 0x2c) unshare(0x8000000) 2018/05/18 19:43:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000001c0)=0x100, 0x4) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000000)={'ifb0\x00', 0x3f}) 2018/05/18 19:43:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in=@dev={0xac, 0x14, 0x14, 0x19}, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x2}, {}, {0x0, 0x72089bf2, 0x0, 0x4}, 0x0, 0x0, 0x1, 0xffffffffffffffff}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x140}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0xa0}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in6, 0x0, 0x0, 0x0, 0x4}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) connect(r1, &(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x1, 0x3, 0x8, 0xffffffffffff4672, "19cf07e276dcd937a0028cb43a7d7766ea1164f9172ed1b3d1a1016316c4dffa3d6049da5713b651944c03fdc04603cd9d33e65cc7fce7f2fec3972be384e8", 0x2d}, 0x80) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x14) r3 = mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x10, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000001c0)={0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000540)={0xb4, 0x0, &(0x7f0000000380)=[@increfs_done={0x40106308, r3, 0x4}, @free_buffer={0x40086303, r4}, @reply_sg={0x40486312, {{0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x48, &(0x7f0000000200), &(0x7f0000000240)=[0x78, 0x38, 0x20, 0x0, 0x0, 0x0, 0x78, 0x20, 0x78]}, 0x6}}, @enter_looper={0x630c}, @transaction={0x40406300, {0x4, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x28, 0x10, &(0x7f0000000300)=[@ptr={0x70742a85, 0x1, &(0x7f00000002c0), 0x1}], &(0x7f0000000340)=[0x78, 0x0]}}], 0xe2, 0x0, &(0x7f0000000440)="d35cd22d59722ee949d523ba8f1a012b404481e2ffea65bbde9595cada77ae85f48daaa1d56fe4f43d8a5cd2f3c27c884c50949c6fd2459600e77ce4d266b75afb5cd1ef0a7b65da14eb8ceba43bc004886d1403ba038accd1193f25ba239781b81ea22b529a451f38084c8acd1b5e0414c0cb182740803472261bd73d370316b2244532461c658b962adedd60ee35e1a3b2b299317578f32a0f4e57a0cbbafb1eae5485004b966b778f665060ef31949c876cffd70e0b5dec76ac661b7e20df5b56633811d02bd520119ad7de403b4d06aa8d3e436a0b0135a7fcec085494280f39"}) socket(0x1b, 0x80000, 0x100000000) 2018/05/18 19:43:31 executing program 7: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000002c0)={0xe884, 0x1, 0xaef, 'queue0\x00', 0x9}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) userfaultfd(0x80000) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x2, 0x0) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000200)) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r4 = accept4(r2, 0x0, &(0x7f0000000280)=0xffffffffffffffb2, 0x800) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x2002, 0x0) ioctl$TUNSETNOCSUM(r5, 0x400454c8, 0x1) setsockopt$inet6_udp_encap(r4, 0x11, 0x64, &(0x7f0000000140)=0x4, 0x4) 2018/05/18 19:43:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2201, 0x0) r3 = openat(r2, &(0x7f0000000400)='./file0\x00', 0x4a0082, 0x20) ioctl$PIO_FONT(r3, 0x4b61, &(0x7f0000000440)="bb62cc9fd3a69179f746f7744a5540f09aaa5f93bf7f9736a385bfcea4494f8f7b91109bf8284856b935d0793ebe642565032cba1a1a3537cd3e04667594c02495e86b07073bfc42933b8034f363c237ca7f0919d2625dadfdba4e9890a0fa8b8a28b94ef8f28f7c388c76aafe60789f0854d31be4911ec3d2e6") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x3}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=r4, @ANYBLOB="0200000000000000"], &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000003c0)=0x10001, 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x8}, {0x0, 0x2}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x2, 0x0, 0x4000000000007}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$llc(r2, &(0x7f0000000240)=""/241, 0xf1, 0x2122, &(0x7f0000000340)={0x1a, 0x0, 0x9a6, 0x9, 0x81, 0x80, @random="7f49637108bd"}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000380)={0x37, 0xffffffff, 0x4000, 0x9, 0xffffffff, 0x0, 0x40, 0x1000, 0x7, 0xf0b}, 0x10) 2018/05/18 19:43:31 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:31 executing program 4: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tpin6, &(0x7f0000000000)=0x80, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x67b2, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) socket(0x9, 0x4, 0x7) sendto$inet6(r2, &(0x7f00000001c0)="f807ff5fd453c18f089e6f4fa268feefe54148ace333336c2fabba9e642c7c9819447dd8c2a86d2a2f141e6d25f6ae2b086798d46d24f365b05e4d20129928d7473026e8a6713726b22f44a28990af571e1e9743e98e63fa58a531e364c364f1c233ccda27af590ea46c26095c0e74", 0x6f, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0xc0e3}, 0x1c) 2018/05/18 19:43:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty, 0xda}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000140)=""/180) 2018/05/18 19:43:31 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000280)='/dev/keychord\x00', 0x240000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000400)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) fchownat(r0, &(0x7f00000002c0)='./file0\x00', r1, r2, 0x1500) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r0, &(0x7f0000004280)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000004c0)="07340a6dc93f679ae8347d9222d9253ac02dcbe0098667ef46ae5c04fe3b5dfb6187d3ca54e1a9fafcb795", 0x2b}, {&(0x7f0000000500)="a46c1bef71193288cb80a2e33944a6d7ae03ad02a5521f09f0ae1a85766a633a48ef5230701cd19d390e09e198d98e332675e0aec09a108ac4550f2be5826f1d6db9150f1e85940c38c87388543b931669f8a1bd92fef69688ae15487860d8b645b438f1c0abf454989207dde3a04677b6", 0x71}, {&(0x7f0000000580)="f6408dcd5782c7b3d737e2e9e2f9c07746e8317e32e5150fc7a5e48122a1df9ea1a6aafad3d993c245bcb0e35dbe72b62117634498fd3b8f7c2c39409037670fcb25ff13aeff8c5055300dd3320f0b2d3d6332a670e76a0d2acecf0cdbeae3f4054d06ac70b2cae5de904293dc5086008ef323c91dae1dfcf3ef7c54", 0x7c}, {&(0x7f0000000600)="76d6a175832f5ac5e8338f1a55ee7ef682556fabdc13baef8c088dbc372d3a142a2bea94ba69c2035c903ddb628cfc90e3d3264163b7446ff4dad59f90a09a0786f3b8a505dcf632227911e9d4d6d0c661f615a1235d4755435f29fd48e01d1a2808ada0be8020976181c18046cb104ef56f4bbcf377969fdc81312c097f9b", 0x7f}, {&(0x7f0000000680)="c1e3baa09244c18374c6fbddccec31df75743f61fc333d6d3e690c3749262e3cae95ef776e0c66c6202dc4", 0x2b}, {&(0x7f00000006c0)="1c10e334341f2e5a95129c21c16685973deffd573afc3f347ccf40224e68051ac67a0ef58412787465d2f08403e894e2b0387fb25384b80c2a33b838e1ee964c622036f8dd835bae02960193e554a4012afee1b5b6047e3ced21218fd4968443429d9a", 0x63}, {&(0x7f0000000740)="9dd4b93aa0e44362205905234e0303e7ee09d5d302b91a801013bc6da49a8534abc06251d62dc2053eeb060143bbea0731af2df6ac09dd0f5232b27ac042472183860e635d2269276deed3112ec2c37ee86b783ff14f4016be01b98589361879c7d2474ba03944ba05261e7913fcf8159edbfc6844ba61f89b9044c78adb5b31ff8c3dcc52cb640ca08910f362128d350f4febc1884d9923eb7c54b7df444ccc1b8484a6d4d94e7469", 0xa9}], 0x7, &(0x7f0000004380)=ANY=[@ANYBLOB="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"], 0x10c8, 0x20000050}, 0x80000001}, {{&(0x7f0000001980)=@llc={0x1a, 0x334, 0x1, 0xfff, 0x0, 0xfffffffffffffffa, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001a00)="4c4d7a29381628d09ee415605a2cc0fb5b44c8d9b36342eea94980998cb569d069938ce847aae953ad0488f35e4f833f195317c67a42a5a6c6ac02bc079bd01ad92ea542b9f8f6737d432398b345bb4d561959b4107f6c731967d207a97c4c0b7e790f18caa4b85b5c574bec5eec7643592362be0d7956faf76f247a5d2ed666be9a80004f118fa1e0001216d8b9e93876e7d0c045eca6a5b66399ec2f0c673f52b1ab53c9a4fd13e7162db8fa96a94520816a78", 0xb4}, {&(0x7f0000001ac0)="ecd394c01fa1e371fe8e9a31d6e51b548fbef4b059f5c13f3932aba2ac9e15f42bd6fbafd02c0a9ffa06b9e9fa6ace21ec9d62748b3e6a6e23315eebdf2f5e6e21ab3a8cd54e9f814fd2999f4b0e776cb88811885cab4bf2a120f77de190a2062d8a6a315993f9b742a5d7ba585b878a3aaa250f0752e41fefada5e4a4ed407468f794e411ee1c4a56ce49bd88d6fa11dc32dc", 0x93}, {&(0x7f0000001b80)="729d6838aa3486740eef5202ecc8f22c31e2bed93f79c3368acf1f35219c35112c600810e8b0d727f3b433eb2a25cd8f60fc000c21e91dbfbf1409b4f8a908ecb6cfbc0a6cd72d88cc071db60ecdc4cd185558812417e56934d87c944dfadab7691037b48e1fce095ceecc15595653bd8cd2f68846e259c8dc06cb6b791bc9488f0b127c0152ed2222a8d642c41a0a390ef5ba72abeec15b0ba5f1909895ca07b6d6ce556106f1fa6acb7bf99118e800", 0xb0}, {&(0x7f0000001c40)="5ae7c262c3536eaa078a16f06f95cb03cd0d573140dfaaf046eb0db0049ff9ea0fe82c9e1bf9f786bf955da86160eb91ec12ded4ac129f04c9cac70e5b68f74aa61d6ff5a205a3b993bf2ca16372e69b1d058d5da9db9a743a33ff0370f2c586ce1c85f7afafad", 0x67}], 0x4, &(0x7f0000001d00)=[{0xd0, 0x10d, 