rogram 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, r0, 0x0) r1 = getpgrp(0xffffffffffffffff) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000000)={0x16, 0x0, 0x96, 0x1ffe}) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:12 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000000), &(0x7f0000000740)}, 0x1c) 2018/05/15 10:15:12 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000)=0xfff7fffffffffffc, 0x4) 2018/05/15 10:15:12 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x40081271, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:12 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0xd000000]}, 0x2c) 2018/05/15 10:15:12 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000080)={0x2, 0x5, 0x3f6f, 0x5, 0x8}) [ 301.366948] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:13 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') open_by_handle_at(r0, &(0x7f0000000100)={0xa9, 0x4, "e2b208a8ede5114d085881335caf73beb9487dbd9c7bd25261f602747de3284a23e177d82c110c91da85a5f08b429982b6679377136b2a2f706d2baa96c4aaea7579a57ede55b3b0471d02e42eff5263d37544224261f123a96efa205f8e3bb00245267b2dd58bb6ef0873f6a0dbb5c485f922ada1b86888d8d6c774de37b3eda6ae7013e1dd8761943fe42831a5927ade4c80ba639a8b52d5055ae9bf9ab815a3"}, 0x1) exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:13 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:13 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x7ae8092db9096263, 0x0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip6gretap0\x00'}}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) clone(0x0, &(0x7f00000000c0)='\x00\b\x00\x00\x00\x00\x00', &(0x7f0000000080), &(0x7f0000000340), &(0x7f00000001c0)="a05aef1ad081eba44310bc0200004d1861de0c90d8c5d17ec5f54a0c1e00ff7f0000136cea422040f4f05b7708cf4a02f3ab31217a82e8d1035a13a9ef01e92319645f89f522f0f5ef2996682d301f6323d1263ca80d0c31cbd30e4b371077be1f590cc26ecf5a714c70405decab9959f174d0b607b0e0947cc5d48a18c3ce9ef275ef77de4a301a75dc7ff5416a6f982dc96da31eab4ca2062d4e10593cc4784001340c0000000000000000000000000000") 2018/05/15 10:15:13 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x2000000]}, 0x2c) 2018/05/15 10:15:13 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x401870cc, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:13 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40100, 0x0) 2018/05/15 10:15:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x3}}, 0x1c) 2018/05/15 10:15:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) [ 301.656961] Unknown ioctl 21540 2018/05/15 10:15:13 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0xc00]}, 0x2c) 2018/05/15 10:15:13 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x125e, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:13 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x7f) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) pread64(r0, &(0x7f0000000040)=""/197, 0xc5, 0x0) [ 301.689247] Unknown ioctl 21540 2018/05/15 10:15:13 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) r1 = dup3(r0, r0, 0x80000) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000180)=0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000700), &(0x7f00000000c0)="3125e985f4acd57e51bcc814810df9213fdee60f5344965c8e6726d1464689e1a7a22241938c14261d043a92c8f8e40811f1a5fc02a22cb58ec785d5dcf7dfc1d3409ded635c05d0ab397b13aab847f086d72361c04ebb95cb13af18ce0a2b5d70ec0cb74be7ff966c2ddb70e611c9e31aeb783503ba7999f2d495c72f710ba553e8b33eb39c9ce4a46574bed6e7f007715bb1c8eb5831e625"}, 0x1d) 2018/05/15 10:15:13 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000040)=0x8000) setsockopt$inet6_buf(r0, 0x29, 0xcc, &(0x7f0000000380)="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", 0x1000) 2018/05/15 10:15:13 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x10]}, 0x2c) 2018/05/15 10:15:13 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="b7a92269c6245b3d2fa55231a9f9faf5ab88780b1e881103a69aabb90ebd41e75f3621012c4dc0590229bc3cdde2d9beb996cfb1bcd0b620efa29794150b07d4bce63157976515b935235a54da62b8715de3dccd94f29e4abcb5f68d11619f915c3d54d0b50413012dd304a6ca4736646a74afb6cfd5bbb9169209991e51dbe8a3daf929e8200fe656e4a984d9ff011d71a9e96a90b28c0f88a7d27b9e3c4aa3222bb914b73f68e0fc21f2d8390ea114563ac3ac6f6559674a9b3e2fd25e9ca8053265553a11bc4615384a21fa1298293041154072e627b0030143821ae6083d5e78bb5269c5", 0xe6, 0x1ff}, {&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:13 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x1268, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 301.851478] MINIX-fs: unable to read superblock [ 301.876933] MINIX-fs: unable to read superblock [ 302.455404] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:14 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x4040, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:14 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0xa916, &(0x7f0000000280)="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") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) r1 = gettid() r2 = getpgid(r1) sched_getattr(r2, &(0x7f0000000040), 0x30, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x4000) inotify_init() epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f0000000140)) 2018/05/15 10:15:14 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x8]}, 0x2c) 2018/05/15 10:15:14 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x1267, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:14 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0)="8c4705e8eecfb792e7583028be88cbb85c4272a39c8d1b8cc9057a5179cd374e309615488e667fbd6c9b086c807d813c43fc06be94e24e9b535a8ecb1c45a602f146c4a5b625abefa53aaf", &(0x7f0000000080)="73af93c8948f2a94ec000000fd6b63615a930afda355189fd140779e15aee344"}, 0x20) 2018/05/15 10:15:14 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f0000000100)="81eb7825b3596f3dabcdbf21a2b87057ba186615bbeb46dd1a16b16a55c172e4fbed5adcf6b9d36194a29558711cca8502f242f083cdb6e2d5bc381f63b1d81733132b8aeace612dacfaa7ef00005b652ff51ccb66c9d280fd541d9af2ac91fd443feac8b0f543f45f719f0000000000000000", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000180)="464166240bcd29fa1bfe10500a855e15e89e603d17755907e3660a3fdfe24dc59cd6f1698ac6f4f9f493057ce4f9c0f383718138898ff1e68ba8acf76def1f2ed6c701000000000000") 2018/05/15 10:15:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x4}}, 0x1c) 2018/05/15 10:15:14 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000100), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000100), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x200, 0x14, 0x51, 0x2, r0, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000000)="cc36fd1c5c268e75cce3803eb2", &(0x7f0000000100)=""/22}, 0x18) 2018/05/15 10:15:14 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0xa00000000000000]}, 0x2c) 2018/05/15 10:15:14 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000217000/0x2000)=nil, 0x2000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:14 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x127c, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:14 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0xa000000]}, 0x2c) 2018/05/15 10:15:14 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r2 = getuid() r3 = getegid() getsockname$packet(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f00000001c0)={r4, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={r1, r2, r3}, 0xc) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) fchown(r0, r2, r3) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) 2018/05/15 10:15:14 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x3, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'veth0_to_team\x00'}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0xfffffffffffffffb, 0x10, 0x6, 0x4}, &(0x7f0000000100)=0x18) inotify_add_watch(r1, &(0x7f0000000200)='./file0\x00', 0x1000080) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f00000001c0)={0x18, 0x0, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'irlan0\x00'}}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x7, 