INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.7' (ECDSA) to the list of known hosts. 2018/04/16 22:56:22 fuzzer started 2018/04/16 22:56:22 dialing manager at 10.128.0.26:43021 2018/04/16 22:56:28 kcov=true, comps=false 2018/04/16 22:56:31 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) getsockname$ax25(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) ioctl$TIOCSCTTY(r0, 0x540e, 0x101) getpeername$packet(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000100)=0x14) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000140)) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r0}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfffffffffffff001, 0x1, [0x5]}, &(0x7f0000000280)=0xa) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000002c0)={r3, 0xb, "a8252b3e548a249108b7ad"}, &(0x7f0000000300)=0x13) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r3, 0x25d585f1, 0x2, [0x4, 0x6]}, &(0x7f0000000380)=0xc) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000003c0)={0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000400)={r5, 0x80000, r0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) setsockopt$packet_int(r2, 0x107, 0x12, &(0x7f0000000480)=0x1, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000004c0)={0x7fffffff, 0x1, 0x6, 0x2, r4}, &(0x7f0000000500)=0x10) pwritev(r0, &(0x7f00000007c0)=[{&(0x7f0000000540)="f354af8000312211f594ee2d1790f98dcfb6b637e9b141ce3e20ba853c8e9a09f2b4ff6326ebc07c92353ab25119b427ca98b5", 0x33}, {&(0x7f0000000580)="b780a0633a6292f54c14169882934cfbd9aacadbf1382c9d335b057ff37ca2716f4139655870b8674de68bf2dcba793883b220a4e141ab3d4c7ffae9c4c6f0c5a3886996efd8b419d26d19bbd58175099d97e302ed275c97b316870a6e8885edc4594917ddda20fd7b21d96de584a155bac8b7d72f9d30a526a5935d624ed0c7103f28a9c3d2273083f03860194a55a16c", 0x91}, {&(0x7f0000000640)="79a8165193d58756ac56d62e44ca56772d4ffadffa86dd1b9ed8e6d573b18c143445022b5d3e6b28fff7ec7c2fe2f0b12d980b7893d4183bb946b591abb65e429ac0443fbc1498df", 0x48}, {&(0x7f00000006c0)="eed3c6fcd664d9f3dd9d94d5dc0b8f6d059fad1875691d272fa7945b3a125533d19c1f46d7b0ebc5685664e9f668", 0x2e}, {&(0x7f0000000700)="4beffb4e554799f44b55b76f224e00522cc4e466375fa12262fc17c5de55f7f17920fb5c9bcdaa21c7eeb199a0718417f9651ad8c12f86d5e1f6ebd1ac08a9a7e041e34a30d33a813b64aae4fcdaebcd105cb56456381266b79a01231174cf7cc97d05c503a7fb82eb8df4533d2b1030169f5da33787d16c4d6ec0ec60acf333c1d8b1d3b86453e7185d4cc28ba7e5f877365cc67e05837ace53036425bfe48b510c73e2ecfdeac5ef09b5f2f0e184aa626f09f0284aeaea3a4611dd5a", 0xbd}], 0x5, 0x0) r7 = getegid() getresgid(&(0x7f0000000840), &(0x7f0000000880)=0x0, &(0x7f00000008c0)) setregid(r7, r8) fstat(r2, &(0x7f0000000900)) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000980)={@in6={{0xa, 0x4e20, 0x8, @empty, 0xccfa}}, 0x4, 0x4, 0xb36, "d5ab7d6fa215a2b0d32df507782cf38f507a8c1153ad0cad2862d23c2bd9ee64a6047c4ba39326837b1f51da545365c1883310a0f976a05fdc71f964eb930e9d1431b0bffb955d7e190c365f2e31294a"}, 0xd8) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000000a80)={0xff, 0x1, 0x100, 0x4c3}) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000b40)={'IDLETIMER\x00'}, &(0x7f0000000b80)=0x1e) sendto$packet(r2, &(0x7f0000000bc0)="2e6d113fd0cc2c03dac4e5ec85d6cc5ec6084cb82ad2a8ff7a871be06cb771b7f60f047f66f6a7372887f985515578", 0x2f, 0x80, &(0x7f0000000c00)={0x11, 0x1f, r1, 0x1, 0x10000, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000c40)=0x0) fcntl$lock(r6, 0x7, &(0x7f0000000c80)={0x0, 0x1, 0x1, 0x8, r9}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000cc0)={r3, 0x6fe8}, &(0x7f0000000d00)=0x8) 2018/04/16 22:56:32 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40400, 0x0) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x4c, "dcb8f27703d58c99be977fae256889532c1ffe70e3913882ea7de573bd75f21c9b54709d18641943a9c4de03635c33aacac85b65af6f2d6f65bdd313546320bf065c180ec30b2eb1aa3dc54b"}, &(0x7f0000000100)=0x54) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0x100000001}, &(0x7f0000000180)=0x8) r3 = msgget$private(0x0, 0x0) msgctl$IPC_INFO(r3, 0x3, &(0x7f00000001c0)=""/137) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000280)=0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000002c0)={'security\x00', 0x1f, "a308a68e8496bd9d6d37be4b0914b2e853c56803132318cee52208fdf6962a"}, &(0x7f0000000340)=0x43) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={r2, 0x7f, 0x129, 0x6, 0x9, 0x9, 0x81, 0x80000000, {r2, @in={{0x2, 0x4e21, @loopback=0x7f000001}}, 0x200, 0x9, 0x2, 0x40, 0x6}}, &(0x7f0000000440)=0xb0) rt_sigqueueinfo(r4, 0x19, &(0x7f0000000480)={0x34, 0x1f, 0x5, 0x40}) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000004c0)={r5, 0x2}, 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000500)={r6, 0x69, "bf65f68d6bbb7cc1d1dbe7de8515b1ed6ab9e5b9749ba44b696998a66391e4f869452fea667e80e0c086f595ac18ef8bda4b5175fe87b4fac26f0e90b9befc82fd9e74e6d5e406c8a7916783f0c10f62493748b6a917a08dd60b0ffe0d38fc080dc6d0de54462db096"}, &(0x7f0000000580)=0x71) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000005c0)={r5, 0x8a, "d7060cbc21e4e1eb8845859ca067cca2df2746f84b76827c45420ba724d4d09cfe8881250b6266fee43ace2adf9f45d87284da6d5ce520a93bdf98677f8f0f11c2ff1cb3ed3d37b1de44e2a017797e3d8578a856c736c01a37b91dc8dc815bf1b59c6affe0df85022f3b1be78f30c277699deac0e2338059776806dacdaed7c381477c329f6cb129ea70"}, &(0x7f0000000680)=0x92) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000006c0)={r1, @in6={{0xa, 0x4e22, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x100}}, 0x80, 0x81}, 0x90) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000780)={0x2, [0x61d94aab, 0x200]}, &(0x7f00000007c0)=0x8) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000800)={'\x00', {0x2, 0x40, @local={0xac, 0x14, 0x14, 0xaa}}}) fcntl$getflags(r0, 0x40b) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000840)={r7, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}}, 0x84) r8 = syz_open_dev$mouse(&(0x7f0000000900)='/dev/input/mouse#\x00', 0x518, 0x0) exit(0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000940)={r6, 0x101, 0x5, 0x6, 0x8, 0x3, 0x4, 0x9, {r5, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0xd, 0xee, 0x2, 0x0, 0x6}}, &(0x7f0000000a00)=0xb0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000a40)=0xfffffffffffffefd, 0x4) ioctl$sock_inet_SIOCGIFADDR(r8, 0x8915, &(0x7f0000000a80)={'lo\x00', {0x2, 0x4e24}}) ioctl$sock_inet_SIOCGIFDSTADDR(r8, 0x8917, &(0x7f0000000ac0)={'bpq0\x00', {0x2, 0x4e22}}) ioctl$DRM_IOCTL_AGP_INFO(r8, 0x80386433, &(0x7f0000000b00)=""/111) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000b80)={0x0, 0xffff, 0xfff, 0x0, 0x7}) syz_open_dev$vcsn(&(0x7f0000000c00)='/dev/vcs#\x00', 0x200, 0x200100) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000c40)={'mangle\x00', 0x11, "3320f2e206cbf20743a84848b1c6fea569"}, &(0x7f0000000c80)=0x35) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000cc0)={'ah\x00'}, &(0x7f0000000d00)=0x1e) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000d40)={@loopback, @local}, &(0x7f0000000d80)=0x8) 2018/04/16 22:56:32 executing program 7: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x7, @local={0xfe, 0x80, [], 0xaa}, 0x5}}, [0x8, 0x40, 0x2, 0x5, 0xffffffff7fffffff, 0x80, 0x7, 0x8001, 0x44, 0x4, 0x7fffffff, 0x5, 0x101, 0x0, 0x10000]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r2, 0xfffffffffffffffe, 0xff, 0x5}, 0x10) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={r2, 0xffff, 0x3}, 0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000280)=@sack_info={r2, 0xffffffffffffffff, 0x7f}, &(0x7f00000002c0)=0xc) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e21, 0x7f, @loopback={0x0, 0x1}, 0xff}}, 0xff9, 0x5, 0x3, "533d3838f3ed298e0a654721b6ed9923b17958d38adf9b26571e4838ce049bf4d97815c86dec1e0c7c5a4d67eccd2d991c6b8481256d1419dba7ef54457e9a4132703d3b6c976a1af5a56abfe33795a9"}, 0xd8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000400)={r3, 0x3ff}, &(0x7f0000000440)=0x8) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000480)={0x5, 0x7b44, 0x2, 0x0, 0x17}) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000500)={r3, 0x101, 0x0, 0x7}, 0x10) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000540)={'ifb0\x00', 0x400}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000580)={r4, @in={{0x2, 0x4e22, @broadcast=0xffffffff}}, [0x0, 0x10000, 0x3, 0x995, 0x800, 0x9, 0x0, 0x1, 0x9, 0x8, 0xff, 0x20, 0x80, 