0x7, "3483419ce9ed110ddf6b1ccf9de1c9d9797b3cbf6e9d9e87982eaec1eeb07f40267500e33a02baaf7aa5acc4f452a0d6e49a7d7042c5fd913352f05c805e10a5d83d70997ab444efadb4cde261e55d4233082fe6d401a62872b1a13f1b784839e26a4518d5555cc562e93f44a5bde1783a9cd2ed7234377723c52c2111c8def3e992bf82a1f74b9747fc2fb737c33d0ea813b145c30ec98ee1a746a0fa1c119f0843cc3cbf0297db1ed60f11793c025ba8880826fbff7f04dfbd"}], 0xd0, 0x4000000}, 0xfff}, {{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f0000001e00)="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", 0x1000}], 0x1, 0x0, 0x0, 0x8004}, 0x81}, {{&(0x7f0000002e40)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80, &(0x7f0000004200)=[{&(0x7f0000002ec0)='{', 0x1}, {&(0x7f0000002f00)="e23dbcac513a28d007da951855586d35d8d147372cb86088e6e1f749f751a83ce7c64934d1fa44918af94814f9285f8b64029eabbd4f1fc5e8d181544ed6206925bdfcbed25305478fc5a2922a7d59d30439e8d0106019e453a1cdef66c06cb7e846f9195117cccd15ad17fe3eba42b471fc8a00d19197b483feddef5455f0c41412894e0efd275eb2f78a3068795f1b58b52961b1d18cbeec0c1d5888166ebc5dca54cc4b1f7571cfbfd1915ac488e2", 0xb0}, {&(0x7f0000002fc0)="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", 0x1000}, {&(0x7f0000003fc0)="859005604c39686d034672dfef5890c5a4f3caeb85c55300b3ddad6f47ca58e253cd0b1ffb878f686da9b51711fc68c647f5870d82fd3ee99bfda7d539fe433d9c6854869910c8531cecee5dd15e317c3d4990d4be4990ae05abfe0234dc7dbb03e448cfa47a4cda3ddbcd4bb66419229c8f273770e30b97c305bc73a25b92087c4daee9210c6061fb2fce1c95e8c62da94f9d0f1b4b4de9e2e31757398f4db811bb7c852342cff0536f95994d5bde4412f886558ef3b1f75f40ac4ce23a02ca36264880093de8", 0xc7}, {&(0x7f00000040c0)="038f56c0d0442241631476f8305a9a4f6728881a35798f786071af31ef4f492a035747944d3b1e98ed0c", 0x2a}, {&(0x7f0000004100)="1798f587757ebeec770f1d937a2403dbf601ad89d85fd10605e6ff06bdbd76de92ae33d9226b4b3015dd404cd15a6c787f8c6a539da7429132db749a9c5198a62682f0dd010c76e1eac595973501ffcd4472a7e777e01feee907d92775b52fc3ca11916be9bf1ef28443ff8fc191e94283e89f114fca0a25a2a7c5d2a89c2457debdf5", 0x83}, {&(0x7f00000041c0)="3c75ce89bb2012d618e0c92a88f33d1ad9f456062cf8210c710c3458f11c95406fad1d865d7ddc46f3a77775b108b7d1", 0x30}], 0x7}, 0x80000001}], 0x4, 0x8011) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x4e22, 0xffffffffffffffff, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {0xfffffffffffffffc}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r4, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r5 = accept(r4, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f00000001c0)={0x7, 0x8, 0x2, 0x2, 0x1, 0x4, 0x1, 0x7, r6}, 0x20) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') 2018/05/18 19:43:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x80000000000008, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 455.046496] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 455.050622] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 455.053354] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:31 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000), &(0x7f0000000140)=0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = memfd_create(&(0x7f0000000300)='/dev/usbmon#\x00', 0x3) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000340)={0x0, 0x101}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000003c0)={0xfff, 0x200, 0x2, 0x8000, r3}, &(0x7f0000000400)=0x10) r4 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0xbb, 0x20000) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000200)=@req={0x28, &(0x7f00000001c0)={'tunl0\x00', @ifru_addrs=@hci={0x1f, 0x0, 0x3}}}) getsockname$packet(r4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000002c0)=0x14) bind$packet(r4, &(0x7f0000000240)={0x11, 0xf6, r5, 0x1, 0x0, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x15}}, 0x14) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000480)=0xfffffffffffffff7, 0x4) ioctl$PPPIOCGFLAGS(r4, 0x8004745a, &(0x7f0000000440)) 2018/05/18 19:43:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r1 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/pktcdvd/control\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140)={0x8, 0x7fff, 0x7fffffff, 0xfff}, 0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1e4) [ 455.093501] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 455.096295] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:31 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) getpeername$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) listen(r0, 0x0) r1 = accept(r0, &(0x7f0000000180)=@hci, &(0x7f0000000200)=0x80) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r2, 0x300, 0x70bd2c, 0x25dfdbfc, {0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40080c0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 455.139827] IPVS: length: 95 != 24 [ 455.153212] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 455.153238] IPVS: set_ctl: invalid protocol: 44 224.0.0.2:20002 fo [ 455.190374] IPVS: length: 95 != 24 [ 455.196532] IPVS: set_ctl: invalid protocol: 44 224.0.0.2:20002 fo [ 455.996456] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x80) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000140)=@req3={0x7f, 0x9, 0x81, 0x1, 0xfffffffffffffffd, 0x9, 0xffffffffffffffc0}, 0x1c) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x100, 0x0) accept$netrom(r2, 0x0, &(0x7f0000000200)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) r3 = geteuid() ioctl$TUNSETOWNER(r2, 0x400454cc, r3) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000180)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x80000000, 0x0, 0x8250], 0x3, 0x20, 0x6, 0xffffffffffffffff, 0x8, 0x40, {0x10000, 0x1, 0x60b8, 0x7fff, 0x3, 0x3, 0x1, 0x4, 0x1800000, 0x1, 0x2, 0x3a, 0x7fffffff, 0x800, "e30460057cdd63d473dda0905504ecc9819d609e9c24fc7c85255ac8eb7c96f4"}}) r2 = socket$inet6(0xa, 0x80001, 0x8001) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) 2018/05/18 19:43:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, &(0x7f00000001c0)="17c9cd96fdd11e33a4e3aed5e63ea6168292f3e4ccf55b0b43cbf761e1465185fed8b85cffc152049c673dd63d7ed382a32f719fed866b2dd38cd2dc5cb4564de345c9b3a11c2362bb66c423094a474f543c4a6fa9465c152310cd808247830b599d3674e201b30722e50cc7157bb5", 0x6f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:32 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0xfffffffffffffffc}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x2, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000280)={0x101, {0x2, 0x4e24, @rand_addr=0x400}, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e23, @loopback=0x7f000001}, 0x100, 0x2, 0x4, 0x5b6, 0x100, &(0x7f0000000240)='vlan0\x00', 0x80, 0xffffffff, 0xffffffff}) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000140)=0xe, 0x800) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000180), 0x4) 2018/05/18 19:43:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") accept(r0, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000040)={&(0x7f0000000400)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000034c0)=[{&(0x7f0000003400)=""/153, 0x99}], 0x1, &(0x7f0000000940)=""/42, 0x2a}, 0x202) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f00000004c0), 0x1000002c0) sendmmsg(r1, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)='#', 0x1}], 0x1}}], 0x1, 0x0) recvfrom(r2, &(0x7f0000000080)=""/174, 0xae, 0x2, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x6f3000) close(r1) fstat(r0, &(0x7f0000000140)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r4, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) r5 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000f59ffc)=0x5, 0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000280)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r6, 0x4010641c, &(0x7f0000000300)={r7, &(0x7f0000000380)=""/121}) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r8, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x404e20, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x7, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r9 = openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x200000, 0x0) timerfd_gettime(r9, &(0x7f0000000200)) ioctl$LOOP_SET_DIRECT_IO(r9, 0x4c08, 0x0) 2018/05/18 19:43:32 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x1c}}, 0xfffffffffffffe75) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:32 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x6, 0x1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x564}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000480)={r2, 0x1}, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r0, 0x80000) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0, 