0x40, 0x1, 0x6, 0x0, 0x8, 0x5, 0x101, r3}, &(0x7f0000000180)=0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:14 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) [ 303.489175] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:15 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f00000000c0)={{0x32, @empty, 0x4e23, 0x3, 'none\x00', 0x2, 0x912700, 0x72}, {@loopback=0x7f000001, 0x4e21, 0x10003, 0xf365, 0x9, 0x9}}, 0x44) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000280)=""/202, 0xca}], 0x10000000000004f8, 0x0) 2018/05/15 10:15:15 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x401070ca, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:15 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x10000000]}, 0x2c) 2018/05/15 10:15:15 executing program 2: r0 = socket(0xa, 0x5, 0x0) lseek(r0, 0x1a, 0x1) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0xff, 0x8001}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r1, 0x2}, &(0x7f0000000140)=0x8) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x1e) 2018/05/15 10:15:15 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) r3 = getgid() keyctl$chown(0x4, r1, r2, r3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x10001}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000580)={r5, @in6={{0xa, 0x4e20, 0x7fff, @mcast1={0xff, 0x1, [], 0x1}, 0x1}}}, 0x84) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f00000004c0)="db249054432283f117b238a2647ffd7206251c2897c6ec672584c8fdba19fc432d24ec29325de7507cd0c31738f43e9f570e4629476782eb3154ce4315a65c652191ad47826a6edb4b308143f8db431e6db1d2b29ed776eeb94f4ad57c9b4c67259ca821cc9fb3b3", &(0x7f0000000300)="5d7cc8310a9faba33bb3bc320cf1dcd4c4f3aa9fc668a33fee03e634b7ed0c0ae6a8af0cf33a4b33a2ca62ac75499254db30bb4b1accf4a4b28fc6b63fa4a42e3ae2d38063432fbfc6df2299902f24745121f4f4a2f8caf1ceb9e21cf7ecd616eaef8f0e05231fb155c524401cd8a0ae653915a5a1e74663f1e150a84df5f16f4ad0de1e37ca74c1cf11a49f60e52a242f5cb1ba7447d31b9f36b4c1b25a272a3fbd3eaa649e4b727b86d759eabd54f73ecb4d7ca06bf7f0c3933d658dcf6656e26ef325f2e17d14c1eaae14e3f0f711067295caa9ffec1885455d43f500000000000000000000"}, 0x20) 2018/05/15 10:15:15 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socketpair(0x2, 0x80000000000001, 0xfffffffffffffffd, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000040)={0x16, @multicast1=0xe0000001, 0x4e21, 0x5, 'wlc\x00', 0xf4083fc0dfdf19c1, 0x5, 0x200000000007f}, 0x2c) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000140)=@ioapic={0x1f000, 0xffffffffffffff01, 0x4, 0x80000000, 0x0, [{0x1, 0x1, 0x82f, [], 0x9}, {0xfffffffffffffffd, 0x1ff, 0x5, [], 0x8}, {0x10000, 0x1, 0x4, [], 0x2}, {0x0, 0x1, 0x1, [], 0x6b7}, {0x5, 0x8, 0x0, [], 0x4}, {0x8, 0x0, 0x68, [], 0x9}, {0xd19d, 0x5, 0x27, [], 0x6}, {0x1, 0x6, 0x3, [], 0x3}, {0x81, 0x4bb, 0xc30f, [], 0xffffffffffffff8a}, {0x5, 0x9, 0x7, [], 0x80}, {0xfffffffffffffffe, 0x101, 0x800, [], 0x7fff}, {0x0, 0x0, 0x3, [], 0x5}, {0x9, 0x5, 0x400, [], 0x10001}, {0x7, 0x0, 0x8, [], 0x6}, {0xffffffffffffffff, 0x9, 0x8c}, {0x101, 0x5, 0x40, [], 0x8b68}, {0x3ff, 0x3, 0xfffffffffffffff9, [], 0x44d}, {0x0, 0x7, 0x3, [], 0x40}, {0xa9ca, 0xffffffff, 0x1, [], 0x8}, {0x9, 0x6, 0x3, [], 0x1}, {0x2, 0x3, 0x5, [], 0x1}, {0xaf, 0x5, 0x7f, [], 0x80000001}, {0x1ff, 0x81, 0x6, [], 0xfffffffffffffffd}, {0xffffffff, 0x2, 0x6, [], 0x7fff}]}) 2018/05/15 10:15:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [0xffffffffffffffff, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0xb}}, 0x1c) 2018/05/15 10:15:15 executing program 2: r0 = socket(0xa, 0x4, 0xfffffffffffffffc) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x112, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x98) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:15 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000080), 0xf80, 0x3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r1 = accept4$ipx(0xffffffffffffffff, 0x0, &(0x7f00000076c0), 0x800) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000100)=0x1) getsockopt$ipx_IPX_TYPE(r1, 0x100, 0x1, &(0x7f0000007700), &(0x7f0000007740)=0x4) 2018/05/15 10:15:15 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x11]}, 0x2c) 2018/05/15 10:15:15 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x5452, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:15 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xe000000]}, 0x2c) 2018/05/15 10:15:15 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20000, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000080)=0x101000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:15 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @host=0x2}, 0x10) readahead(r0, 0x1, 0xffff) 2018/05/15 10:15:15 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x80081270, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 304.597303] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:16 executing program 3: exit(0x0) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@mcast1={0xff, 0x1, [], 0x1}, 0x1ff, 0x1, 0x3, 0x4, 0x3, 0x80000000, 0x1}, 0x20) 2018/05/15 10:15:16 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0xfffffffffffffffd, &(0x7f0000000280), &(0x7f0000000300), &(0x7f00000002c0), &(0x7f0000000380)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000000)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in=@rand_addr, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setreuid(r0, r1) 2018/05/15 10:15:16 executing program 2: r0 = socket(0xa, 0x5, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000080)={0x101, 0x1, 0x8324, 0x6, 0x2, 0x10001}) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) fchmod(r0, 0x60) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:16 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x82041, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x8, 0x0, 0x2, 0x400}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x10000, r2, 0x10003, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:16 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xffffffff00000000]}, 0x2c) 2018/05/15 10:15:16 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x401870cb, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [0xffffffffffffffff, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0xc}}, 0x1c) 2018/05/15 10:15:16 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x13, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) clock_gettime(0x7, &(0x7f0000000000)) 2018/05/15 10:15:16 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000700), &(0x7f0000000100)}, 0x1d) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f0000000800)=""/4096, 0x1000) 2018/05/15 10:15:16 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x1800000000000000]}, 0x2c) 2018/05/15 10:15:16 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c12, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:16 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f00000000c0)=0x3) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000000), 0x2f4) 2018/05/15 10:15:16 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001280)={0x0, @in={{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x3, 0x3}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000200)={r1, 0x7fffffff}, &(0x7f0000001340)=0x8) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/100, 0x64}, {&(0x7f00000000c0)=""/167, 0xa7}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3) 2018/05/15 10:15:16 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0xffffffffffffffa9) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000080)="7068604a3f0b83cc502f13b0da9743dd001433e2c6d4410b361d3f72b5d8c2b3898c86ff6e5f2d3e73f66b48e59f0a9fe8e98e5b9be44abe00e47e95b2809182f07432d47f1fae057a1d6d894af6c1d76837540f231be23b8351973aee502912e823a3770ac00e8720a29614b1714de7da6043b390629de4888796608e39a9c05e95c636b09efe762216e4725c65c19c650988dc6b052679debf310fffb6a5ed0c22f9e9ec4f14990b0485956cb296efbe019561c24a06f181d17f66d0a0809cab906a42fc8449009dfd55f6c6fca2e9d98cfc323bc15f27157cee181f3d4fd0", &(0x7f0000000740)}, 