0x80000000, 0x1]}, &(0x7f0000000680)=0x100) syz_open_dev$tun(&(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x2080) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000700)={r5, 0x800, 0x5}, 0x8) execve(&(0x7f0000000740)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000780)='/dev/net/tun\x00', &(0x7f00000007c0)='keyring\x00', &(0x7f0000000800)='/dev/net/tun\x00'], &(0x7f0000000ac0)=[&(0x7f0000000880)='\x00', &(0x7f00000008c0)='wlan0!R\x00', &(0x7f0000000900)='/dev/net/tun\x00', &(0x7f0000000940)='/dev/net/tun\x00', &(0x7f0000000980)='ifb0\x00', &(0x7f00000009c0)='systemvboxnet1userx}\x00', &(0x7f0000000a00)='ppp0o+\'vboxnet1em1\x00', &(0x7f0000000a40)='cgroup\x00', &(0x7f0000000a80)='ifb0\x00']) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000b40)=0x1, 0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000b80)={r5, 0x100}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000bc0)=[{0x3, 0x2}, {0x7}, {0x7, 0x2}, {0x3, 0x10001}, {0x2, 0x2}, {0xb, 0x63}, {0x4, 0x1}], 0x7) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000c00)={r2, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}}, 0x84) r6 = shmat(0x0, &(0x7f0000003000/0x6000)=nil, 0x2000) shmdt(r6) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000cc0)='tls\x00', 0x4) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r7 = semget$private(0x0, 0x7, 0x400) semctl$GETZCNT(r7, 0x2, 0xf, &(0x7f0000000d00)=""/233) semctl$GETALL(r7, 0x0, 0xd, &(0x7f0000000e00)=""/49) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000e40)=[@in={0x2, 0x4e24, @loopback=0x7f000001}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, @in={0x2, 0x4e20}], 0x30) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000e80)={{0x0, 0x0, 0x3, 0x2, 0x9}}) ioctl$TIOCSCTTY(r1, 0x540e, 0x8) semctl$IPC_RMID(r7, 0x0, 0x0) 2018/04/16 22:56:32 executing program 1: socketpair(0x9, 0xa, 0x80000000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000180)={0x2, &(0x7f0000000040)=[{}, {}]}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'dummy0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in=@dev={0xac, 0x14, 0x14, 0x1c}, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e23, 0x4, 0x4e20, 0x81, 0x2, 0xa0, 0x20, 0x3c, r2, r4}, {0x6, 0x6b, 0x70, 0x2, 0x8, 0x800, 0x8, 0x3}, {0x7ff, 0x5, 0x8, 0x1}, 0xf7, 0x6e6bbe, 0x0, 0x1, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4d4, 0x6c}, 0xa, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x3502, 0x6, 0x3, 0x8, 0xb39, 0x100000001, 0x7}}, 0xe8) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x30, r5, 0x10, 0x70bd29, 0x25dfdbfb, {0x11}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1=0xe0000001}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4) sendfile(r1, r1, &(0x7f0000000580)=0x5a, 0xc9) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000600)={0x1, &(0x7f00000005c0)=[{0x20, 0x5, 0x375, 0x8f92}]}, 0x10) write$binfmt_script(r1, &(0x7f0000000640)={'#! ', './file0', [{0x20, '!vboxnet1bdeveth0-'}, {0x20, 'IPVS\x00'}], 0xa, "e945e0127aae7b31596999"}, 0x2f) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000680)={{0xa, 0x4e20, 0x80, @empty, 0x6}, {0xa, 0x4e20, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, 0x7, [0x69, 0x4, 0x80, 0x48, 0x1f, 0xfffffffffffffffb, 0x10001, 0xc9da]}, 0x5c) close(r1) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000700)={0x8001, 0x7, 0x7, 0x8000, 0x2, [{0x200, 0x6, 0x4, 0x0, 0x0, 0x380}, {0x2000000, 0x10001, 0xfffffffffffffffb}]}) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000007c0)={0x0, 0x5310d7ff}, 0x8) recvmmsg(r1, &(0x7f0000002fc0)=[{{&(0x7f0000000800)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000880)=""/229, 0xe5}, {&(0x7f0000000980)=""/197, 0xc5}], 0x2, &(0x7f0000000ac0)=""/224, 0xe0, 0x101}, 0x2}, {{&(0x7f0000000bc0)=@in={0x0, 0x0, @rand_addr}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000c40)=""/150, 0x96}, {&(0x7f0000000d00)=""/56, 0x38}, {&(0x7f0000000d40)=""/59, 0x3b}, {&(0x7f0000000d80)=""/127, 0x7f}, {&(0x7f0000000e00)=""/119, 0x77}, {&(0x7f0000000e80)=""/94, 0x5e}], 0x6, &(0x7f0000000f80)=""/96, 0x60, 0x9}, 0xb5}, {{&(0x7f0000001000)=@sco, 0x80, &(0x7f0000002240)=[{&(0x7f0000001080)=""/240, 0xf0}, {&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000002180)=""/173, 0xad}], 0x3, &(0x7f0000002280)=""/191, 0xbf, 0xfffffffffffff801}, 0x101}, {{&(0x7f0000002340)=@sco, 0x80, &(0x7f00000024c0)=[{&(0x7f00000023c0)=""/67, 0x43}, {&(0x7f0000002440)=""/76, 0x4c}], 0x2, &(0x7f0000002500)=""/54, 0x36, 0x8}, 0x1}, {{&(0x7f0000002540)=@ax25, 0x80, &(0x7f0000002700)=[{&(0x7f00000025c0)=""/233, 0xe9}, {&(0x7f00000026c0)=""/51, 0x33}], 0x2, &(0x7f0000002740)=""/114, 0x72}, 0x8000}, {{&(0x7f00000027c0)=@nl=@proc, 0x80, &(0x7f0000002840), 0x0, &(0x7f0000002880)=""/129, 0x81, 0x5}, 0x2}, {{&(0x7f0000002940)=@nfc, 0x80, &(0x7f0000002a40)=[{&(0x7f00000029c0)=""/118, 0x76}], 0x1, &(0x7f0000002a80)=""/235, 0xeb, 0x3}, 0x81}, {{&(0x7f0000002b80)=@can, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002c00)=""/62, 0x3e}, {&(0x7f0000002c40)=""/19, 0x13}, {&(0x7f0000002c80)=""/67, 0x43}, {&(0x7f0000002d00)=""/206, 0xce}, {&(0x7f0000002e00)=""/92, 0x5c}, {&(0x7f0000002e80)=""/73, 0x49}], 0x6, &(0x7f0000002f80)=""/17, 0x11, 0x9}, 0x94}], 0x8, 0x40, &(0x7f00000031c0)) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000003200)={0x2, 0x7ff}, 0x2) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000003240)={0x0, 0x2}, &(0x7f0000003280)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000032c0)={0x7, 0x8, 0xfffffffffffffffe, 0x4d21, r7}, &(0x7f0000003300)=0x10) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000003340)=[@in6={0xa, 0x4e23, 0x2, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x10}}}, @in6={0xa, 0x4e24, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x1ff}], 0x38) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000003380), &(0x7f0000003400)=0x68) r8 = getpgrp(0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000003440)={0x0, 0x0, 0x0}, &(0x7f0000003480)=0xc) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000034c0)={r8, r4, r9}, 0xc) r10 = accept(r6, &(0x7f0000003500)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, &(0x7f0000003580)=0x80) ioctl$TIOCSBRK(r0, 0x5427) dup3(r1, r1, 0x80000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000003640)={r7, 0x58, &(0x7f00000035c0)=[@in6={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x800}, 0x3f}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e24, 0x8, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}]}, &(0x7f0000003680)=0x10) recvfrom$packet(r1, &(0x7f00000036c0)=""/62, 0x3e, 0x10001, &(0x7f0000003700)={0x11, 0x9, r3, 0x1, 0x2003, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) accept$unix(r10, &(0x7f0000003740)=@abs, &(0x7f00000037c0)=0x6e) 2018/04/16 22:56:32 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000040)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x51, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 2018/04/16 22:56:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x1000000000803, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000040)=@buf={0x0, &(0x7f00000000c0)}) 2018/04/16 22:56:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'erspan0\x00', 0x0}) sendto$packet(r0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000002c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x14) 2018/04/16 22:56:32 executing program 6: r0 = socket$inet6(0xa, 0x80003, 0xef) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=@fragment, 0x8) sendto$inet6(r0, &(0x7f0000001ffe), 0x0, 0x0, &(0x7f0000003000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) syzkaller login: [ 45.475378] ip (3762) used greatest stack depth: 54672 bytes left [ 45.704090] ip (3782) used greatest stack depth: 54312 bytes left [ 46.828017] ip (3894) used greatest stack depth: 53656 bytes left [ 47.199335] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.205840] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.229841] device bridge_slave_0 entered promiscuous mode [ 47.250339] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.256824] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.294262] device bridge_slave_0 entered promiscuous mode [ 47.313120] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.319614] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.330098] device