0xe3b7}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000300)={r5, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}}}, 0x84) getsockname(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, &(0x7f0000000000)=0x80) setsockopt$inet6_int(r0, 0x29, 0xdf, &(0x7f0000000240)=0x6, 0x4) write$cgroup_pid(r4, &(0x7f00000003c0)={[0x32, 0x34]}, 0x2) getpeername$inet(r6, &(0x7f00000001c0)={0x0, 0x0, @dev}, &(0x7f0000000200)=0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000180)='net/arp\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x20, @loopback={0x0, 0x1}, 0xee}}, 0x3ff, 0x0, 0x7, 0x80000001, 0x33}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000002c0)={r3, @in6={{0xa, 0x4e24, 0x9, @empty, 0x87}}}, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@add_del={0x2, &(0x7f0000000000)='veth0_to_bond\x00', 0x800}) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x20) 2018/05/18 19:43:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000140)="4b1f1aed420572aa3101d90c9ff0801fcabf5501c960aeaba80b9f72272db3b004") ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000180)=0x1) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 456.175330] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 456.177862] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) getsockname$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:33 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000140)={0x8, 0x8000, 0x51e}) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) connect$packet(r1, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x9, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 456.216545] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 456.237748] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0xfffffffffffffff9}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=@known='security.selinux\x00') 2018/05/18 19:43:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e21, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0xfffffffffffffffc}, 0x1c) listen(r0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000140), &(0x7f0000000180)=0x14) socket$inet(0x2, 0x8080a, 0x27f0f357) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0)={0x2, [0x3f, 0x1f]}, 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:33 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x204e22, 0x101, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="1491bb0302f4e4c9fa2f92dc15ecef8e8b8f666ec6dbbed4505fa62688c6bea45bfc2799e9b416a548644626fc1b51ffdb2e18ce4ec9972b686e6986b3de5c518b65849b3b9837076ea926c9f44737c8f6b2342f9fd7b02a2edaf8c3394dee240b0f4e0e07b42767452799a1ea08ff3e5fcf309b", 0x74, 0x800, &(0x7f0000000280)={0xa, 0x4e20, 0x8, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x5}, 0x1c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) listen(r0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x26400, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f00000001c0)=0x20, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000002c0)={{0x6, 0x7fff}, 'port0\x00', 0x84, 0x8, 0x2, 0x2, 0x3, 0xffffffff, 0xd540, 0x0, 0x4, 0x9}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f00000003c0)={0x7, &(0x7f0000000380)=[{}, {0x0}, {}, {}, {}, {}, {}]}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000580)=0x0) wait4(r5, &(0x7f00000005c0), 0x1, &(0x7f0000000600)) r6 = fcntl$getown(r3, 0x9) r7 = getuid() lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={r6, r7, r8}, 0xc) ioctl$DRM_IOCTL_GET_CTX(r2, 0xc0086423, &(0x7f0000000400)={r4, 0x1}) mq_unlink(&(0x7f0000000540)='port0\x00') setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000140)=""/235) [ 456.257136] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:33 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt6_stats\x00') setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000140)=0x7, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2={0xff, 0x2, [], 0x1}, 0x5, 0x2, 0x2, 0x0, 0x3, 0x0, 0x3}, &(0x7f0000000140)=0x20) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x89e9, &(0x7f0000000380)="7393b9ac7a99ebca55b08c6a2cd602692c3814d7dec9ae768249e8f359ac16ae96839c7cbebe11d47e84fa93ddc897ace7472a9f8a484d723650031699e39bdd081323f1e4ef13f39a43c96075930b1cfdab0d08849d410c4e039bc66d1ab2f00723b7b3b6d45c7b85c07eb1bf0dd3bf17644ec66480be9c1e1f850567f7a428281ffe99043562393017e681cb33197c8704ff5398a78742587e563c14d4ea640fa2d6") r2 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/pktcdvd/control\x00', 0x600100, 0x0) getsockopt$inet6_dccp_buf(r2, 0x21, 0xf, &(0x7f00000001c0)=""/248, &(0x7f00000002c0)=0xf8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) 2018/05/18 19:43:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) 2018/05/18 19:43:33 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair(0x4, 0x4, 0x100, &(0x7f0000000180)={0xffffffffffffffff}) dup3(r0, r1, 0x80000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000001c0)={0x800000000000, 0x0, 0xb9cbf87ba9465d04}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000200)={0x862, r3, 0x10001, 0x4}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000140)=0x1e) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 456.353060] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 457.120519] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x9, 0x2, &(0x7f0000000140), 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setpipe(r2, 0x407, 0xc9c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:34 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) bind(r0, &(0x7f0000000140)=@vsock={0x28, 0x0, 0x2710, @hyper}, 0x80) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) get_thread_area(&(0x7f0000000140)={0x7fffffff, 0x0, 0x0, 0x9, 0x20, 0x5d, 0x9f1, 0x494000000000, 0x2, 0x7}) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) modify_ldt$write(0x1, &(0x7f0000000000)={0x3, 0x20000000, 0xffffffff, 0x1f, 0x1, 0xf2, 0x401, 0x4, 0x4, 0x1000}, 0x10) 2018/05/18 19:43:34 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x3f}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in6=@dev={0xfe, 0x80, [], 0x13}, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = memfd_create(&(0x7f0000000000)='\x00', 0x1) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=r3, @ANYBLOB="093a3770e0af409167000400"], &(0x7f0000000200)=0x10) 2018/05/18 19:43:34 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x101000) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:34 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket(0x10, 0x803, 0x0) r2 = socket(0xa, 0x2, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008740)=[{{&(0x7f00000083c0)=@hci, 0x80, &(0x7f0000008680), 0x0, &(0x7f00000086c0)=""/109, 0x6d}}], 0x1, 0x0, &(0x7f0000003880)={0x77359400}) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r4 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sw_sync\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea000000908cb224cdaa204b0533ef8726451b1a06dc8e406ef3b653623fa5cb9876be5eb1c995c69cf359f39c202a590b215566a1be5703995f9d33dc6248cfe2c16edd545966216352260c15b365ddf28c4abc9baeb6b3b2fc377ea8fe9cd0c5f59c8fab5d1a327e957c134cb3a5c661c8539b0c24b3fbc24360ffcd795bf9e314c637d17a223a5e288f8ac4a61c7fae42f1bb61e5b1efa65e9b7b8c1d7e8aaa6533bcfa681eab36f9cc7a668df914c38c1c49718dcbdfb312037e1c884b43640dbab28a0074d4437cae5f6f492aba1f11fb52c67f9ce4daf967478146249f6810fbafd7ed6ff63b0000000000"], &(0x7f0000000240)=0xf2) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f0000000280)={r5, 0x4000}, 0x8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f00000002c0), 0x2) 2018/05/18 19:43:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0xfffffffffffffffe, @local={0xfe, 0x80, [], 0xaa}, 0x81}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e20, 0x7fffffff, @loopback={0x0, 0x1}, 0x6}}, 0x80000000, 0x53e2, 0x48, "9bf5c1da63b5f6cd215029e97ca821a7eec953f5191685ce5ea092f5423fed4f450bfd9c934a003d3ceb991ba8b0717a4170a0ddf8fcaf560115c95ad247139e1f63e184cd3c838159ed15bf5b55fc1e"}, 0xd8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 457.444973] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 457.450835] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 457.452191] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000001c0)=0x7, 0x4) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000300), &(0x7f0000000340)=0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f0000000140)) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000200)="503dd029ca40bc0fa22a768f58e8f8b3c2ba696a7d2e5946297371ea02672b8b5c3b6e8db186d89726385ca8321d8efbe0da83029fef26105ed58561b8d448d2d3dfa8f552cd26cfc74a4bc653c57bcececd529b34e846ca30e435e58a46b56c546f48da22724bb277396da8979ab453f1eb4e6cab59a311ca3a50bc753900b105049cd0594344addd37b1499ef4a3df3ad510cd", 