0x11) 2018/05/15 10:15:16 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x10000000]}, 0x2c) [ 305.675358] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:17 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x402080, 0x0) exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) timer_create(0x3, &(0x7f0000000080)={0x0, 0x21, 0x4}, &(0x7f0000000100)=0x0) timer_delete(r1) 2018/05/15 10:15:17 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x1278, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:17 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0xfffffffffffffffc, 0x800000000005c831, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x100000001, @remote={0xfe, 0x80, [], 0xbb}, 0x33dd}}, 0x9d00000000000000, 0x553}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x9, 0x9}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000040), 0x111) 2018/05/15 10:15:17 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x5000000]}, 0x2c) 2018/05/15 10:15:17 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x87, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000009) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x402, 0x0) 2018/05/15 10:15:17 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x400000000008034, 0xffffffffffffffff, 0x20) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x3000, 0x2, &(0x7f00009ac000/0x3000)=nil) r0 = epoll_create1(0x0) pread64(r0, &(0x7f0000000140)=""/77, 0x4d, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x400000, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x800) bind$netrom(r2, &(0x7f0000000100)=@ax25={0x3, {"1810d03552b8b9"}, 0x8}, 0xfffffffffffffce8) socket$inet6_dccp(0xa, 0x6, 0x0) pread64(r1, &(0x7f0000000080)=""/7, 0x7, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) mmap$binder(&(0x7f000015d000/0x1000)=nil, 0x1000, 0x2, 0x30010, r3, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000001c0)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 2018/05/15 10:15:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [0xffffffffffffffff, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0xa}}, 0x1c) 2018/05/15 10:15:17 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080), 0x2) 2018/05/15 10:15:17 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x300000000000000]}, 0x2c) 2018/05/15 10:15:17 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x125f, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:17 executing program 2: r0 = socket(0x13, 0x80000, 0x7fffffff) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") keyctl$set_reqkey_keyring(0xe, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000080)="c9656d302900", 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x2) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f00000000c0)={&(0x7f0000792000/0x4000)=nil, 0x100, 0x0, 0x2, &(0x7f0000195000/0x4000)=nil, 0x7}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:17 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x1000, 0xe9, 0x2, 0x2, 0xffffffffffffffff, 0x3ff}, 0x2c) 2018/05/15 10:15:17 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x500000000000000]}, 0x2c) 2018/05/15 10:15:17 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:17 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xe0000000000000, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000040)=@dstopts={0x2e, 0x10, [], [@hao={0xc9, 0x10, @local={0xfe, 0x80, [], 0xaa}}, @generic={0x800, 0x49, "ec3fbc326d950ddbb5de1b25d4bbb2f3fefee3a0fa1827cfc0ec7201278e4ec523b5b3ae733e065c849c556916d0d8a945160e41ba8f86cc9c320925d9a06b648ebbab37c6267a3b62"}, @enc_lim={0x4, 0x1, 0xfffffffffffffff9}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x5}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x15}}, @enc_lim={0x4, 0x1, 0x40}]}, 0x90) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) [ 306.783725] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:18 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) fcntl$addseals(r0, 0x409, 0x7) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:18 executing program 2: r0 = socket(0xa, 0x20000008, 0x0) ioctl(r0, 0x5, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x80000000000003) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r2, 0xb0f8}, &(0x7f0000000180)=0x8) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:18 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) r1 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x8, 0x80) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000400)=[0x4f3]) r2 = syz_open_dev$amidi(&(0x7f0000000500)='/dev/amidi#\x00', 0x9, 0x40) getsockopt$inet6_tcp_int(r2, 0x6, 0x17, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000680)=@mangle={'mangle\x00', 0x1f, 0x6, 0x850, 0x4f0, 0x3b8, 0x138, 0x138, 0x3b8, 0x780, 0x780, 0x780, 0x780, 0x780, 0x6, &(0x7f0000000600), {[{{@ipv6={@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @local={0xfe, 0x80, [], 0xaa}, [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffff00, 0xff, 0xff000000, 0xffffff00], 'bridge_slave_0\x00', 'bond_slave_0\x00', {0xff}, {}, 0x1c3dd1eea0d460cf, 0x0, 0x2, 0x41}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xd}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@local={0xac, 0x14, 0x14, 0xaa}, @ipv6=@mcast2={0xff, 0x2, [], 0x1}, 0x1b, 0x13, 0x6e}}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x88, 0x5, 0x5, 0xb7ca, 0x4, 0x2, 0x200}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x3f, 0x2}}}, {{@ipv6={@mcast2={0xff, 0x2, [], 0x1}, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, [], [0xffffffff, 0xff000000, 0xffffffff, 0xff000000], 'dummy0\x00', 'team_slave_1\x00', {0xff}, {}, 0x88, 0x5, 0x2, 0x1}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x3}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@loopback=0x7f000001, @ipv4, 0xa, 0x10, 0xffffffff00000000}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@local={0xfe, 0x80, [], 0xaa}, @ipv4=@rand_addr=0x42, 0xc, 0x3b, 0xdbba}}}, {{@uncond, 0x0, 0x248, 0x290, 0x0, {}, [@common=@hbh={0x48, 'hbh\x00', 0x0, {0x5, 0x4, 0x1, [0x4, 0x0, 0x5, 0x8, 0x1ff, 0x2, 0x1000, 0x80000001, 0x3, 0x3, 0xfffffffffffffff9, 0x7, 0x59b446d0, 0x0, 0x3, 0x10001], 0xd}}, @common=@rt={0x138, 'rt\x00', 0x0, {0x6, 0x7946, 0x5, 0x2, 0x20, 0x5, [@mcast1={0xff, 0x1, [], 0x1}, @empty, @dev={0xfe, 0x80, [], 0x1c}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80, [], 0x1d}, @loopback={0x0, 0x1}, @dev={0xfe, 0x80, [], 0x1e}, @mcast1={0xff, 0x1, [], 0x1}, @local={0xfe, 0x80, [], 0xaa}, @empty, @local={0xfe, 0x80, [], 0xaa}, @mcast1={0xff, 0x1, [], 0x1}, @local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, @empty, @local={0xfe, 0x80, [], 0xaa}], 0xb}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@broadcast=0xffffffff, @ipv4=@multicast1=0xe0000001, 0x28, 0xb, 0x3}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x8b0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380), 0x2}, 0x20) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x1) bind$ipx(r3, &(0x7f0000000340)={0x4, 0x9, 0xfffffffffffffffa, "a7f6809707e9", 0x7f}, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r4, 0x507, 0x70bd29, 0x25dfdbfe, {0xb}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x29}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}]}, 0x30}, 0x1}, 0x800) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f00000003c0)={0x4}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000080)="3fc68850893fce2973add4d27060c7d335446a60803d5ca28d2b12b911035f23ef0f3090036fb5fee48e498dfdfd339d00a09bf06b1a369df2870a5fc064c0a1a0b8ff9768b9a64f29236c432af808c416d2abdee6de4e630aa377ebf5057ecc8407f578b87b41a6214debf6a9b38bcdbcd4c777f77ad948d00356b19e0000000000", &(0x7f0000000140)="bee78ee22bb4bc7c1a78f06d42735fe5a465d21a7f289a2afec4c98faf0c9d26e67b79af02b1042d17f3b5657a8925343e4c54a24936a0d19957fd9102a1f1c0d0c1e58a7b01e03929022c108578a630dfc52e8409b7dcc93330610c024cb6ed625ea75a"}, 0xfffffffffffffcda) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f00000004c0)={0x10001, 0x1, 0x9f}) 