bridge_slave_0 entered promiscuous mode [ 47.346906] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.353408] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.374718] device bridge_slave_0 entered promiscuous mode [ 47.390829] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.397340] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.422980] device bridge_slave_0 entered promiscuous mode [ 47.460508] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.466989] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.481262] device bridge_slave_1 entered promiscuous mode [ 47.489847] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.496322] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.527309] device bridge_slave_1 entered promiscuous mode [ 47.533667] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.540175] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.567225] device bridge_slave_0 entered promiscuous mode [ 47.585914] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.592392] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.610928] device bridge_slave_1 entered promiscuous mode [ 47.625630] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.636732] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.643216] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.661653] device bridge_slave_0 entered promiscuous mode [ 47.677910] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.684453] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.705226] device bridge_slave_1 entered promiscuous mode [ 47.712338] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.718835] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.745331] device bridge_slave_1 entered promiscuous mode [ 47.759768] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.766308] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.783332] device bridge_slave_0 entered promiscuous mode [ 47.808351] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.817892] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 47.828506] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.835135] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.860852] device bridge_slave_1 entered promiscuous mode [ 47.871799] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.879335] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.885780] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.916065] device bridge_slave_1 entered promiscuous mode [ 47.947222] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.955622] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.967587] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 47.985435] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.028102] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.034610] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.074562] device bridge_slave_1 entered promiscuous mode [ 48.108681] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.125221] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.148550] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.163812] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.173755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.322684] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 48.332890] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.549190] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 48.905152] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 48.996082] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.091179] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.113159] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.141153] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.149681] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.219645] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.227777] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.293069] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.325724] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.343250] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.399741] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.422084] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.515262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 49.581189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 49.711637] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 50.190520] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.216356] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.341098] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.350651] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.407118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.427776] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.454756] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.462513] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.539137] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.571228] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.578650] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.629799] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.650325] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.657937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.670748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.708608] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.716726] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.724555] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 50.733991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.769846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.800801] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.808770] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.817637] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.825958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.857666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.889287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.917075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.934213] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 50.951461] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 50.959469] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.970792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 50.995349] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.003422] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.011522] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.019833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.033305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.041972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.065951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.094905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.111718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.130654] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.141523] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 51.151711] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.158799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.171821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.187926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.207295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.228103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.243760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.252686] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.263117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.271611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.292687] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.302578] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.321535] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.329285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.350108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.385286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.419730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.450971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.471588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.486922] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 