0x94, 0x4095, &(0x7f00000002c0)={0xa, 0x4e24, 0x3, @mcast1={0xff, 0x1, [], 0x1}, 0xddc}, 0x1c) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:34 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f0000000000)=0x54) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x233, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0xfffffffffffffffc}, 0x1c) [ 457.487205] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:34 executing program 5: r0 = memfd_create(&(0x7f0000000200)="706f7369785f61636c5f6163636573735b2973656c663cae00", 0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000240)={0x0, 0x5}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000002c0)={r1, 0x9e, "9b2bc20e6692174c10fb79e49186c27e95ed49f0b7bb6ead9037f1eccb05ec6c6309ec74ef0cf89d17d474ee46f3c89ebd8288339e94f8fdd3bf6f8ba3df8dc3f473bed028bf8dd298d039b9ecdbd43e22cdad845db5b0dd31f53151697d29217fb75b7fc384c8bbabce627dfb95a9204e8a693739f93dda21f8c4c3734d22188235793f135eae8d2e12026399df2975bd5af8aa61fd58e65c74c02754e5"}, &(0x7f0000000380)=0xa6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r2, 0x7, &(0x7f0000000140)={0xed71167846a04abf, 0x7, 0x0, 0x4c, r3}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r2, &(0x7f0000000180)="bcb689a0e7969ef223bc468d536546550b0b7903ba7fd61be9d68f647427427f15a1eb45883a75d15b81a87926ba05865d120887a2940f8c3b47d9b826f4b2b651b0e7b40ddfc246a4ed563a6ad07c816799a5", 0x53, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000400)=@add_del={0x2, &(0x7f00000003c0)='teql0\x00', 0xfffffffffffffff1}) [ 457.525545] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 457.540502] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) timerfd_create(0x2f474fafbad58bf7, 0x80000) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000000), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 457.567521] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 457.604473] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 457.608638] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000001180)='/dev/pktcdvd/control\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000140)="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", 0x1000, 0x0, &(0x7f0000000000)={0xa, 0x4e22, 0x100, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x7}, 0x1c) sendto$inet6(r1, &(0x7f00000011c0)="1f7010142db9ecb34b6add66d7f94361857e4d1e26b0845fa537023f99e2b28472598d5ba9d80d69324c69bd8998571b826c269ff1e2689fce190261aa95eed6bc8183849ee5e9e7b2383cc2485e4b28e19dd919ecbb5159151c7078698780e5e6a68fd2b634f29bed49e22e4298f474cc47e75ea64e7e731e789ada5cf2fd9e2b65674311a419435d6591681ee454b44d5115efc99a4dfec05ae44b7f0300341d7d7ce0fcc6754af33696063b463f20", 0x3675797a9c456829, 0x20000005, &(0x7f000031e000)={0xa, 0x4e23}, 0xfffffff1) 2018/05/18 19:43:35 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'gretap0\x00', 0xfb8baafe7fdd7760}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000180)={0x6, {{0x2, 0x4e23, @multicast1=0xe0000001}}, 0x1, 0x1, [{{0x2, 0x4e21}}]}, 0x110) 2018/05/18 19:43:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xca, 0x20}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000002c0)={r4, 0x7, 0x1}, &(0x7f0000000300)=0x8) listen(r0, 0x3) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f00000001c0)=[@in={0x2, 0x4e22, @loopback=0x7f000001}, @in={0x2, 0x4e24, @rand_addr=0x4ec7}], 0x20) accept$inet(r2, &(0x7f0000000000)={0x0, 0x0, @multicast2}, &(0x7f0000000140)=0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = gettid() ptrace(0x4208, r1) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) timer_create(0x1, &(0x7f0000000000)={0x0, 0x2f, 0x1, @thr={&(0x7f0000000180)="8898656ca76cd3012a35398fd2135fc7c4f5e9337a290ddc1b8d3fc47590dbf7a3d53b408119c086375903f11e731686e488b36ab55a2b6b08840bc39a1611d48622997d2bcfab5943502fb951feaaa67d1652f62381b8449abc736a598a4f175b6ca17e6dfdb462fac06431068af4d72c124189cdc38b9006d9238041818975f8117182ee2d6884a23cd57125f4c1e0f1d40d605f54e8702aa89fc91b5bb4dd87b6fa1fc96e8bf93b4a6f237d32de6a972868a7b85a5480", &(0x7f0000000300)="8df52d98327c6a9bb5aa8a943a3b84c8fe296ba616e1a966d6f8a0c82e0fb94ea2aee00c19af78d865b81f92a8509db9d10a595859ed8b3384e3edd335cf39c9fb791b4219876e6e00cde1675ef1b4d95f2320f44cd7e3397e427e0858c3cdc1b658617bf498e3538604053cd99ed9c49e67cbca5180f229f77075926c06fc738c9865a6bd9aac4fec360ad712e9ba249833bd51657ca021576dec554c737e181f68880b43b7f2d78d19648c2932fd74afe9c6341be784a1d550bdc1a12d47a326cc97362bb0b3081813efc9315cc4a8c15364a3e0cebd30e6fb6b253da44da95842eef3e0"}}, &(0x7f0000000280)=0x0) timer_settime(r1, 0x1, &(0x7f0000000400)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000440)) r2 = socket(0xa, 0x2, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r3 = memfd_create(&(0x7f00000002c0)='selinux\x00', 0x3) ioctl$EVIOCSABS2F(r3, 0x401845ef, &(0x7f0000000140)={0x20, 0x0, 0x0, 0xbff3, 0x28000000000000, 0x1f}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r4, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:35 executing program 7: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) open$dir(&(0x7f0000000000)='./file0\x00', 0x400, 0x20) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x800000000000000, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:35 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc), 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000240)="c53720ed118669c79ffd4a2665b74505d498736c23557046419c38daafda009dcdeb56361a367485a30ff54d1eb2836f4a41cd07074cfe056aba8c9b77b3b5cb016b06bc15469f73886e7d6ca1b599c4d7d4ff29dc341fc25e3fccdd70436a55aa93dd6ddcf505e4faebaea8245d25e1ffbfa785c36b23385f33567ad6542b665c9b2471fabbd8f5e7213572447e6e1ae477196e6b14bc979439158eded048b4639c773ea1e65d72413a4cb0cb1e548a51953ca745c0d221b3d6a304b256e2b3345f585e8c6184a68b2f9349510ae6ec369a436f006007efca5626f1045ae7476a49c408fe377c3d055ff008be", 0x163, 0x20000005, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x1fe}, 0x6d23cac7) 2018/05/18 19:43:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0xfffffffffffffffe, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x2, 0x0) r3 = fcntl$getown(r0, 0x9) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000180)={[], 0x200, 0x8711, 0x8000, 0x8000, 0x0, r3}) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 458.262062] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 458.278809] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 458.296562] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:35 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc), 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x81) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140)={0x0, 0x5, 0x5e00000, 0x6}, 0x8) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x1, 0x4, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e23}, 0x1c) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bind$netrom(r1, &(0x7f0000000140)=@full={{0x3, {"356c739f697baa"}, 0x3}, [{"25aaa65c00879c"}, {"97cb4537c15b3a"}, {"d5a4650ad80a32"}, {"1e49921067b44b"}, {"9a976d70260b72"}, {"63820bf6c2c175"}, {"84bd73ae839e2a"}, {"098aa6542dc83f"}]}, 0x48) 2018/05/18 19:43:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x101}, 0x1c) listen(r0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffff8, 0x400000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000140)={0x0, 0x6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r2}, &(0x7f0000000340)=0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000280), &(0x7f00000002c0)=0xb) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000300)) 2018/05/18 19:43:35 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x10400, 0x0) getsockopt$ax25_int(r1, 0x101, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e1f, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x6}}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:35 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000180)={0xff, 0x8000, 0x203, 0x100000000, 0x9, 0xd08, 0x0, 0x7, 0x0}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000200)={r2, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x1, 0x3, 0x6, 0x2, 0x80000000, 0x20, 0xff, 0x277, 0xffff, 0x0, 0x8, 0x1, 0x6, 0x7fff, 0x6]}, &(0x7f0000000300)=0x100) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e21, 0x0, @empty, 0x3f}, 0x333) listen(r0, 0x3f) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in=@multicast1=0xe0000001, 