2018/05/15 10:15:18 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x406, 0x101200) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 2018/05/15 10:15:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xf00]}, 0x2c) 2018/05/15 10:15:18 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c00, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x5555}}, 0x1c) 2018/05/15 10:15:18 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x5460, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x8]}, 0x2c) 2018/05/15 10:15:18 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40001, 0x0) getsockopt$inet6_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000080)=""/184, &(0x7f0000000140)=0xb8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000180), 0x2}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000180)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x4e20, @broadcast=0xffffffff}], 0x20) 2018/05/15 10:15:18 executing program 2: r0 = socket(0x8, 0x5, 0x7ff) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000002c40)={0x2, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}}, {{0x2, 0x4e21, @broadcast=0xffffffff}}}, 0x108) r1 = socket(0xa, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) syz_open_procfs(r2, &(0x7f0000000140)='net/rt_cache\x00') mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x12, &(0x7f0000000000), 0x4) accept$unix(r1, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) 2018/05/15 10:15:18 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x125d, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xa]}, 0x2c) 2018/05/15 10:15:18 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000140)="eab04d74ffda"}, 0x20) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x141000, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000080)=0x8) 2018/05/15 10:15:18 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) [ 307.875699] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:19 executing program 3: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000180)='oom_adj\x00') exit(0x6942) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000100)=0x7) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/05/15 10:15:19 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x20000, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xb00000000000000]}, 0x2c) 2018/05/15 10:15:19 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x6, 0x48802) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x79, 0x0, [0x100000001, 0x5, 0x3, 0x2]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:19 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") socketpair(0x10, 0xe, 0x7f, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000002c0)={0x1, 0x0, 0x2, 0x1}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000300)={0x9, r3}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) connect$ipx(r0, &(0x7f0000000040)={0x4, 0x7, 0x6bd1, "948fcbf2fb42", 0x7}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ptrace$getregset(0x4204, r4, 0x2, &(0x7f0000000200)={&(0x7f0000000100)=""/208, 0xd0}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={r5, 0x3, 0x1}, &(0x7f0000000400)=0xc) 2018/05/15 10:15:19 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c06, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x6}}, 0x1c) 2018/05/15 10:15:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xe00000000000000]}, 0x2c) 2018/05/15 10:15:19 executing program 2: r0 = socket(0x6, 0x8000a, 0x4000000) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) 2018/05/15 10:15:19 executing program 6: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x200, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000400)=0x2, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x81, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x6650, 0x200, 0x7, 0xa247, 0x6, 0x1f, 0x2, 0x0}, &(0x7f00000001c0)=0x20) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="e0082abd7000050000000c000000"], 0x14}, 0x1, 0x0, 0x0, 0x40050}, 0x800) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000200)=r3, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r1, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r1, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/131) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r1, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:19 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x40101283, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x900000000000000]}, 0x2c) 2018/05/15 10:15:19 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfff, 0x0) flock(r0, 0x8) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xf000000]}, 0x2c) 2018/05/15 10:15:19 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x1279, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 308.971787] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:20 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x4) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:20 executing program 6: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x181000, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000280)={0x7, 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r1, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r1, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) write(r1, &(0x7f00000000c0)="90615033a0800aeff1eb107b9d254b4a427892e44328620e9f01099a681ffc76e2e8d32eff17c00f28a060922690e5db670926fd12d4ea78a0b0115b06514627dae4ddb2db8216bbb37aca69e0671f4406b39dae7959a61f1af0147a58dc90973feeccd8514b37b3c936e0ed7ae186929af8cf932228a5", 0x77) socketpair(0x13, 0x2, 0x40, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000140)=""/251) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000080)={0x8}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r1, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:20 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x4, @random="31f65e08b49e", 'gretap0\x00'}}, 0x1e) 2018/05/15 10:15:20 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x3000000]}, 0x2c) 2018/05/15 10:15:20 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0), 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r1 = socket$inet6(0xa, 0x3, 0x8) sendmmsg(r1, &(0x7f0000006b40)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x3}, 0x80, &(0x7f0000001240), 0x0, &(0x7f0000001280)}}], 0x1, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x80) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000002c0)) 2018/05/15 10:15:20 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x1277, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x7}}, 0x1c) 2018/05/15 10:15:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:20 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x900]}, 0x2c) 2018/05/15 10:15:20 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="8daf6c54474b09ee2c16e6e7693e88b7c626272c8523bf012cf66f9e20d6fabba009812b0c57f49fd007bc6c1b8062bc751db27bc6bbebbd4b08c79c9a2fb96ed8afdc6128c74f4178fe4b010b0d1a72f43391b09247deeed041cf176354066d1c85ce40a91ee400f301b095724764bcb63ad5dc3b3b9880a65f49ac8dcc8b77fa7cae474860e8f5731853c70f04a70600f8c0bab162b8163c5a0df002df2d6cad4c14282036") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:20 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x1260, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:20 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000000)="a6", &(0x7f0000000140)="872fcdc6bf60460000000000000000749455b62123dd3eaed5315909ffa4dd1f9116204a5fda26aad062712fcd33baf97f295aad0800000023e1a80fb311a7cd672551957882a5dd8f1fec2290045d09fa174691cb1ac1860154e201f373f579a8ebdbe8dd1fd6c5a1ac8598f9332955a03966b0cffefa7a094b24e5a78d681f10d1ba533d04645157911d6db11a28a7cebe3dfd6e1d555a44cf9541152bef27cfb6e83de5e5ff6b2f63522339d6c911b5667a3142f37813b05cc30c60eaa80908ec76afaca5dbfbe03f67ed7a6783853c9788", 0x200000}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:20 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xd000000]}, 0x2c) 2018/05/15 10:15:20 