51.510816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.548301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.303961] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.310539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.317434] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.323889] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.342622] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.349762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.507014] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.513549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.520437] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.526908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.545767] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.578992] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.585489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.592343] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.598792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.674897] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.682382] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.688821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.695646] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.702133] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.724600] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.740948] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.747440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.754320] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.760783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.777782] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.792142] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.798612] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.805518] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.811949] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.864721] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.871523] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.878007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.884940] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.891389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.907212] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 53.925159] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.931605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.938416] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.944863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.982469] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.367481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.376673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.406727] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.425671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.439261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.448520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.457407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.866477] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 62.988171] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.148708] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.214972] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.272912] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.408483] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.524473] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.535008] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 63.671889] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.678161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.688625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.773292] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.779551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.788974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.944348] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 63.950585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.962112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.051881] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.058168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.068150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.111576] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.127176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.139486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.325632] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.331929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.349787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.380633] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.386926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.398643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.425114] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 64.433533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.471644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/16 22:56:58 executing program 7: r0 = socket(0x100000010, 0x3, 0x0) write(r0, &(0x7f0000000080)="1f0000001e003d1d8d70ffe60802007702000600536b8d3d6c04080001454a", 0x1f) 2018/04/16 22:56:58 executing program 6: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrusage(0x0, &(0x7f0000000040)) 2018/04/16 22:56:58 executing program 4: syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 2018/04/16 22:56:58 executing program 7: r0 = socket$inet(0x2, 0x6, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}, {@in6, 0x0, 0x33}, @in=@broadcast=0xffffffff, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}, 0x1}, 0x0) 2018/04/16 22:56:58 executing program 6: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x380, [0x20000140, 0x0, 0x0, 0x20000170, 0x200002d0], 0x0, &(0x7f0000000100), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'gretap0\x00', 'tunl0\x00', 'syzkaller0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xf8, 0x130}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x81, 'syz0\x00'}}}, @arpreply={'arpreply\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}]}, @arpreply={'arpreply\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0xd, 0x0, 0x0, 'dummy0\x00', 'bpq0\x00', 'ip6tnl0\x00', 'sit0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}, {{{0x9, 0x0, 0x0, 'bridge0\x00', 'ip6tnl0\x00', 'bcsh0\x00', 'vlan0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0xc0, 0xc0, 0xf0, [@ipvs={'ipvs\x00', 0x28, {{@ipv4=@local={0xac, 0x14, 0x14, 0xaa}}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x3f8) 2018/04/16 22:56:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x9}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0xa, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) 2018/04/16 22:56:59 executing program 5: r0 = accept$netrom(0xffffffffffffff9c, &(0x7f0000000180)=@full, &(0x7f0000000080)=0x48) r1 = accept4(r0, &(0x7f0000000200)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, &(0x7f0000000280)=0x80, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}, 0xd87, 0xb9, 0x81, 0x5, 0x50}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000480)={r2, 0x8}, &(0x7f00000004c0)=0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'yam0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', 0x0, 0x8}, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000340)) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = socket$netlink(0x10, 0x3, 0xc) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000500)={0x0, 0x19, "5def0d856edde304cee9d36a527796db84c3cabe8f1a37467f"}, &(0x7f0000000540)=0x21) bind$netlink(r5, &(0x7f0000000140)={0x10, 0x0, 0x0, 0xffffffffffeffffe}, 0xc) bind$netlink(r5, &(0x7f0000436ff4)={0x10}, 0xc) 2018/04/16 22:56:59 executing program 6: open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f00000005c0), 0x1000, &(0x7f0000000340)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x8001}], 0x0, &(0x7f0000000580)=ANY=[]) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x2, 0x100011, r0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x15555555555555bf, &(0x7f00000002c0), 0x0, &(0x7f0000000780)=ANY=[]) 2018/04/16 22:57:00 executing program 0: syz_emit_ethernet(0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00142f00fe8000000000000000000000000000aafe8000000000000000000000000000aa00006558", @ANYRES32=0x41424344, @ANYBLOB="eba49e439bf064f440729f03"], &(0x7f0000000000)) 2018/04/16 22:57:00 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f00000005c0), 0x1000, &(0x7f0000000340)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x8001}], 