0x0, 0x7ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x73}, {0x0, 0xfffffffffffffffc, 0x0, 0x10000000000}, {}, 0x0, 0x0, 0x1, 0x400000000000000}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3c}}, 0xe8) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x94, r3, 0x202, 0x70bd29, 0x25dfdbfc, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local={0xfe, 0x80, [], 0xaa}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x80}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1=0xe0000001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1f}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x50}, @IPVS_SVC_ATTR_AF={0x8, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3f}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x24000005, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) r4 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pktcdvd/control\x00', 0x40003, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r1) clock_gettime(0x2, &(0x7f0000000480)={0x0, 0x0}) mq_timedsend(r4, &(0x7f00000005c0)="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", 0x19f, 0x7, &(0x7f0000000000)={r5, r6+30000000}) 2018/05/18 19:43:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x4000000000000000) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000000)="f1b2c303a694ed05bc44c0fd75ae9e2edd11a84d54e60d42da8cfb6e6cb2bb9198f1a8c0396ef7dd37696de95f", 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e24, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0xffffffffffffff5c) 2018/05/18 19:43:35 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x100, 0x0) connect$ax25(r2, &(0x7f0000000340)={0x3, {"a104c6f3288851"}}, 0x10) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000140)=0x10, 0x800) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={0x0, 0x6}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000240)=ANY=[@ANYRES32=r4, @ANYBLOB="01004c00727a24949dd97cf0fefc1119c7b9b8968720499e8ee20cdcb147748c2b2af139a9e3d1646ccf99f01c2ebc0e4ab3e2acc2d1f744cd0c18ea011969673e349cdf3fc50ffd91338fd853127213"], 0x54) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000180)={0x395a, 0x0, 0x7}, 0xc) setsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f00000002c0)=0xe, 0x4) 2018/05/18 19:43:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000300)={0x28, 0x0, 0xffffffff, @host=0x2}, 0x10, 0x80000) bind$vsock_stream(r1, &(0x7f0000000340)={0x28, 0x0, 0x0, @reserved=0x1}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/61, 0x3d}], 0x1, &(0x7f0000000200)=""/98, 0x62, 0x6}, 0x2) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e20, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x416}, 0x1c) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000380)="55c608f53ee9b0bee5e40fe2c804b9ba", 0x10) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)={0x100000000000, {{0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0xff}}, 0x1, 0xa, [{{0xa, 0x4e22, 0x7f, @mcast2={0xff, 0x2, [], 0x1}, 0x8}}, {{0xa, 0x4e23, 0x80000000, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x100}}, {{0xa, 0x4e24, 0x5, @loopback={0x0, 0x1}, 0x4}}, {{0xa, 0x4e21, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x80000001}}, {{0xa, 0x4e21, 0x5c, @mcast1={0xff, 0x1, [], 0x1}, 0x9}}, {{0xa, 0x4e21, 0x4, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x8001}}, {{0xa, 0x4e23, 0x7, @mcast1={0xff, 0x1, [], 0x1}, 0x7}}, {{0xa, 0x4e22, 0x7fff, @remote={0xfe, 0x80, [], 0xbb}, 0x3}}, {{0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x20}, 0x4}}, {{0xa, 0x4e21, 0x3ff, @empty, 0xd0}}]}, 0x590) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x0, 0x0, @empty, 0x7fff}, 0xffffffffffffff2e) sync_file_range(r2, 0x10001, 0x0, 0x0) 2018/05/18 19:43:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) sched_getattr(r1, &(0x7f00000002c0), 0x30, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x4e20, 0x4, @loopback={0x0, 0x1}, 0x9}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000140)={{0x6, 0x200}, 'port0\x00', 0x40, 0x0, 0xffffffffffffffff, 0x1, 0x7, 0x6, 0x9, 0x0, 0x2, 0x1}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x100000000}, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x30000, 0x0) r4 = fcntl$getown(r2, 0x9) tkill(r4, 0x21) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000340)=""/239, 0xef}], 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc04c5349, &(0x7f0000000200)={0x46ce0666, 0x0, 0x9}) 2018/05/18 19:43:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) listen(r0, 0x0) r2 = socket(0xa, 0x2, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x8, 0x4) getpeername$packet(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x14) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000380)={{0x7, 0x401}, {0xffff, 0x7}, 0x9, 0x4}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000280)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xe8) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000640), &(0x7f0000000680)=0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000540)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e20, 0x4, 0x4e22, 0x7ff, 0xa, 0x80, 0x80, 0x6, 0x0, r4}, {0x3, 0x4aa, 0x80000000, 0x20000000000, 0xffffffffffff0001, 0xff, 0xcc, 0xbe49}, {0x4, 0x9, 0x400, 0x7}, 0x3f, 0x6e6bb2, 0x3, 0x1, 0x3, 0x1}, {{@in=@rand_addr=0x6, 0x4d2, 0x6c}, 0x0, @in=@broadcast=0xffffffff, 0x0, 0x2, 0x1, 0x8b6, 0x9, 0x1, 0x10001}}, 0xe8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r5, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) 2018/05/18 19:43:35 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000140)=0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x70, 0x5, 0x9, 0x401, 0xfd2, 0x0, 0x5, 0x1010, 0x6, 0xffffffffffff3b4b, 0x1, 0xffffffff00000001, 0x5, 0x4, 0x800, 0xa62b, 0xa00000000000, 0x81, 0x0, 0xfff, 0x2, 0x9, 0xdf3, 0x5, 0x0, 0x2, 0x2, 0xffffffffffff7fff, 0x1, 0x7, 0x1, 0x1f, 0x4, 0x7, 0x0, 0x6, 0x1, 0x0, 0x7e9d, 0x2, @perf_config_ext={0x4, 0x9}, 0x300, 0x1ff, 0x1, 0x0, 0x3, 0xa8, 0x7ff}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000180)={0xffffffff, 0x8, 0xc7e, 0x5}, 0x14) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@rand_addr, @in6}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 459.101536] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 459.116102] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 459.130326] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) read(r0, &(0x7f0000000140)=""/185, 0xb9) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) flistxattr(r0, &(0x7f0000000300)=""/78, 0x4e) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000200)=""/203) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) mknodat(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000002c0), &(0x7f0000000300)=0xc) futimesat(r1, &(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)={{}, {0x77359400}}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={0x0, 0xbe7, 0x5, [0xc524, 0x1, 0x5, 0x2, 0x1f]}, &(0x7f0000000200)=0x12) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x9, 0x8, 0x2, 0x2, 0x1, 0x7f, 0x200, 0x7fffffff, r2}, &(0x7f0000000280)=0x20) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) flistxattr(r0, &(0x7f0000000140)=""/114, 0x72) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 459.174727] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 459.242570] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:36 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc), 0x4) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) prctl$setmm(0x23, 0x0, &(0x7f0000ffc000/0x2000)=nil) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:36 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x10201, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000180)={0x1, {0x2, 0x4e24, @multicast1=0xe0000001}, {0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @loopback=0x7f000001}, 0x80, 0x6, 0x0, 0x42, 0x2, &(0x7f0000000140)='rose0\x00', 0x10000, 0x1, 0x2}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_extract_tcp_res(&(0x7f0000000200), 0x55ef0a7c, 0x80) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x208000, 0x88) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='sit0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') getsockopt$inet_dccp_int(r1, 0x21, 0x15, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:36 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x141041, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) write$binfmt_aout(r2, &(0x7f0000000140)={{0x107, 0x0, 