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00000d4000/0x1000)=nil, 0x1000, 0x800000, 0x6, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) modify_ldt$write2(0x11, &(0x7f0000000000)={0x2, 0x20001000, 0xffffffff, 0x101, 0x5, 0x5, 0x682ebad2, 0x0, 0x400, 0x1}, 0x10) 2018/05/15 10:15:20 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x82000, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'veth0_to_bridge\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) 2018/05/15 10:15:20 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) [ 310.079570] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:21 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @rand_addr, @broadcast}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000005e0000022cbd7000ffdbdf2500000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:21 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x1262, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x600]}, 0x2c) 2018/05/15 10:15:21 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:21 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000000), &(0x7f0000000380), 0x1}, 0xffffff32) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:21 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0xc4d60baa2ad87833) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, 0xffffffffffffffff, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0xd}}, 0x1c) 2018/05/15 10:15:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xc00]}, 0x2c) 2018/05/15 10:15:21 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x942) accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000000c0)=0x14) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000100)=r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:21 executing program 2: r0 = socket(0xa, 0x5, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x800000) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:21 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x10, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:22 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x2000, 0xffffffffffffffff, &(0x7f000099d000/0x2000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000040)="559b4e6b7f44eff7d8ab5209e2d53a5ea7f943e801fd19350a402fcd32fcaf0c5fa41fe0ccc0d23f22ed1327ab67333493762c049ee09366fcef89b9f9723dca63ed3d68fb7bd3e381134c35dd9cf2bbcc31dbf5316e1bbc88c7810d33b6a640e099bc7a97a35f35af27afdcc12559e63d1bbdf9a7bf0866c6939f9dd075ec7440017aaeaa068ece054c216848e956a1d48bf613ed8eca67daa1d3f067b8cb80c18b3c94f4e73746472ba8395227e80524adc66416c9c60b272689a0caa09a1f167a23d367d392dafed16085") 2018/05/15 10:15:22 executing program 2: r0 = socket(0xa, 0x5, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:22 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x7]}, 0x2c) 2018/05/15 10:15:22 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) [ 311.232347] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:22 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x42) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:22 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0xa00, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:22 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x6]}, 0x2c) 2018/05/15 10:15:22 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000100)={0xf4, 0x8001}) socketpair(0xb, 0x80000, 0xff, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000080)={0x81, 0x6, 0xfffffffffffffff7, 0x601}) 2018/05/15 10:15:22 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffff9, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="df624573a05ee416b643b014ad87601e5075d6be5a29af85e6327fc4026b74fe7ea68de44fa030067d9b621ed21c2d8b9617b14fbeb4dbab71b743481b250fafde1122387e71df269adb9b72b5cb83f472465292212c8c531e0ae177422c4a90a43dd238ad", 0x65, 0x20}], 0x240010, &(0x7f0000000180)={[{@nls={'nls', 0x3d, 'macroman'}, 0x2c}]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:22 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x10001, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000380)={0x0, 0x3ff, 0x7f, 0x5}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000400)=@assoc_value={r2, 0x8000}, &(0x7f0000000440)=0x8) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20202, 0x0) mmap(&(0x7f0000733000/0x6000)=nil, 0x6000, 0x8, 0xa010, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000040)={0x80000006}) getsockopt$ipx_IPX_TYPE(r3, 0x100, 0x1, &(0x7f0000000080), &(0x7f00000004c0)=0x4) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000480)=0x0) fcntl$dupfd(r1, 0x406, r1) semget(0x3, 0x3, 0x5) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x1b, 0x3d0c106d0db0b26d, @tid=r4}, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x101, 0x20, 0xfe40, 0x1}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000280)={r5, 0x2, 0x0, 0x424b, 0xffffffff}, &(0x7f00000002c0)=0x18) 2018/05/15 10:15:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, 0xffffffffffffffff, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x9}}, 0x1c) 2018/05/15 10:15:23 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x6800, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:23 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x1100000000000000]}, 0x2c) 2018/05/15 10:15:23 executing program 2: socketpair(0x11, 0x80000017, 0x3, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) r2 = socket(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:23 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x4000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000080)={{0x1, 0x3, 0x9, 0x2, 0x80c2}, 0x2, 0x6}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:23 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x700000000000000]}, 0x2c) 2018/05/15 10:15:23 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x109400) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:23 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x6c00, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:23 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) [ 312.315311] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:24 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x2000001000000000) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={&(0x7f0000ff2000/0xc000)=nil, 0xc000}) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x4}], 0x1, 0x0) 2018/05/15 10:15:24 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000080)="fa9c3231d3ba2b0b65bbfe58baf12851798e148e742f95ef9828ca06cf2b88e70cdc70c8ba7f626c91562bd7bc07b01c176c3aad1430345feef54d3542d47540d318dd96e09d5d0e4f9d4a41321de5726bd17ded0c83143d8410528d9e93a07553fe3a0195e1f4eaecdeb38cebfab34331a955535d922c263afcd5508a97ba32b29a34c7abad56c6f5cfe846c9d77000d246b4fbecc91f74b0499feae90c6779c3986d6ab16078a8943e36022385257f3ce0dd78368ad4349cfee9e384f6958135da36db6e7c81ce13caaed0b884c3b14396c988db3f4950a3a8691e2153fe24d096"}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000240)="63329cffa6b85eca77310d382811851aa3065f09000000bb9124a570f26511b61debb7f5e39f8b3c918829f0349c5c94a2e1adbe1dfd281bba08a10dedf6c527f36084c3cee59fed5d49341078965fbca2b6f34f4354f93927110e9981369fdc3896fe371816c95177c784360a06372e6bec572c7fee22b42828", &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x9]}, 0x2c) 2018/05/15 10:15:24 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x74000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:24 executing program 2: r0 = socket(0xa, 0x5, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000100)=""/104) ioctl(r0, 0xc90c, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f000095f000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0x0) fstat(r1, &(0x7f0000000180)) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) syz_open_pts(r2, 0x401) ioctl$TCXONC(r2, 0x540a, 0x7) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=@random={'security.', '\'cpusetsystem\x00'}, &(0x7f0000000280)='/dev/rfkill\x00', 0xc, 0x0) 2018/05/15 10:15:24 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x8140, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000080)={0x30000, 