0x0, &(0x7f0000000580)=ANY=[]) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x2, 0x100011, r0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x15555555555555bf, &(0x7f00000002c0), 0x0, &(0x7f0000000780)=ANY=[]) 2018/04/16 22:57:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x9}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0xa, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) 2018/04/16 22:57:00 executing program 1: r0 = memfd_create(&(0x7f00000005c0)="6465762046a80d01bed3c1e1c85fe2dbef94a677a99248217280a42d688043cc913ddb112187ee23355083fc8a1eed8f3d1a468b405da49550403420a5685e12afb758b1bfcf91d09bfe61b023e1b04f2f8e23a38e1ef575997d875079d8275500cf932de25ff116808e0097e9a30f89ffec73d758337ba4ecfe26e0709dceb3bc100af911f29826293f7e6d4cbbb7fa03189e2fd5b9461150c1f6c46be2eddd2f84ce8136164ee052fdf7c5919654885d693f6c70f42b0eef3f33160056b93855cb84bf62730fd9afe77c1b8d7b0b9dcc2a7566f6067be13c15bbbc440e796acc56b204c7f48fcdfa2e84e52a95", 0x3) write(r0, &(0x7f0000000240)='v', 0x1) sendfile(r0, r0, &(0x7f0000000080), 0x10002) fcntl$addseals(r0, 0x409, 0x0) getuid() fsetxattr(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="6f73782e007b844301accb80b493c55194ff6e4140caf1aa0cb23c35070097f8747bec144f14ea84fc113915e90b175fef492f58dedb7089ebe972ac024f531e82212640c6"], &(0x7f0000000280)="6465762046a80d01bed3c1e1c85fe2dbef94a677a99248217280a42d688043cc913ddb112187ee23355083fc8a1eed8f3d1a468b405da49550403420a5685e12afb758b1bfcf91d09bfe61b023e1b04f2f8e23a38e1ef575997d875079d8275500cf932de25ff116808e0097e9a30f89ffec73d758337ba4ecfe26e0709dceb3bc100af911f29826293f7e6d4cbbb7fa03189e2fd5b9461150c1f6c46be2eddd2f84ce8136164ee052fdf7c5919654885d693f6c70f42b0eef3f33160056b93855cb84bf62730fd9afe77c1b8d7b0b9dcc2a7566f6067be13c15bbbc440e796acc56b204c7f48fcdfa2e84e52a95", 0xee, 0x1) 2018/04/16 22:57:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000018000)={&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x0, @loopback={0x0, 0x7}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000180)="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", 0x599}], 0x1, &(0x7f0000001180)}, 0x0) 2018/04/16 22:57:00 executing program 6: open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f00000005c0), 0x1000, &(0x7f0000000340)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x8001}], 0x0, &(0x7f0000000580)=ANY=[]) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x2, 0x100011, r0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x15555555555555bf, &(0x7f00000002c0), 0x0, &(0x7f0000000780)=ANY=[]) 2018/04/16 22:57:00 executing program 7: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000c55000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x1, 0x3) 2018/04/16 22:57:00 executing program 2: getrandom(&(0x7f0000000000)=""/4096, 0xffffffffffffff42, 0x3) 2018/04/16 22:57:00 executing program 7: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000c55000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x1, 0x3) 2018/04/16 22:57:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000140)="220000001e0007ffe908160f0916072300000000000000001af2fe38050008800100", 0x22) 2018/04/16 22:57:00 executing program 2: getrandom(&(0x7f0000000000)=""/4096, 0xffffffffffffff42, 0x3) 2018/04/16 22:57:00 executing program 0: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/16 22:57:00 executing program 4: r0 = open(&(0x7f0000000240)='./file0\x00', 0x14104a, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}], 0x18) sendfile(r0, r0, &(0x7f0000000080), 0x100000001) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) rename(&(0x7f0000557000)='./file0\x00', &(0x7f0000473000)='./control\x00') 2018/04/16 22:57:00 executing program 2: getrandom(&(0x7f0000000000)=""/4096, 0xffffffffffffff42, 0x3) 2018/04/16 22:57:00 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000140)="220000001e0007ffe908160f0916072300000000000000001af2fe38050008800100", 0x22) 2018/04/16 22:57:00 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040)="bb", 0x1, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept4(r1, &(0x7f00003ad000)=@l2, &(0x7f00008f1ffc)=0x80, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000140)={&(0x7f0000000800)={0x10}, 0xc, &(0x7f00000008c0)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/98, 0x62}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/195, 0xc3}], 0x3, 0x0) [ 71.956737] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/16 22:57:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0xfffffffffffffff9, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x2000000ffff}, 0x54) getpeername(r0, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x80) 2018/04/16 22:57:01 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040)="bb", 0x1, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept4(r1, &(0x7f00003ad000)=@l2, &(0x7f00008f1ffc)=0x80, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000140)={&(0x7f0000000800)={0x10}, 0xc, &(0x7f00000008c0)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/98, 0x62}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/195, 0xc3}], 0x3, 0x0) 2018/04/16 22:57:01 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000010c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000001280)='cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/4096, 0x1000) 2018/04/16 22:57:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040)="bb", 0x1, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept4(r1, &(0x7f00003ad000)=@l2, &(0x7f00008f1ffc)=0x80, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000140)={&(0x7f0000000800)={0x10}, 0xc, &(0x7f00000008c0)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/98, 0x62}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/195, 0xc3}], 0x3, 0x0) 2018/04/16 22:57:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="000103664900") getdents(r0, &(0x7f0000000100)=""/215, 0x24) 2018/04/16 22:57:01 executing program 2: getrandom(&(0x7f0000000000)=""/4096, 0xffffffffffffff42, 0x3) 2018/04/16 22:57:01 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000140)="220000001e0007ffe908160f0916072300000000000000001af2fe38050008800100", 0x22) 2018/04/16 22:57:01 executing program 6: r0 = open(&(0x7f0000000240)='./file0\x00', 0x14104a, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}], 0x18) sendfile(r0, r0, &(0x7f0000000080), 0x100000001) rename(&(0x7f0000557000)='./file0\x00', &(0x7f0000473000)='./control\x00') [ 72.830457] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 72.830470] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/16 22:57:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00005d5ff3)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000a, &(0x7f0000df8ffc)=0x400000000005, 0x4) sendto$inet(r0, &(0x7f0000de1fff), 0x4e, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f00000030c0)={0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000002e40)=""/255, 0xff}], 0x1, &(0x7f0000002fc0)=""/205, 0xcd}, 0x0) sendto$inet(r0, &(0x7f0000000040)="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", 0x531, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000df6fc8)={&(0x7f0000df6f80)=@generic, 0x80, &(0x7f0000df5000)=[{&(0x7f0000df6f74)=""/140, 0x8c}, {&(0x7f0000df5f18)=""/232, 0xe8}, {&(0x7f0000409fa2)=""/94, 0x5e}, {&(0x7f0000000800)=""/231, 0xe7}, {&(0x7f0000d76f57)=""/169, 0xa9}, {&(0x7f00009e3000)=""/230, 0xe6}, {&(0x7f0000923000)=""/37, 0x25}], 0x7, &(0x7f0000c27ff9)=""/7, 0x7}, 0x40000100) 2018/04/16 22:57:01 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000010c0)=@migrate={0xac, 0x21, 0x801, 0x0, 0x0, {{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@migrate={0x5c, 0x11, [{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@local={0xfe, 0x80, [], 0xaa}}, {@in6, @in=@multicast2=0xe0000002}]}]}, 0xac}, 0x1}, 0x0) 2018/04/16 22:57:01 executing program 2: mkdir(&(0x7f00000fd000)='./file0\x00', 0x0) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000033ff8)='./file0\x00', 0x0) mount(&(0x7f0000df2000)='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)="656372b6b374667300", 0x1001, &(0x7f0000000200)) unlinkat(r0, &(0x7f000057d000)='./file0\x00', 0x200) lgetxattr(&(0x7f00000000c0)='./file0/file0/file0\x00', &(0x7f0000000140)=@random={'trusted.', "656372b6b374667300"}, &(0x7f0000000200)=""/255, 0xff) 2018/04/16 22:57:02 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000280), 