0x9f, 0x3e5, 0x287, 0x5, 0x395, 0xbf}, "f8f50ba86bfea7660722c7e7162ec817a7f37adb5a07ab2a958cc1a10b3d6aafaf9c1bca9e0da3de43a120481933db4a74a48c50cb04195d47a0c2dbec7e1581a9fb5b4570aee279131bd2f77d664dfe4915cfeac3bf9a27acfcc049ef63ee609060e6b3f6ecd5fa6a2940344267de5e8b2dc89a2dd964f874f56019d3591e258b60b532aafa49e62f6dd5e50d886bff4ffa0bcaf027aa41f203", [[], [], [], [], []]}, 0x5ba) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000700)={{0xa, 0x4e20, 0x6, @empty, 0x10}, {0xa, 0x4e24, 0x7ff, @dev={0xfe, 0x80, [], 0xf}, 0x1000}, 0x0, [0x0, 0x2, 0xeb92, 0x1, 0x4, 0x8, 0xa0, 0x400]}, 0x5c) 2018/05/18 19:43:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000180)={0x6, &(0x7f0000000140)=[{}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f00000001c0)={r3, 0xf}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r4, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$KDDISABIO(r2, 0x4b37) 2018/05/18 19:43:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setpipe(r0, 0x407, 0x3) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x17}, 0x7}, 0x1c) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x2, 0x0) 2018/05/18 19:43:36 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x8000) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) getsockname(r1, &(0x7f00000002c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000340)=0x80) sendmsg$nl_route(r2, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=@ipv4_delroute={0x74, 0x19, 0x2, 0x70bd2b, 0x25dfdbfe, {0x2, 0x20, 0x20, 0x27, 0xfd, 0x7, 0xff, 0xb, 0x2000}, [@RTA_METRICS={0x44, 0x8, "b8684926a86d870b4b8037f56109f441c6b42cb7461921a153dcd0a8ca08627a9d3c2473095c7535bdce33ae87dd9714190e830d4267f5c0761a111037"}, @RTA_OIF={0x8, 0x4, r3}, @RTA_MULTIPATH={0xc, 0x9, {0x7f, 0x6, 0x400, r4}}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) [ 459.928036] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 459.931117] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 459.934756] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in=@loopback=0x7f000001, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x3, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x71}, 0x0, 0x0, 0x1}, {{@in6=@loopback={0x0, 0x1}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0xe8) getegid() r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x408400, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e20, 0xfffffffffffffffe}, 0xfffffffffffffe87) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e24, 0x7, @local={0xfe, 0x80, [], 0xaa}, 0x1}}, 0xfffffffffffffffe, 0x2}, &(0x7f0000000280)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}}, 0x84) listen(r0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xc040, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000140)=0x9) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:36 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x42200) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000001c0)={0x5, 0x3, 0x1000}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) ioctl$sock_ipx_SIOCIPXCFGDATA(r0, 0x89e2, &(0x7f0000000200)) r2 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x13, 0x4) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000140)) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:36 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x40) getpeername$inet(r2, &(0x7f0000000140)={0x0, 0x0, @broadcast}, &(0x7f0000000180)=0x10) setsockopt$inet6_int(r0, 0x29, 0x57, &(0x7f00000001c0)=0x8, 0x4) [ 459.971577] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 459.984175] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 459.986639] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 460.086246] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:37 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000a40)='net/route\x00') setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000a80)=0xfc6, 0x4) recvmsg(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000400)=""/168, 0xa8}, {&(0x7f00000004c0)=""/97, 0x61}, {&(0x7f0000000540)=""/103, 0x67}, {&(0x7f00000005c0)=""/188, 0xbc}, {&(0x7f0000000680)=""/6, 0x6}, {&(0x7f00000006c0)=""/85, 0x55}, {&(0x7f0000000740)=""/194, 0xc2}, {&(0x7f0000000840)=""/14, 0xe}, {&(0x7f0000000880)=""/146, 0x92}], 0x9, 0x0, 0x0, 0xdb}, 0x40000000) listen(r0, 0x56d1) getpeername$netrom(r1, &(0x7f0000000ac0), &(0x7f0000000b00)=0x10) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000140)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/205, 0xcd}], 0x1, &(0x7f00000002c0)=""/90, 0x5a, 0x1ff}, 0x40000001) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000b80)=0x986, &(0x7f00000003c0)=0x2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) 2018/05/18 19:43:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0xc5, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, &(0x7f0000000200)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x9, @ipv4={[], [0xff, 0xff], @rand_addr=0xff}}}, 0x34b2, 0x1, 0x1f, 0x81, 0x40}, &(0x7f0000000300)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000340)={r2, 0x1, 0x5, 0x5, 0xcb8, 0xffffffff, 0xff, 0x644, {r3, @in={{0x2, 0x4e24, @multicast2=0xe0000002}}, 0x8, 0x2, 0x3ff, 0x7, 0x5}}, &(0x7f0000000400)=0xb0) listen(r0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r4, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:37 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) accept4$bt_l2cap(r1, &(0x7f0000000200), &(0x7f0000000240)=0xe, 0x80000) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x20000, 0x0) bind$llc(r2, &(0x7f0000000180)={0x1a, 0x2, 0xffffffffffffff74, 0x0, 0x0, 0x5, @random="84ac4c0a1334"}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x4, &(0x7f0000000140)="c626262c8523bff9970104006f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000200)={'ip6gre0\x00', @ifru_map={0x7, 0x7, 0x800, 0x412, 0x5, 0xa00000}}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f00000002c0)="5885325e2d2651852efa47c431810e84ee18598cdc8164f27b87f7b09c332f5c3ef90cbca59fcf286512207f0d626ff8661981c8d5f15f92a1c8e23503c87f04ad7d1f9137ffa9825c685662e3db90ce554a13002ab44df868312fdb5e016e8a3e7d080a84b5bc081e1647", 0x6b, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x3}, 0x1c) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4040) ioctl$DRM_IOCTL_ADD_BUFS(r3, 0xc0206416, &(0x7f0000000180)={0x3, 0x0, 0x6, 0x4, 0x8, 0x7fff}) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f00000001c0)={0x0, 0x2710}, 0x10) 2018/05/18 19:43:37 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_mr_cache\x00') getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0xb35, 0x100000001, 0x3}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000001c0)={r2, 0x5, 0x4b, "aab34433b9148f219214d0e98ce3f3e398b51de44448ef2a7f245078284d96f4b7adecf36088843647e908cc210ba4f736aec92f0ce175e8713c8705ff6867f98e0707bd244164f07853f7"}, 0x53) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) socketpair(0x10, 0x80000, 0x20, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000140)) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffffffffffe) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:37 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000180)={r2, 0x20}) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r3, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80882, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0xfffffffffffffffb) 2018/05/18 19:43:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000140)=0x10, 0x80000) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0xffff, &(0x7f00000001c0)=0x4) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000000), 0x8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e24, 0x401, @loopback={0x0, 0x1}, 0x8000}}, 0x800, 0x4, 0x5, "58b74c3f47830a14ddb0d72039798e61f3ea7419e9ca21a23e9890e2c915f3e653644dd6f095a19b9098bad4c1b23fa2f4d9c6349f0599b3c99203bdc70c5fe56ba66d9e04bb9da61535949c01f5b60b"}, 0xd8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) [ 460.768164] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 460.784376] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 460.800272] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:37 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x50}) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) r1 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sw_sync\x00', 0x40002, 0x0) getsockname$ipx(r1, &(0x7f0000000140), &(0x7f0000000180)=0x10) 2018/05/18 19:43:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x200000, 