0x0, [0x1, 0x8, 0x81, 0x1, 0x4, 0x6, 0x7, 0xfffffffffffff000]}) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, r1, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) setsockopt$inet_int(r1, 0x0, 0x14, &(0x7f0000000100)=0x7fffffff, 0x4) 2018/05/15 10:15:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1600}}, 0x1c) 2018/05/15 10:15:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, 0xffffffffffffffff, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xd]}, 0x2c) 2018/05/15 10:15:24 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x19, 0x200000000007f, 0x9, 0x3, 0x9, 0xffffffffffffffff, 0xaf2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:24 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f00000000c0)=0xfffffffffffffffc, 0xffffffffffffffca) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000040)={r0, 0x8}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000100)=0x4) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000080)="ce6ef4d60877ad826d84d4b81b5456d9b27766143cbb6dd3b8948af38e9032b0496983966340dc41dbd70105a18908ba7aa21bf6c54aa92e3320759b9011") 2018/05/15 10:15:24 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x3000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:24 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, &(0x7f0000000000)={0x1f, 0x100000, 0xffffffff, 0x81, 0x9, 0x8, 0x0, 0x7, 0xffffffff, 0x1ff}, 0x10) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x100000000000000]}, 0x2c) 2018/05/15 10:15:24 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0xfffffdfd, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:24 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2000000000009, 0x200000000083, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x2000000000000}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000100)="a6", &(0x7f0000000080)="6e2b0f9477f47012c611e717bde601aec181b0dc981a9c9a88aa5fae731495dc3de1d57765f1bdfb73089ee04d1ab5e114c6f2e46a1608593c6b785bce87c9c76dea700852e650b25dde354dfd34b7921c94189071594ce9cc699ab2fafe2e6036abebc24f966b59e4c8c38d9b83828fc5f85f80e47b6cbaf41db8a4c0514b", 0x2}, 0x226) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) [ 313.409820] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:25 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') exit(0xd59b) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:25 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x200, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000080)=""/57) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:25 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x4, 0x1) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x3, 0x5, 0x5, 0xdef}, 0x8) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x701000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x100, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x5, 0x80800) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x1fe4, 0x80000) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x82, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x400000, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000440)=0x0) sched_getaffinity(r2, 0x8, &(0x7f0000000040)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:25 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x83, 0x55ed, 0x3}, 0x2c) dup2(r0, r0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000080)="35f191a19c89c732c03b1d37b258d4c49c74bf799c971b7a9fda8fd0f3508fd058d1e84951e61cb3bccfe432b817321172517708042c2dc23dc36695c2a486bbfcbb45d6b252ef83f683d40368c417b501b6ef06d6ad6cb164052124d1f134a80e1eb5fda593705e61665391c24c", &(0x7f0000000180)="3984a982eb46502ee0a23bb8aa66a4c8f7e060ff99ca3f7c75721ac3168af44fd07937a60a2462610578324201f7b24a9c51e186788c81e7ef52caeb1b69ee92b76e061f2fd2b30500d4159dea188a7fce210fddeadfc8b6ba15c32b15780dcde26e7fd3523466c9d805f0f30d9adf1aacce3a3c976c8ffe2cfbd162d80c516814b1e0888195060e607e8eb27c8d49d02df09a742843"}, 0xfffffd1d) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2155, 0x800) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xd00000000000000]}, 0x2c) 2018/05/15 10:15:25 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0xa, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x5}}, 0x1c) 2018/05/15 10:15:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:25 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2, 0x83, 0x8, 0x3, 0x4000, 0xffffffffffffffff, 0xe56}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0xffffffffffffff01) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000001c0), &(0x7f0000000180)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000000)="a0922b80708d7aa92aade0aba384c0dc5ecbe537a7e726cea797ddb61025b09ce38b26c9ba3fe61fd4704b70", &(0x7f0000000080)=""/1}, 0x18) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x20000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) 2018/05/15 10:15:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x6000000]}, 0x2c) 2018/05/15 10:15:25 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x4c, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:25 executing program 2: r0 = socket(0xa, 0x5, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101000, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xc000000]}, 0x2c) 2018/05/15 10:15:25 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0xffffffffffffbac8, &(0x7f0000000080)="67df02553788971bd620bd52cf62972502c3f6bf1c3d6a28981057a376414f69e9794e48a81f475f90480df01a22c0759e0a36c0b31a3fbc7e3c0baac3830e47718a0dc3be4c125ea3446eceaccd3907b708ebf95bff70c65cec92e0ec7f2391812844fa0b7de48a5e80e6f102eda09c8001720911a004c660c63dbd31da2c010000ef7877ae44933105b7fd4385d73830c5171f4243e36c8846a25555ea022607829600000000000000000000000000000000") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x5, 0x1, 0x1, 0x8, 0x8000, 0x5, 0x4}, 0x20) 2018/05/15 10:15:25 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/packet\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x83, 0x8, 0x3, 0x0, r0, 0xfffffffffffffffd}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r1, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r0, &(0x7f00000002c0)="6ed675057c62225de888b47202fd89ea3257458b7a6fe2029173c40116532ad216fa290912c6c89dea627fa11d285a6982416adf8a9e73f416f4bf3abf8d51d9d781b6e8ea62f1bd30bf5a5532be4260ac9d2b110df88cdc95d8589a950191a1276262f59b1de052c8c9d08ae34cfc926400", &(0x7f0000000340)="cca9e513167776a7915075fe175786bc1d4d7648e3c7ef33", 0x3}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f00000000c0)="adae9af35a8d8c6dd7d77a9d015ca9de54c029910822bc915d96b81a81841b2cdfc9b5e3522b38f16688c5d57bdc1e312e6592ca428fa69536aeebcde1679dc337c1fa026a37ad01700d264441dfec75b057e26e8c1730af652bf8c80f0414f35148ba80b3e16b583b7172cd9debc58e43efcf23d617af9036eda1234e71d420217c4b5690d114e1ecdb0f7e3ea2f719dfa966b7eedab1c7b4c4d3352ffb9d1da29058f455fdf78e839f8e0df4f4f3d8be426f552f08f436cbb63ab23fe26836381d93777e2fed3d48c1f6ca62f7a246ff1ca37dcb1ad7ba439a798f7a55bf461e054cfa47d76d0bfea5aeb81c11fa5edd658345808ad552ae", &(0x7f00000001c0)="1defa261ad1fd3044e71e9e61e25007e6225fd27660e71d9af6b685b6fdb57aaccd1682582e345b3362be83c696097d34f8611824828b02c8defa3934ca34711476b82eb7eb0bd180f578c5fd385d0221410249fc8adef6c61a7322e8e6270a7f12d310d0b091e3f455d764da92e31a6b051f06ca8b6a2f9482fdd1534e3f3b69d92fb558eac4eb8c13250d2bea174fe147183d73d493a9d311d768e65384beb37538141dcaad62d79bb707d9ffc163f16a59c91e91ddd6c860dbeb5727c7c3a110e6b82e0f1f212b057538d7dd2cd", 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r1, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r1, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:25 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 314.466289] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:26 executing program 3: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000240)={0x2, 0x5}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') syz_kvm_setup_cpu$x86(r1, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000100)="f04680b70d0000000e660f388217f2ae64420f01c943f4450f30460f01bd00000000440f20c03504000000440f22c066baf80cb878606682ef66bafc0cb810000000eff043808df000c0fe09", 