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000040)="be38fc69faea5bd09bf0307006cefbafc01c3062dfedf949ad4e86bda4029155e2d6181bc9f0d25d4a23fed54bd250db05a0fbd78679ca006afa4ee44cb7b522c4a38231a9f99b3001e1d4857321a6a7c9e36ae424cc0d49fdb6c13c422fde782dd0c18a3a4018030b94ba6b7ff3f3192f8c563a1986d839c40052c8d3a78ae29126", 0x82, 0xc1, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000500)="acbb915d6846975d5d248d4c727115f29ae03c05a1540f5303683cc3316fab70b8f72443207b3bc9d2b76a2124327a8dc22115702dfd81d9c5daf3734095c968bb4c931a63cd940101810cf243974b73d5c0d300e011c378c17bde5460ef55a7bcfe93f760a0a1928b8c0954a22b092351d191ed0effdcf4ac142f1fd6395e0e7303", 0x82, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000940)="9e6fc3414654f3c7d9b41ba48cbaf09aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7acdec844f667da0", 0x76, 0x0, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, 0x10) writev(r0, &(0x7f00002e1fe0)=[{&(0x7f0000c62f65)="db", 0x1}], 0x1) 2018/04/16 22:57:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040)="bb", 0x1, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept4(r1, &(0x7f00003ad000)=@l2, &(0x7f00008f1ffc)=0x80, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000140)={&(0x7f0000000800)={0x10}, 0xc, &(0x7f00000008c0)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/98, 0x62}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/195, 0xc3}], 0x3, 0x0) 2018/04/16 22:57:02 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) recvmsg(r0, &(0x7f0000ec7000)={&(0x7f0000cf1ff0)=@nfc, 0x10, &(0x7f0000000080), 0x0, &(0x7f00000da000)=""/4096, 0x1000}, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000ffffffffffff8137ffff001e0000000000001a8d69e24c920000ffffffff0000000000000000e538b83d67c6f6dda11db993a9ebf22a93dc9ab375076a2d66c7a95b7f536095e07e17ea41437ee0ea533fc8d4"], 0x0) ioctl$sock_netrom_SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000000c0)) 2018/04/16 22:57:02 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_icmp(0x15, 0xfffffffc, 0xfffffffe, &(0x7f00000002c0)) 2018/04/16 22:57:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040)="bb", 0x1, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept4(r1, &(0x7f00003ad000)=@l2, &(0x7f00008f1ffc)=0x80, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000140)={&(0x7f0000000800)={0x10}, 0xc, &(0x7f00000008c0)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/98, 0x62}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/195, 0xc3}], 0x3, 0x0) 2018/04/16 22:57:02 executing program 2: r0 = socket$kcm(0xa, 0x20000000000005, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={&(0x7f0000000600)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000e80)='+', 0x1}], 0x1, &(0x7f0000001380)}, 0x0) 2018/04/16 22:57:02 executing program 6: r0 = open(&(0x7f0000000240)='./file0\x00', 0x14104a, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}], 0x18) sendfile(r0, r0, &(0x7f0000000080), 0x100000001) rename(&(0x7f0000557000)='./file0\x00', &(0x7f0000473000)='./control\x00') 2018/04/16 22:57:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00005d5ff3)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000a, &(0x7f0000df8ffc)=0x400000000005, 0x4) sendto$inet(r0, &(0x7f0000de1fff), 0x4e, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f00000030c0)={0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000002e40)=""/255, 0xff}], 0x1, &(0x7f0000002fc0)=""/205, 0xcd}, 0x0) sendto$inet(r0, &(0x7f0000000040)="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", 0x531, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000df6fc8)={&(0x7f0000df6f80)=@generic, 0x80, &(0x7f0000df5000)=[{&(0x7f0000df6f74)=""/140, 0x8c}, {&(0x7f0000df5f18)=""/232, 0xe8}, {&(0x7f0000409fa2)=""/94, 0x5e}, {&(0x7f0000000800)=""/231, 0xe7}, {&(0x7f0000d76f57)=""/169, 0xa9}, {&(0x7f00009e3000)=""/230, 0xe6}, {&(0x7f0000923000)=""/37, 0x25}], 0x7, &(0x7f0000c27ff9)=""/7, 0x7}, 0x40000100) [ 73.806171] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 73.831576] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/16 22:57:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) mq_open(&(0x7f000004b000)="0b7d805374877286b5e4f2", 0x0, 0x0, &(0x7f000004b000)={0x3, 0x7}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000200)=""/234, &(0x7f0000000300)=0xea) 2018/04/16 22:57:03 executing program 2: unshare(0x60000000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 2018/04/16 22:57:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00005d5ff3)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000a, &(0x7f0000df8ffc)=0x400000000005, 0x4) sendto$inet(r0, &(0x7f0000de1fff), 0x4e, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f00000030c0)={0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000002e40)=""/255, 0xff}], 0x1, &(0x7f0000002fc0)=""/205, 0xcd}, 0x0) sendto$inet(r0, &(0x7f0000000040)="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", 0x531, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000df6fc8)={&(0x7f0000df6f80)=@generic, 0x80, &(0x7f0000df5000)=[{&(0x7f0000df6f74)=""/140, 0x8c}, {&(0x7f0000df5f18)=""/232, 0xe8}, {&(0x7f0000409fa2)=""/94, 0x5e}, {&(0x7f0000000800)=""/231, 0xe7}, {&(0x7f0000d76f57)=""/169, 0xa9}, {&(0x7f00009e3000)=""/230, 0xe6}, {&(0x7f0000923000)=""/37, 0x25}], 0x7, &(0x7f0000c27ff9)=""/7, 0x7}, 0x40000100) 2018/04/16 22:57:03 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000280), 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000040)="be38fc69faea5bd09bf0307006cefbafc01c3062dfedf949ad4e86bda4029155e2d6181bc9f0d25d4a23fed54bd250db05a0fbd78679ca006afa4ee44cb7b522c4a38231a9f99b3001e1d4857321a6a7c9e36ae424cc0d49fdb6c13c422fde782dd0c18a3a4018030b94ba6b7ff3f3192f8c563a1986d839c40052c8d3a78ae29126", 0x82, 0xc1, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000500)="acbb915d6846975d5d248d4c727115f29ae03c05a1540f5303683cc3316fab70b8f72443207b3bc9d2b76a2124327a8dc22115702dfd81d9c5daf3734095c968bb4c931a63cd940101810cf243974b73d5c0d300e011c378c17bde5460ef55a7bcfe93f760a0a1928b8c0954a22b092351d191ed0effdcf4ac142f1fd6395e0e7303", 0x82, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000940)="9e6fc3414654f3c7d9b41ba48cbaf09aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7acdec844f667da0", 0x76, 0x0, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, 0x10) writev(r0, &(0x7f00002e1fe0)=[{&(0x7f0000c62f65)="db", 0x1}], 0x1) 2018/04/16 22:57:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040)="bb", 0x1, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept4(r1, &(0x7f00003ad000)=@l2, &(0x7f00008f1ffc)=0x80, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000140)={&(0x7f0000000800)={0x10}, 0xc, &(0x7f00000008c0)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/98, 0x62}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/195, 0xc3}], 0x3, 0x0) 2018/04/16 22:57:03 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000280), 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000040)="be38fc69faea5bd09bf0307006cefbafc01c3062dfedf949ad4e86bda4029155e2d6181bc9f0d25d4a23fed54bd250db05a0fbd78679ca006afa4ee44cb7b522c4a38231a9f99b3001e1d4857321a6a7c9e36ae424cc0d49fdb6c13c422fde782dd0c18a3a4018030b94ba6b7ff3f3192f8c563a1986d839c40052c8d3a78ae29126", 0x82, 0xc1, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000500)="acbb915d6846975d5d248d4c727115f29ae03c05a1540f5303683cc3316fab70b8f72443207b3bc9d2b76a2124327a8dc22115702dfd81d9c5daf3734095c968bb4c931a63cd940101810cf243974b73d5c0d300e011c378c17bde5460ef55a7bcfe93f760a0a1928b8c0954a22b092351d191ed0effdcf4ac142f1fd6395e0e7303", 0x82, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000940)="9e6fc3414654f3c7d9b41ba48cbaf09aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7acdec844f667da0", 0x76, 0x0, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, 0x10) writev(r0, &(0x7f00002e1fe0)=[{&(0x7f0000c62f65)="db", 0x1}], 0x1) 2018/04/16 22:57:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040)="bb", 0x1, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept4(r1, &(0x7f00003ad000)=@l2, &(0x7f00008f1ffc)=0x80, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000140)={&(0x7f0000000800)={0x10}, 0xc, &(0x7f00000008c0)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) preadv(r3, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/98, 0x62}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/195, 