0x0) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000140)=""/4096) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x2, 0x1, [0x0]}, &(0x7f0000000180)=0xa) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000001c0)={r3, 0xc1, "bf3c2bf7861182eb7ffba2b3de04b56af26a29e680738f7bef2ca65094f56a6f817e7d586c0e66a3714f80a766928b458b85945a94207f5d7b7a609c62d9b6ae2f4a5c8ed0d9de6896de872c2207b136632bae03af855f9bd0697ad2c99e58f7e38cad4567b4b3475753a4eab6cc7bd729745d034f79f4410043eb165e8bcfd53e20cab93a0d2b10c976f460169579f96f52b6618628d0e7d9de602b0e5db7f0c275cb8c42a21c807533dd0bf85b97fb343dbf1402dae1394ebc4136271741c4b7"}, &(0x7f00000002c0)=0xc9) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 460.833519] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 460.857286] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:37 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x40000}, {0x0, 0x0, 0x0, 0x0, 0x800000000000}, {}, 0x0, 0x0, 0xffffffffffffffff}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0x13b) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback}, &(0x7f0000000140)=0xc) preadv(r1, &(0x7f0000001480)=[{&(0x7f0000000200)=""/134, 0x86}, {&(0x7f00000002c0)=""/120, 0x78}, {&(0x7f0000000340)}, {&(0x7f0000000380)=""/239, 0xef}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x5, 0x7) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x101, 0x100000001, 0x26bd, 0x400, 0x9, 0x20, r2}) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 460.888035] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 460.941510] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) r1 = openat$sw_sync(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sw_sync\x00', 0x18000, 0x0) r2 = inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200) inotify_rm_watch(r1, r2) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) r3 = open(&(0x7f0000000140)='./file0\x00', 0x40000, 0x10) ioctl$RNDZAPENTCNT(r3, 0x5204, &(0x7f0000000180)=0xfff) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @mcast2={0xff, 0x2, [], 0x1}, 0xcf81}, 0x1c) 2018/05/18 19:43:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x4000, 0x0) sendmsg$nl_netfilter(r2, &(0x7f0000001500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000200}, 0xc, &(0x7f00000014c0)={&(0x7f0000000180)={0x1328, 0x12, 0xf, 0x500, 0x0, 0x25dfdbfc, {0x5, 0x0, 0x4}, [@generic="8073f21588c9bdff4113873cc3a64e63e438232027a5744d36982cbd6460f9a0328cb5152a849775c588431daeab9e55986f21e46eeb37023fb68585f44461a653c8631df3fea1539d9e7c708d3c5a3330ee45f92d1d2622e9dd640137fcf38b4d19d103221d6e3fd4358faa48dbccd5cef8dcb1854824", @generic="50ed07a8d1819728f2c350fcd4d2cc4541f39e00ff7785d6744a3829fb33fbded7ebc01a1bb415a89419fb5bc6b62160181099329531bfa5310b1e4ad25d17c67f0343748d", @typed={0xc, 0x3, @u64=0x6}, @generic="93da11c797aab0729d66ceec80396dc8e0509c1afab48d735e888bd4c99e8d3239430d4231bdc0bf93af2596ce16c00c33de9c77a38b34b9464d4e53322eac0f1e291523df27c724d776", @generic="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", @typed={0x8, 0x90, @fd=r1}, @typed={0x88, 0x5f, @binary="8d8bafcfcc86fc8a90d0b7029c092ddfc47ac6f285939ff8b932dfa72dda2f2956981a83efb911df4657cb8bc2e2b387701d2039252b78ba8d64b45d9ae16ebb1280c8f66226e0ea179c244fc423b7b57b75fac1f608023bb1aaafe3c5e21e0c1511e475c16b07b37ba0358b36349ddb6971717f583748c3c8822e13652fa41a6d1b2f63"}, @generic="d38c8d1237600b52968fa501a0d56c4af56ee9d5e7b856529caa565501cbc8b3fb6c0629a6ddf7c0ebc51a81d0be111ce1380202ae9800a80bfd044651942608dd7f055e145b28679af6e7fed99f779c999d7656b8946385193639b61d0adad50c1b94f958b88dc47b1459ae7e2c3c59eb4e3f88aa9d8c5381", @nested={0xf8, 0x86, [@generic="436d8b5694a357c5423c5dfd0ec569df0af0ec37238bb8e8b5302807e64c04fb05befb23a74ef3701fcd206939621ccf44478681fd67facc6f4601e96598cdaba74c7ea164d98ec95d96327fc959e90d9ab33cd60f07d504ce3a8aa1fcbf93e6e4aadf9cbed9bcf775d54aba809d01f00e5458148fc84f37d0bf2f3713919eed82e88091895dd1942c211c05de9a08811c2b70a894ace27c90eb407434274626d0834ab8e9f363b77217ece79e88f3f240520c0f45c5377d181828fe7a0d1f1df8d37ae75a3bd9f5c69e2d956d42fcb65eb028e526d0321db6660eedc6b7689fa56d80893a2e31be633d8aad1d12a1eaad786786"]}]}, 0x1328}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 2018/05/18 19:43:38 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:38 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) poll(&(0x7f0000c58000)=[{r0, 0x2b}], 0x1, 0xade) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000001000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/18 19:43:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r1, &(0x7f00000001c0)) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:38 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:38 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffffffffbfe) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000240)="7f0f8594088edae6d221f9d79dcfbc57abb41ef79f5005859fb6274b7538139ab2b1fb6b46c2a361d77f5ec73c6d52b8f00ce0c1a92554a05d65d45d30999ff01c8ca758ebf3da1d78806abb8f871c6c8286188bf1b745249c51a142d78a9218cec36f04a412d734a6b39d74fb422a2f7f9489", 0x73, 0x800, &(0x7f00000002c0)={0xa, 0x4e22, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0xff}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f00000001c0)="08486cf658bfa340d0534550721d1f355328cbc88d3fdb19890812291ca7020f0461057bb11cf28d185c3ffa39b7abd50d5e692f52fb719e9e7c30bc8f4f403c4e2781026e43c8956f5e", 0x4a, 0x811, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @empty, 0xffff}, 0x1c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x80001, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000140)=0x5e, 0x1) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 461.675634] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 461.693355] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 461.704137] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 461.719035] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/18 19:43:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000140)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@rand_addr, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) setuid(r2) 2018/05/18 19:43:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000680)={@loopback={0x0, 0x1}, 0x53, r1}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x200) openat$selinux_access(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/access\x00', 0x2, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x10000, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x70, 0x7698, 0x40, 0x1, 0x5, 0x0, 0x2, 0x800, 0x7, 0x100000001, 0x7ff, 0x9, 0x2, 0x10000, 0x2, 0x3, 0x5, 0xffffffff, 0x9, 0x800, 0x2, 0x8, 0xfffffffffffffff8, 0x5, 0x866, 0x10000, 0x3, 0x0, 0x2, 0x8000, 0x4f7, 0x8, 0x7fff, 0x631, 0x1000, 0x4, 0x400, 0x0, 0x7, 0x6, @perf_bp={&(0x7f0000000000), 0x8}, 0x2000, 0x101, 0x0, 0x0, 0x80000001, 0xffffffffffff0000, 0x9ab5}, r3, 0x9, r4, 0xb) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000340), &(0x7f0000000380)=0x4) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) 2018/05/18 19:43:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = geteuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x3, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2, 0x0, r2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x4}, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x3, 0x2}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x3c}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0x1000, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:38 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) getuid() getsockname$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000240)=0x1c) listen(r0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0xa2800, 0x58c9d06266feb283) setsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000140)="184cad1ca7804caecf435e12641c548c9ddb6d45e87c7223a962200bb4194191229f7bc15f79e3836388e79c781ebd3e433fadf807580f86fcdbc4a872b5a7db8b3e6fea7ae107a58b27120942e0bb109b2d99886b9d4816f615c13f98c96a0180d83ba5214b49380c456320942c859e0f78e555c6b0fe8a9a4dfa80b317f0631fe5fb7ff0c159e2f2bf3dda861bee51c7d5149b4cb5e4d90c91145f1190ec46d7064711abd49820b0b4c8d46ef87daf65e39555c0a9254af33ab9a6f68506c5d8b202b73549bbf6de8521ace9a53dd89fcb18", 0xd3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 2018/05/18 19:43:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xfffffffffffffffe}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr}}, 0xe8) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa}, 0x1c) 2018/05/18 19:43:38 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = memfd_create(&(0x7f0000000140)='/selinux/load\x00', 