0x4c}], 0x1, 0x0, &(0x7f00000001c0)=[@efer={0x2}, @dstype3={0x7, 0x7}], 0x2) ioctl$TIOCNOTTY(r1, 0x5422) exit(0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000380)=""/241) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x26d4, 0xe65, 0x2, 0x80000000, 0xb51, 0x1, 0x8, 0x80, 0xff, 0x80000001, 0x800, 0x6}) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xdb56, 0x80001) 2018/05/15 10:15:26 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x201) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000040)="e2ccc9287e5c2881aed4713572ec5135bf7f034949771e976a24282ce8fc8eaf71f767a294274d59b3eb323d65712fde0cf352c4e5ce18ed6a458099726990b9bd32a0f05f2cbf3dd0470479897a7e84b603840eb8855e194a863c4b8e0d", 0x5e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 2018/05/15 10:15:26 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x11000000]}, 0x2c) 2018/05/15 10:15:26 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x85, 0x200000000008, 0xffff}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) socketpair$inet(0x2, 0x5, 0x5c, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e21}, {0x1, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}}, 0xc, {0x2, 0x4e23, @multicast2=0xe0000002}, 'veth1_to_bridge\x00'}) r2 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7fffffff, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f00000001c0)=0x4429) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/23, &(0x7f00000000c0)=0x17) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000004c0)={'veth0_to_bridge\x00', 0x0}) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev={0xfe, 0x80, [], 0x20}, @in=@loopback=0x7f000001, 0x4e22, 0x800, 0x4e24, 0x0, 0xa, 0x20, 0x20, 0x3c, r3, r4}, {0xffffffffffffff80, 0x0, 0x9, 0x8, 0x0, 0x3, 0x7fffffff, 0x5}, {0x2, 0xff, 0x1, 0x3f}, 0x7ff, 0x400, 0x1, 0x0, 0x1, 0x1}, {{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x4d6, 0x3c}, 0xa, @in=@multicast2=0xe0000002, 0x3501, 0x0, 0x2, 0x8, 0xcb, 0x1200, 0x401}}, 0xe8) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000200)) 2018/05/15 10:15:26 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x414f, 0x20}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000200)={r1, 0x6, 0xffffffffffff1617, 0x7, 0xfff, 0x8001}, 0x14) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x4, 0x7}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={r2, @in={{0x2, 0x4e24, @rand_addr=0xffffffffffff8000}}}, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000002c0)=0x1, 0x4) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000280)=0x8, 0xff24) 2018/05/15 10:15:26 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0xfdfdffff, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x34000}, 0x1c) 2018/05/15 10:15:26 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, r0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x9f) fremovexattr(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="740400000065642e2d6574683100"]) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x101000, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)=0x6) 2018/05/15 10:15:26 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x145000, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000008000000200000006b13893b61091151890d781250f2e2a513690777dd64c1"]) 2018/05/15 10:15:26 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x52090000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:26 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x300]}, 0x2c) [ 314.925314] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:26 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000002c0)='./file0\x00', r1, r2) r3 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x7, 0x101000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x8, 0xfffffffffffff200, 0x0, 0x2, 0x8431dd7ba80b7680, r0, 0x101}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000700), &(0x7f0000000100)="ef0e52a46108e6dc09add5f01f6ce6ce3c58c175c6a51509697599c7d4d49697c467ca00d253b00428cd954c810e14f05983c41719022169f0e7280f23684d3ce1339418da9cbfb77dc49e946d8516", 0x2}, 0x20) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x7, 0x10, 0x7fffffff, 0x3}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000240)={r4, 0x3, 0x2000000000, 0xc2}, &(0x7f0000000280)=0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xcf2f975197df5df4, 0xcab, 0x3, 0x56, 0x2, r0, 0x20}, 0x2c) 2018/05/15 10:15:26 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x2000000000008913, &(0x7f0000000040)="c626262c8523bfb5f9f66fe4dcf4f82e90c3478f09076dd1a248ee240a0d140cbec4b35ad389d0255795cf89b07583f7fe64c533e31d0b78fcabc0599e300657ca310034f6b34d66365caae2a1567859ced1df66088539babc1fa2cd2f51bc56") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x80fe}, 0x1c) 2018/05/15 10:15:26 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80000, 0x90) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000080)=""/208) [ 315.135643] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 315.692328] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:27 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/19, 0x13}, {&(0x7f0000000080)=""/25, 0x19}, {&(0x7f0000000100)=""/46, 0x2e}, {&(0x7f0000000140)=""/176, 0xb0}, {&(0x7f0000000380)=""/203, 0xcb}, {&(0x7f0000000200)=""/64, 0x40}, {&(0x7f0000000480)=""/75, 0x4b}], 0x7, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:27 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x600, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:27 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000000)="32d18f53a1d032ab82649baa3ebe3796e1816cbcdc1a6333", &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:27 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000180), 0x2) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x10) mlock(&(0x7f0000aa0000/0x4000)=nil, 0x4000) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000040)) 2018/05/15 10:15:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x1800]}, 0x2c) 2018/05/15 10:15:27 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000001c0)=@ax25, 0x80, &(0x7f0000000440)=[{&(0x7f0000000280)=""/211, 0xd3}, {&(0x7f0000000380)=""/138, 0x8a}], 0x2, &(0x7f0000000480)=""/117, 0x75, 0x8}, 0x5}, {{&(0x7f0000000500)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000002a40)=[{&(0x7f0000000580)=""/35, 0x23}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/139, 0x8b}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000002680)=""/228, 0xe4}, {&(0x7f0000002780)=""/90, 0x5a}, {&(0x7f0000002800)=""/74, 0x4a}, {&(0x7f0000002880)=""/3, 0x3}, {&(0x7f00000028c0)=""/87, 0x57}, {&(0x7f0000002940)=""/214, 0xd6}], 0xa, &(0x7f0000002b00)=""/3, 0x3, 0x6}, 0x94da}, {{&(0x7f0000002b40)=@ax25, 0x80, &(0x7f00000030c0)=[{&(0x7f0000002bc0)=""/198, 0xc6}, {&(0x7f0000002cc0)=""/101, 0x65}, {&(0x7f0000002d40)=""/4, 0x4}, {&(0x7f0000002d80)=""/131, 0x83}, {&(0x7f0000002e40)=""/112, 0x70}, {&(0x7f0000002ec0)=""/154, 0x9a}, {&(0x7f0000002f80)=""/91, 0x5b}, {&(0x7f0000003000)=""/166, 0xa6}], 0x8, &(0x7f0000003140)=""/144, 0x90, 0x80000001}, 0xfffffffffffffffa}, {{&(0x7f0000003200)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003280)=""/40, 0x28}, {&(0x7f00000032c0)=""/112, 0x70}, {&(0x7f0000003340)=""/165, 0xa5}], 0x3, &(0x7f0000003440)=""/252, 0xfc, 0xfff}, 0x1f}, {{&(0x7f0000003540)=@nfc, 0x80, &(0x7f0000003700)=[{&(0x7f00000035c0)=""/190, 0xbe}, {&(0x7f0000003680)=""/61, 0x3d}, {&(0x7f00000036c0)}], 0x3, &(0x7f0000003740)=""/78, 0x4e, 0xfff}, 0x9}], 0x5, 0x100, &(0x7f0000003900)={0x77359400}) setsockopt$inet6_tcp_buf(r0, 0x6, 0x3f, &(0x7f0000003940)="bd6d126bd306790968db18326eb90a7d06b418f2ba51400be16ae822c2fd61e3201da4ba6904685971680ef7d77241dcd2a8e7d063c3d8dd1a5a5cd03f8b5ba6dd213f74fbbfe592b9ec90ec03d9ab923d26f36e622d1383b89c25ff48e4bb992687bb2bf74e8cea81fd351704e824bbd176584119195bcc28851bb5432a688fefb0b404a7edc4f5496bf1df38f7fc9c145b857a93e0f70bbdc9385005e4d48f3f42a3f088a7", 0xa6) r1 = socket(0xa, 