0xc3}], 0x3, 0x0) 2018/04/16 22:57:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="000103664900") perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a3c000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000100)=""/215, 0xd7) 2018/04/16 22:57:03 executing program 6: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="a2", 0x1}], 0x1, 0x0) close(r1) syz_mount_image$vfat(&(0x7f0000001800)='vfat\x00', &(0x7f0000001840)='./file0\x00', 0x0, 0xaaaaaaaaaaaab46, &(0x7f0000000440)=[{&(0x7f0000000380), 0xffffffffffffffb6}], 0x0, &(0x7f00000000c0)=ANY=[]) write(r1, &(0x7f0000000100), 0x0) [ 74.813218] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 74.837826] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/16 22:57:03 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') read$eventfd(r0, &(0x7f0000000000), 0x207) 2018/04/16 22:57:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00005d5ff3)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000a, &(0x7f0000df8ffc)=0x400000000005, 0x4) sendto$inet(r0, &(0x7f0000de1fff), 0x4e, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f00000030c0)={0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000002e40)=""/255, 0xff}], 0x1, &(0x7f0000002fc0)=""/205, 0xcd}, 0x0) sendto$inet(r0, &(0x7f0000000040)="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", 0x531, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000df6fc8)={&(0x7f0000df6f80)=@generic, 0x80, &(0x7f0000df5000)=[{&(0x7f0000df6f74)=""/140, 0x8c}, {&(0x7f0000df5f18)=""/232, 0xe8}, {&(0x7f0000409fa2)=""/94, 0x5e}, {&(0x7f0000000800)=""/231, 0xe7}, {&(0x7f0000d76f57)=""/169, 0xa9}, {&(0x7f00009e3000)=""/230, 0xe6}, {&(0x7f0000923000)=""/37, 0x25}], 0x7, &(0x7f0000c27ff9)=""/7, 0x7}, 0x40000100) 2018/04/16 22:57:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040)="bb", 0x1, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept4(r1, &(0x7f00003ad000)=@l2, &(0x7f00008f1ffc)=0x80, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000140)={&(0x7f0000000800)={0x10}, 0xc, &(0x7f00000008c0)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) 2018/04/16 22:57:04 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000280), 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000040)="be38fc69faea5bd09bf0307006cefbafc01c3062dfedf949ad4e86bda4029155e2d6181bc9f0d25d4a23fed54bd250db05a0fbd78679ca006afa4ee44cb7b522c4a38231a9f99b3001e1d4857321a6a7c9e36ae424cc0d49fdb6c13c422fde782dd0c18a3a4018030b94ba6b7ff3f3192f8c563a1986d839c40052c8d3a78ae29126", 0x82, 0xc1, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000500)="acbb915d6846975d5d248d4c727115f29ae03c05a1540f5303683cc3316fab70b8f72443207b3bc9d2b76a2124327a8dc22115702dfd81d9c5daf3734095c968bb4c931a63cd940101810cf243974b73d5c0d300e011c378c17bde5460ef55a7bcfe93f760a0a1928b8c0954a22b092351d191ed0effdcf4ac142f1fd6395e0e7303", 0x82, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000940)="9e6fc3414654f3c7d9b41ba48cbaf09aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7acdec844f667da0", 0x76, 0x0, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, 0x10) writev(r0, &(0x7f00002e1fe0)=[{&(0x7f0000c62f65)="db", 0x1}], 0x1) 2018/04/16 22:57:04 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000afe000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) 2018/04/16 22:57:04 executing program 2: unshare(0x60000000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 2018/04/16 22:57:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040)="bb", 0x1, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(r1, &(0x7f00003ad000)=@l2, &(0x7f00008f1ffc)=0x80, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') preadv(r2, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/98, 0x62}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/195, 0xc3}], 0x3, 0x0) [ 75.165409] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/16 22:57:04 executing program 4: unshare(0x60000000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 2018/04/16 22:57:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00005d5ff3)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000a, &(0x7f0000df8ffc)=0x400000000005, 0x4) sendto$inet(r0, &(0x7f0000de1fff), 0x4e, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f00000030c0)={0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000002e40)=""/255, 0xff}], 0x1, &(0x7f0000002fc0)=""/205, 0xcd}, 0x0) recvmsg(r0, &(0x7f0000df6fc8)={&(0x7f0000df6f80)=@generic, 0x80, &(0x7f0000df5000)=[{&(0x7f0000df6f74)=""/140, 0x8c}, {&(0x7f0000df5f18)=""/232, 0xe8}, {&(0x7f0000409fa2)=""/94, 0x5e}, {&(0x7f0000000800)=""/231, 0xe7}, {&(0x7f0000d76f57)=""/169, 0xa9}, {&(0x7f00009e3000)=""/230, 0xe6}, {&(0x7f0000923000)=""/37, 0x25}], 0x7, &(0x7f0000c27ff9)=""/7, 0x7}, 0x40000100) [ 75.300890] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/16 22:57:05 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000), 0xc) 2018/04/16 22:57:05 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000280), 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000040)="be38fc69faea5bd09bf0307006cefbafc01c3062dfedf949ad4e86bda4029155e2d6181bc9f0d25d4a23fed54bd250db05a0fbd78679ca006afa4ee44cb7b522c4a38231a9f99b3001e1d4857321a6a7c9e36ae424cc0d49fdb6c13c422fde782dd0c18a3a4018030b94ba6b7ff3f3192f8c563a1986d839c40052c8d3a78ae29126", 0x82, 0xc1, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000500)="acbb915d6846975d5d248d4c727115f29ae03c05a1540f5303683cc3316fab70b8f72443207b3bc9d2b76a2124327a8dc22115702dfd81d9c5daf3734095c968bb4c931a63cd940101810cf243974b73d5c0d300e011c378c17bde5460ef55a7bcfe93f760a0a1928b8c0954a22b092351d191ed0effdcf4ac142f1fd6395e0e7303", 0x82, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000940)="9e6fc3414654f3c7d9b41ba48cbaf09aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7acdec844f667da0", 0x76, 0x0, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, 0x10) writev(r0, &(0x7f00002e1fe0)=[{&(0x7f0000c62f65)="db", 0x1}], 0x1) 2018/04/16 22:57:05 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000000000000600", 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00004d1ff0)='/dev/sequencer2\x00', 0x1, 0x0) close(r0) close(r1) 2018/04/16 22:57:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040)="bb", 0x1, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(r1, &(0x7f00003ad000)=@l2, &(0x7f00008f1ffc)=0x80, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') 2018/04/16 22:57:05 executing program 2: inotify_init() inotify_init() r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000018000)={&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x0, @loopback={0x0, 0x7}}, 0x4c, &(0x7f0000000580), 0x0, &(0x7f00000004c0)}, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000100)=ANY=[], 0x0) 2018/04/16 22:57:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00005d5ff3)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x200000000000a, &(0x7f0000df8ffc)=0x400000000005, 0x4) sendto$inet(r0, &(0x7f0000de1fff), 0x4e, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvmsg(r0, &(0x7f00000030c0)={0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000002e40)=""/255, 0xff}], 0x1, &(0x7f0000002fc0)=""/205, 0xcd}, 0x0) recvmsg(r0, &(0x7f0000df6fc8)={&(0x7f0000df6f80)=@generic, 0x80, &(0x7f0000df5000)=[{&(0x7f0000df6f74)=""/140, 0x8c}, {&(0x7f0000df5f18)=""/232, 0xe8}, {&(0x7f0000409fa2)=""/94, 0x5e}, {&(0x7f0000000800)=""/231, 0xe7}, {&(0x7f0000d76f57)=""/169, 0xa9}, {&(0x7f00009e3000)=""/230, 0xe6}, {&(0x7f0000923000)=""/37, 0x25}], 0x7, &(0x7f0000c27ff9)=""/7, 0x7}, 0x40000100) 2018/04/16 22:57:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000180)='\t', 0x1}], 0x1, &(0x7f0000001040)=ANY=[]}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='veno\x00', 0xffd7) sendmmsg(r0, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000002640)="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", 0x504}], 0x1, &(0x7f0000003640)}}], 0x1, 0x0) shutdown(r0, 0x1) 2018/04/16 22:57:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040)="bb", 0x1, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(r1, &(0x7f00003ad000)=@l2, &(0x7f00008f1ffc)=0x80, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r2, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/98, 0x62}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/195, 0xc3}], 0x3, 0x0) [ 76.270011] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 