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e23, 0x3, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x1}}, [0x7, 0xfffffffffffffff7, 0x3, 0x20, 0x4, 0x1ff, 0x400, 0x8, 0x5fc0, 0x101, 0x0, 0x9, 0xbf4, 0x8, 0x20000000000]}, &(0x7f0000000280)=0x100) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000002c0)={r3, 0x6}, 0x8) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) 2018/05/18 19:43:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r0, &(0x7f0000000140)="bf241dd357c5f189855281946c62f0997579dd6fe045e583e89a176ea053ddd322f5347374c16dcca261a298b7d44ad1763a71b5b970b76a99690f07a8d2a27ebdd8bcb812af9a438147260f70aef0d4b49d3e3d55ee75b19e3c2d6e3703cfc357000000000000", 0xfe04, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, 0x1c) 2018/05/18 19:43:38 executing program 6: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000140)={0x303, 0x33}, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x33}, 0x0, @in=@rand_addr, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 461.841293] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 461.890648] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 461.893611] ================================================================== [ 461.893626] BUG: KASAN: stack-out-of-bounds in memcmp+0x126/0x160 [ 461.893630] Read of size 1 at addr ffff8801d89078e0 by task syz-executor5/30660 [ 461.893631] [ 461.893637] CPU: 1 PID: 30660 Comm: syz-executor5 Not tainted 4.4.132-g46155cc #42 [ 461.893641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.893648] 0000000000000000 4291dd3e9f24b797 ffff8801d8907410 ffffffff81e0df8d [ 461.893654] ffffea00076241c0 ffff8801d89078e0 0000000000000000 ffff8801d89078e0 [ 461.893659] 0000000000000000 ffff8801d8907448 ffffffff8151526c ffff8801d89078e0 [ 461.893661] Call Trace: [ 461.893668] [] dump_stack+0xc1/0x124 [ 461.893677] [] print_address_description+0x6c/0x216 [ 461.893682] [] kasan_report.cold.7+0x175/0x2f7 [ 461.893687] [] ? memcmp+0x126/0x160 [ 461.893695] [] __asan_report_load1_noabort+0x14/0x20 [ 461.893699] [] memcmp+0x126/0x160 [ 461.893705] [] ? __lock_is_held+0xa2/0xf0 [ 461.893712] [] xfrm_selector_match+0x12d/0xe50 [ 461.893716] [] xfrm_sk_policy_lookup+0x151/0x350 [ 461.893721] [] ? xfrm_sk_policy_lookup+0x42/0x350 [ 461.893725] [] xfrm_lookup+0x1b5/0xb70 [ 461.893731] [] ? ___preempt_schedule+0x12/0x14 [ 461.893736] [] ? xfrm_bundle_lookup+0x1220/0x1220 [ 461.893741] [] ? ip6_dst_lookup_tail+0x3b9/0x1460 [ 461.893746] [] ? ip6_dst_lookup_tail+0x454/0x1460 [ 461.893750] [] ? ip6_forward_finish+0x4a0/0x4a0 [ 461.893755] [] ? __kernel_text_address+0x6b/0xa0 [ 461.893760] [] ? print_context_stack+0x4b/0xd0 [ 461.893765] [] xfrm_lookup_route+0x39/0x1b0 [ 461.893770] [] ip6_dst_lookup_flow+0x1b7/0x2f0 [ 461.893774] [] ? ip6_dst_lookup+0x60/0x60 [ 461.893779] [] ? selinux_sk_getsecid+0x77/0xc0 [ 461.893785] [] tcp_v6_connect+0xd58/0x1b70 [ 461.893791] [] ? sock_sendmsg+0xcc/0x110 [ 461.893795] [] ? SYSC_sendto+0x21c/0x370 [ 461.893800] [] ? tcp_v6_syn_recv_sock+0x1f20/0x1f20 [ 461.893805] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 461.893810] [] ? _raw_spin_unlock_irq+0x38/0x50 [ 461.893815] [] ? __schedule+0x7d4/0x1d70 [ 461.893820] [] __inet_stream_connect+0x2a9/0xc30 [ 461.893825] [] ? inet_dgram_connect+0x200/0x200 [ 461.893829] [] ? kasan_kmalloc+0xc7/0xe0 [ 461.893834] [] ? tcp_sendmsg+0x1671/0x2b20 [ 461.893839] [] ? kmem_cache_alloc_trace+0x104/0x2c0 [ 461.893843] [] tcp_sendmsg+0x1214/0x2b20 [ 461.893849] [] ? debug_check_no_locks_freed+0x210/0x210 [ 461.893853] [] ? tcp_sendpage+0x1840/0x1840 [ 461.893858] [] ? inet_sendmsg+0x143/0x4d0 [ 461.893862] [] inet_sendmsg+0x203/0x4d0 [ 461.893866] [] ? inet_sendmsg+0x73/0x4d0 [ 461.893871] [] ? inet_recvmsg+0x4c0/0x4c0 [ 461.893875] [] sock_sendmsg+0xcc/0x110 [ 461.893879] [] SYSC_sendto+0x21c/0x370 [ 461.893884] [] ? SYSC_connect+0x300/0x300 [ 461.893894] [] ? sock_has_perm+0x29f/0x400 [ 461.893899] [] ? selinux_file_send_sigiotask+0x310/0x310 [ 461.893905] [] ? selinux_netlbl_socket_setsockopt+0x97/0x340 [ 461.893910] [] ? selinux_netlbl_sock_rcv_skb+0x400/0x400 [ 461.893917] [] ? SyS_futex+0x1f8/0x300 [ 461.893922] [] ? do_futex+0x1770/0x1770 [ 461.893928] [] ? move_addr_to_kernel+0x50/0x50 [ 461.893934] [] SyS_sendto+0x40/0x50 [ 461.893939] [] entry_SYSCALL_64_fastpath+0x22/0x9e [ 461.893941] [ 461.893942] The buggy address belongs to the page: [ 461.893946] page:ffffea00076241c0 count:0 mapcount:0 mapping: (null) index:0x0 [ 461.893949] flags: 0x8000000000000000() [ 461.893951] page dumped because: kasan: bad access detected [ 461.893952] [ 461.893953] Memory state around the buggy address: [ 461.893957] ffff8801d8907780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 461.893961] ffff8801d8907800: 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 f2 f2 [ 461.893964] >ffff8801d8907880: f2 f2 00 00 00 00 00 00 00 00 00 00 f2 f2 00 00 [ 461.893965] ^ [ 461.893969] ffff8801d8907900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 461.893972] ffff8801d8907980: 00 00 00 f1 f1 f1 f1 00 00 00 00 00 f2 f2 f2 00 [ 461.893973] ================================================================== [ 461.893974] Disabling lock debugging due to kernel taint [ 461.893991] Kernel panic - not syncing: panic_on_warn set ... [ 461.893991] [ 461.893997] CPU: 1 PID: 30660 Comm: syz-executor5 Tainted: G B 4.4.132-g46155cc #42 [ 461.893999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.894006] 0000000000000000 4291dd3e9f24b797 ffff8801d8907370 ffffffff81e0df8d [ 461.894012] ffffffff841ed0cf 0000000000000001 0000000000000000 ffff8801d89078e0 [ 461.894018] 0000000000000000 ffff8801d8907430 ffffffff81409de4 0000000041b58ab3 [ 461.894019] Call Trace: [ 461.894030] [] dump_stack+0xc1/0x124 [ 461.894035] [] panic+0x19e/0x38d [ 461.894039] [] ? add_taint.cold.4+0x16/0x16 [ 461.894043] [] kasan_end_report+0x47/0x4f [ 461.894047] [] kasan_report.cold.7+0x192/0x2f7 [ 461.894054] [] ? memcmp+0x126/0x160 [ 461.894059] [] __asan_report_load1_noabort+0x14/0x20 [ 461.894064] [] memcmp+0x126/0x160 [ 461.894070] [] ? __lock_is_held+0xa2/0xf0 [ 461.894076] [] xfrm_selector_match+0x12d/0xe50 [ 461.894082] [] xfrm_sk_policy_lookup+0x151/0x350 [ 461.894087] [] ? xfrm_sk_policy_lookup+0x42/0x350 [ 461.894092] [] xfrm_lookup+0x1b5/0xb70 [ 461.894097] [] ? ___preempt_schedule+0x12/0x14 [ 461.894103] [] ? xfrm_bundle_lookup+0x1220/0x1220 [ 461.894109] [] ? ip6_dst_lookup_tail+0x3b9/0x1460 [ 461.894114] [] ? ip6_dst_lookup_tail+0x454/0x1460 [ 461.894119] [] ? ip6_forward_finish+0x4a0/0x4a0 [ 461.894123] [] ? __kernel_text_address+0x6b/0xa0 [ 461.894127] [] ? print_context_stack+0x4b/0xd0 [ 461.894132] [] xfrm_lookup_route+0x39/0x1b0 [ 461.894137] [] ip6_dst_lookup_flow+0x1b7/0x2f0 [ 461.894142] [] ? ip6_dst_lookup+0x60/0x60 [ 461.894146] [] ? selinux_sk_getsecid+0x77/0xc0 [ 461.894150] [] tcp_v6_connect+0xd58/0x1b70 [ 461.894155] [] ? sock_sendmsg+0xcc/0x110 [ 461.894158] [] ? SYSC_sendto+0x21c/0x370 [ 461.894163] [] ? tcp_v6_syn_recv_sock+0x1f20/0x1f20 [ 461.894168] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 461.894172] [] ? _raw_spin_unlock_irq+0x38/0x50 [ 461.894177] [] ? __schedule+0x7d4/0x1d70 [ 461.894181] [] __inet_stream_connect+0x2a9/0xc30 [ 461.894186] [] ? inet_dgram_connect+0x200/0x200 [ 461.894190] [] ? kasan_kmalloc+0xc7/0xe0 [ 461.894195] [] ? tcp_sendmsg+0x1671/0x2b20 [ 461.894199] [] ? kmem_cache_alloc_trace+0x104/0x2c0 [ 461.894203] [] tcp_sendmsg+0x1214/0x2b20 [ 461.894208] [] ? debug_check_no_locks_freed+0x210/0x210 [ 461.894214] [] ? tcp_sendpage+0x1840/0x1840 [ 461.894218] [] ? inet_sendmsg+0x143/0x4d0 [ 461.894223] [] inet_sendmsg+0x203/0x4d0 [ 461.894227] [] ? inet_sendmsg+0x73/0x4d0 [ 461.894232] [] ? inet_recvmsg+0x4c0/0x4c0 [ 461.894236] [] sock_sendmsg+0xcc/0x110 [ 461.894240] [] SYSC_sendto+0x21c/0x370 [ 461.894244] [] ? SYSC_connect+0x300/0x300 [ 461.894249] [] ? sock_has_perm+0x29f/0x400 [ 461.894253] [] ? selinux_file_send_sigiotask+0x310/0x310 [ 461.894259] [] ? selinux_netlbl_socket_setsockopt+0x97/0x340 [ 461.894264] [] ? selinux_netlbl_sock_rcv_skb+0x400/0x400 [ 461.894269] [] ? SyS_futex+0x1f8/0x300 [ 461.894273] [] ? do_futex+0x1770/0x1770 [ 461.894278] [] ? move_addr_to_kernel+0x50/0x50 [ 461.894283] [] SyS_sendto+0x40/0x50 [ 461.894288] [] entry_SYSCALL_64_fastpath+0x22/0x9e [ 461.901474] Dumping ftrace buffer: [ 461.901477] (ftrace buffer empty) [ 461.901479] Kernel Offset: disabled [ 462.769377] Rebooting in 86400 seconds..