76.290689] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/16 22:57:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x0, 0x0]) 2018/04/16 22:57:05 executing program 2: inotify_init() inotify_init() r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000018000)={&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x0, @loopback={0x0, 0x7}}, 0x4c, &(0x7f0000000580), 0x0, &(0x7f00000004c0)}, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000100)=ANY=[], 0x0) 2018/04/16 22:57:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040)="bb", 0x1, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(r1, &(0x7f00003ad000)=@l2, &(0x7f00008f1ffc)=0x80, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') 2018/04/16 22:57:05 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000280), 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000040)="be38fc69faea5bd09bf0307006cefbafc01c3062dfedf949ad4e86bda4029155e2d6181bc9f0d25d4a23fed54bd250db05a0fbd78679ca006afa4ee44cb7b522c4a38231a9f99b3001e1d4857321a6a7c9e36ae424cc0d49fdb6c13c422fde782dd0c18a3a4018030b94ba6b7ff3f3192f8c563a1986d839c40052c8d3a78ae29126", 0x82, 0xc1, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000500)="acbb915d6846975d5d248d4c727115f29ae03c05a1540f5303683cc3316fab70b8f72443207b3bc9d2b76a2124327a8dc22115702dfd81d9c5daf3734095c968bb4c931a63cd940101810cf243974b73d5c0d300e011c378c17bde5460ef55a7bcfe93f760a0a1928b8c0954a22b092351d191ed0effdcf4ac142f1fd6395e0e7303", 0x82, 0x0, 0x0, 0x0) writev(r0, &(0x7f00002e1fe0)=[{&(0x7f0000c62f65)="db", 0x1}], 0x1) 2018/04/16 22:57:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000ed4000)=0x78, 0x4) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000180)='\t', 0x1}], 0x1, &(0x7f0000001040)=ANY=[]}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='veno\x00', 0xffd7) sendmmsg(r0, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000002640)="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", 0x504}], 0x1, &(0x7f0000003640)}}], 0x1, 0x0) shutdown(r0, 0x1) 2018/04/16 22:57:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040)="bb", 0x1, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(r1, &(0x7f00003ad000)=@l2, &(0x7f00008f1ffc)=0x80, 0x0) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/98, 0x62}, {&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/195, 0xc3}], 0x3, 0x0) [ 76.599319] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/16 22:57:05 executing program 2: r0 = gettid() r1 = socket$inet(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000300)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000e60000)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, r2+30000000}, 0x8) tkill(r0, 0x15) 2018/04/16 22:57:05 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00008db000)=[{{&(0x7f0000c5cfa0)=@nfc_llcp, 0x80, &(0x7f00006a9fc0)=[{&(0x7f0000000000)=""/225, 0xe1}], 0x1, &(0x7f000042cfd2)=""/46, 0x2e}}], 0x1, 0x0, &(0x7f0000746ff0)) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) sendto$inet(r0, &(0x7f0000168f26), 0x0, 0x48000, &(0x7f00008d2000)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f000029b000), 0x287, 0x0, &(0x7f0000778000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) [ 76.683535] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 77.556361] ================================================================== [ 77.563781] BUG: KMSAN: uninit-value in csum_partial+0x78e/0x850 [ 77.569926] CPU: 1 PID: 6072 Comm: syz-executor0 Not tainted 4.16.0+ #84 [ 77.576755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.586098] Call Trace: [ 77.588686] dump_stack+0x185/0x1d0 [ 77.592308] ? csum_partial+0x78e/0x850 [ 77.596272] kmsan_report+0x142/0x240 [ 77.600068] __msan_warning_32+0x6c/0xb0 [ 77.604122] csum_partial+0x78e/0x850 [ 77.607919] csum_partial_ext+0x89/0xa0 [ 77.611890] __skb_checksum+0x6d4/0x1010 [ 77.615947] ? skb_checksum+0x120/0x120 [ 77.619916] skb_checksum+0xec/0x120 [ 77.623620] ? skb_checksum+0x120/0x120 [ 77.627589] ? csum_partial_ext+0xa0/0xa0 [ 77.631740] __skb_checksum_complete+0x90/0x400 [ 77.636407] udp_recvmsg+0x6a3/0x1d90 [ 77.640216] ? udp_skb_dtor_locked+0x770/0x770 [ 77.644790] inet_recvmsg+0x4c2/0x5f0 [ 77.648585] ? traceprobe_parse_probe_arg+0xe1c/0x1600 [ 77.653858] sock_recvmsg+0x1d0/0x230 [ 77.657652] ? inet_sendpage+0x8c0/0x8c0 [ 77.661707] ___sys_recvmsg+0x3fb/0x810 [ 77.665680] ? __fget_light+0x56/0x710 [ 77.669559] ? __fdget+0x4e/0x60 [ 77.672918] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 77.678273] ? __fget_light+0x6b9/0x710 [ 77.682247] __sys_recvmmsg+0x54e/0xdb0 [ 77.686235] ? kmsan_set_origin+0x9e/0x160 [ 77.690467] SYSC_recvmmsg+0x29b/0x3e0 [ 77.694352] SyS_recvmmsg+0x76/0xa0 [ 77.697971] do_syscall_64+0x309/0x430 [ 77.701855] ? __sys_recvmmsg+0xdb0/0xdb0 [ 77.705997] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 77.711183] RIP: 0033:0x455329 [ 77.714359] RSP: 002b:00007f6a89470c68 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 77.722056] RAX: ffffffffffffffda RBX: 00007f6a894716d4 RCX: 0000000000455329 [ 77.729319] RDX: 0000000000000001 RSI: 00000000208db000 RDI: 0000000000000013 [ 77.736579] RBP: 000000000072bea0 R08: 0000000020746ff0 R09: 0000000000000000 [ 77.743835] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 77.751094] R13: 0000000000000495 R14: 00000000006f9e98 R15: 0000000000000000 [ 77.758343] [ 77.759946] Uninit was created at: [ 77.763465] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 77.768457] kmsan_alloc_page+0x82/0xe0 [ 77.772420] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 77.777164] alloc_pages_current+0x6b5/0x970 [ 77.781548] skb_page_frag_refill+0x3ba/0x5e0 [ 77.786026] sk_page_frag_refill+0xa4/0x340 [ 77.790338] __ip_append_data+0x107e/0x3d10 [ 77.794653] ip_append_data+0x2fb/0x440 [ 77.798608] udp_sendmsg+0x746/0x3180 [ 77.802387] inet_sendmsg+0x48d/0x740 [ 77.806173] SYSC_sendto+0x6c3/0x7e0 [ 77.809897] SyS_sendto+0x8a/0xb0 [ 77.813337] do_syscall_64+0x309/0x430 [ 77.817218] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 77.822390] ================================================================== [ 77.829724] Disabling lock debugging due to kernel taint [ 77.835155] Kernel panic - not syncing: panic_on_warn set ... [ 77.835155] [ 77.842510] CPU: 1 PID: 6072 Comm: syz-executor0 Tainted: G B 4.16.0+ #84 [ 77.850629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.859960] Call Trace: [ 77.862527] dump_stack+0x185/0x1d0 [ 77.866133] panic+0x39d/0x940 [ 77.869312] ? csum_partial+0x78e/0x850 [ 77.873265] kmsan_report+0x238/0x240 [ 77.877066] __msan_warning_32+0x6c/0xb0 [ 77.881136] csum_partial+0x78e/0x850 [ 77.884933] csum_partial_ext+0x89/0xa0 [ 77.888887] __skb_checksum+0x6d4/0x1010 [ 77.892928] ? skb_checksum+0x120/0x120 [ 77.896881] skb_checksum+0xec/0x120 [ 77.900575] ? skb_checksum+0x120/0x120 [ 77.904528] ? csum_partial_ext+0xa0/0xa0 [ 77.908655] __skb_checksum_complete+0x90/0x400 [ 77.913308] udp_recvmsg+0x6a3/0x1d90 [ 77.917183] ? udp_skb_dtor_locked+0x770/0x770 [ 77.921744] inet_recvmsg+0x4c2/0x5f0 [ 77.925527] ? traceprobe_parse_probe_arg+0xe1c/0x1600 [ 77.930786] sock_recvmsg+0x1d0/0x230 [ 77.934565] ? inet_sendpage+0x8c0/0x8c0 [ 77.938604] ___sys_recvmsg+0x3fb/0x810 [ 77.942560] ? __fget_light+0x56/0x710 [ 77.946426] ? __fdget+0x4e/0x60 [ 77.949777] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 77.955123] ? __fget_light+0x6b9/0x710 [ 77.959097] __sys_recvmmsg+0x54e/0xdb0 [ 77.963072] ? kmsan_set_origin+0x9e/0x160 [ 77.967302] SYSC_recvmmsg+0x29b/0x3e0 [ 77.971172] SyS_recvmmsg+0x76/0xa0 [ 77.974781] do_syscall_64+0x309/0x430 [ 77.978658] ? __sys_recvmmsg+0xdb0/0xdb0 [ 77.982789] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 77.987963] RIP: 0033:0x455329 [ 77.991139] RSP: 002b:00007f6a89470c68 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 77.998826] RAX: ffffffffffffffda RBX: 00007f6a894716d4 RCX: 0000000000455329 [ 78.006077] RDX: 0000000000000001 RSI: 00000000208db000 RDI: 0000000000000013 [ 78.013332] RBP: 000000000072bea0 R08: 0000000020746ff0 R09: 0000000000000000 [ 78.020582] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 78.027833] R13: 0000000000000495 R14: 00000000006f9e98 R15: 0000000000000000 [ 78.035603] Dumping ftrace buffer: [ 78.039126] (ftrace buffer empty) [ 78.042809] Kernel Offset: disabled [ 78.046417] Rebooting in 86400 seconds..