0x200000000000005, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800800}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r2, 0x300, 0x70bd2b, 0x25dfdbfc, {0xb}, [@IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x21}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local={0xfe, 0x80, [], 0xaa}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @rand_addr=0x8001}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}]}, 0x68}, 0x1}, 0x4010) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x12, &(0x7f0000000000), 0x4) socket(0x0, 0xb, 0x7ff) r3 = syz_open_dev$midi(&(0x7f00000036c0)='/dev/midi#\x00', 0x10001, 0x204002) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000003a00)=""/78) 2018/05/15 10:15:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x8}, 0x1c) 2018/05/15 10:15:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:27 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x200000000000000]}, 0x2c) [ 315.903966] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:27 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x4, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:27 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x2}, 0x1c) 2018/05/15 10:15:27 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f00000000c0)=0x5, 0xfffffffffffffe6f) sendmsg(r0, &(0x7f0000001800)={&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x80, @remote={0xfe, 0x80, [], 0xbb}, 0x688}, 0x80, &(0x7f0000000600)=[{&(0x7f0000001900)="d48d65b8242ec3ec44ea25f1f6fd7914704915ba13be0dc122b61449f4a79e0cbe6d1d7a250c7a52", 0x28}, {&(0x7f0000001840)="a1091f20103aa2656f78142cc30af40f42bcb9c971b8c21dfc477ee61fc7ab2a6d18c134fc959bdd974e5a46d838da50c3b908e168893565f14c92793e54ded21264c67b82d0c24ced42a98941bb80b81acd55fe317b548c2a1b1c246f27d5113ebd05f20a2a9c587a52d5e05d3108b81c2b84dfa49e764336b89bc05a0b3420ed6f4b1c735318e8b70f4916c2e7bf871c86fe0c2104ab65927d31440b246a22c15f24bb5d3c605d6d7f8f1f1a8c0e83c8cdb30db3380eba6988e7036f7a", 0xbe}, {&(0x7f00000001c0)="f01b86005c83e4d56341f262ba34fea8a51868777a974b8de7e5cf4caedf409dcd9fdb3975b207aeaa18208998a9822aaa79b4e9390bb571ddba2be052beb8", 0x169}, {&(0x7f0000000280)="38a45149436cce48e14be108d8e68f7977c6b3e39fe7120ab721cc065cac48296945304d9bdc228431704dcd", 0xffffffffffffff9f}, {&(0x7f00000002c0)="3b3f194e4279c6770a00381f661362c5d9e43fee1246b66df76e1b1ffbc1f13ee66a4085eaabdb7e5bfbb306487098abd51f950913e63cafed197d07904579cca7c26e4b7b93aa5052c416bc30daef887fef5d", 0x53}, {&(0x7f0000000340)="f8d2147543f767382d7494e82e30ae2d3fa9d4bbe9f5a9000eb3f67fb41190d9a0d165db61ecdd31ab254eb8aeb1a6df3a96747167b3daec0367c4e2e60fdadcbe2a6fadb350925f2a8f4597094af5a6efd6b59b38eeffcf90832339f96082376183dd708ca4dbed22613126742904561e0144c7db7900097ed5d264bf6d05d82c00ee10f00a6eadbea01e6e2ae2067129576d57a45d85c33cbb3dd3b1cdec78ce89472a0f3a8a7e0c5f6f2befeb911abeb3540051471eb437f3eb4a39b9", 0xbe}, {&(0x7f0000000400)="8b8f818bc80efa411c28acba80834bac8064309203e96ef7ba62fa5d077b7a27501a539388bebdfa57b355659f904ecc30e3842ed33844b2bbb2928ddbbf04e7592bf9aa989d4f97819ea9906057e7f324ea1ea7ee814b450b40d85b64b10071792ceb7e442bb12ab928804c7de68de466cbed81ffd014b243eae353aab8dc4237b5e94a51c5e4e2a51f9349c18bad5020f4e20b6e0d5bc77f17fe91b47d9e0e8ea7e6feb2fbd5be56ac0a22461a642e9df3000fb498c9460fe3c056e2d266", 0xbf}, {&(0x7f00000004c0)="8b80d3e7f6060f8c46a2857272a613939689d613608449efaebca46f8766ea478c9860b95f91846be2d4a54b2b64380538321676bd1948beaa2c5acaca2406ccc661ff1871d0b65ebb1d95c4eda368cb40005f46f4ee4cffd51ad8f225d494efed3279734eca77d0a0f273d5ce2e5ec6382d5d4aaa8bc45603fb7ecee4c19b680d060860448512ac0eedd2a729017daed035f9e3b70462fa46778ed04f6a2eaa91e18dc30e7d0d364926439be99cac4cf888e631", 0xb4}, {&(0x7f0000000580)="21c264fe9fe286f9742116b806ff0761592c1091a6c2f6336fed8807ad610ef5bfd22e9f82a67f49a62335692602d545883b14002dc263aaddb86362cff45cfbe3714d2cbe34d6f405ff02cf62fb91ca746c5e9b6e0788b2a0fb28fde787c2e20977512889944d4f643e03433c26a6bfaed834", 0x73}], 0x9, &(0x7f00000006c0)=[{0x17, 0x13b, 0x5, "8f1bce05cd63c5"}, {0xfffffffffffffd77, 0x113, 0x100, "a184cf214307118e3c78197b4e8b3020dc03c9c6cf69b951f169b4a2aded1e4445bbf996fdeb5d44d7d6f91207330d74a440c146fce70e623c97d5289824c62fea6a5fff804fbc0d584f7ef9bd059759278bd5e98d0c2f5cfe07def9218aa600f8111bfcea92db24e5763106376f30a72ebe1611ecc79f8b11a5ef45cad418c99d3030532a57a5448c3e44ba1c0cbe9e6d65c6dd8d9be633a04bb0a6775d7cbf00da8d736e9042dc58a84d1a50c9146f64dec2d4240aa3e1a7fba586b40cf299a9a4c2bb5bd0ec84ce3210440e5f4fb2"}, {0x1010, 0x10d, 0x9, "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"}], 0x1108, 0x40}, 0x0) 2018/05/15 10:15:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xa00000000000000]}, 0x2c) 2018/05/15 10:15:27 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000080)="1622404a18d7f7c5a60ba3e0c1cdb1eb081665808881af9b50cf298201db2e85605cdf5ff46847fb6fe94be42186c9362b1de68579773b53373e3cc83caf94c389cd08b3ace5e3050000004ea2e42ba671f8c5000000", 0x200000000000}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000140)="473916ab86d4c4e7a132017e374cf57dd42f68ee5c10b38358ab365d04faa664ea3895d9758237ef5a43e7052b2d027ad1cc73e7f7b52688f0f56eabdede7288952a114611f00b7b31c009c756d728ede4567eac63d85bfb27e938daa97bede8b4845a9c51dd56a3955eab7b8fc9d87cd9eb4461ee4ceb720fab7c9d1267a6a5e3512e9493ccc406e4c532c0fd4b80faf46eebec232c0a0c46f7c67613e1bedf5660a9dcff9875d7411bfaafd56997f54feda547e9d88bba5ef8e275aa90ec527b602500703cee0c6412d4", &(0x7f0000000100), 0x2}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) [ 316.081091] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 316.694491] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:28 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x8, 0x8b}, {0x6}, 0x7fff, 0x6, 0x5}) 2018/05/15 10:15:28 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x4c00000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:28 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00002cf000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f0000000080)="8dd7627448dfc71d327c32afe0971d3e9cff885b0f00aaabef27f67f58083d44e5be75b6afaf23da393cb45d7a6f575b2bd968b48a2dd5b35adf71535e93024e6e0b2c96b906deb3090d732412f2bd49a1d0c6a9e13e9f6cb574", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x18000000]}, 0x2c) 2018/05/15 10:15:28 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000080)=0x8) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:28 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) r1 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) chown(&(0x7f0000000100)='./file0\x00', r1, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) prctl$setendian(0x14, 0x2) 2018/05/15 10:15:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x4002}, 0x1c) 2018/05/15 10:15:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, 0xffffffffffffffff, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) [ 316.861673] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x3]}, 0x2c) 2018/05/15 10:15:28 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) pwritev(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)="14c4ecf291a1c01918324b1a046f4a13f003ce1fac63d5cfc2194566f42aec21cd5ae245bcf168a6851e071ebe18e0c643e04715d67b501faae19d5a7bf2b8e8c205742b61987dc0e6", 0x49}, {&(0x7f0000000280)="4f3d8fa756ec6ccc5a35c5d36c9a51cd378cf4e2a67a1dc30129905aa15548c9d9bb027d8b870521d398012811d247b52daffdfdf023f3b90fb576a78aa3ab776040d5558384c1056dca3c425984799e800de1d1cc4cef79e18dad80338ce54d790235955790a6e00f0f1237cccb680e6a399c264f2e5888b4207c7519fc91afef754cbfd058e059ab35d2af2fafba0822d3c674656e7e942bd825fd2ed276ed6eeaedf7322df26566c4b67650d106e0eb03ee911711dfcd177bf3b4", 0xbc}, {&(0x7f0000000340)}], 0x3, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000040)={0x5, {{0xa, 0x4e20, 0x2, @empty, 0x5}}}, 0x88) 2018/05/15 10:15:28 executing program 6: semget$private(0x0, 0x7, 0x224) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000000000)=0x80) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x4}, 0x4) setsockopt$inet_int(r1, 0x0, 0xa, &(0x7f0000000100)=0x10000200, 0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000001840)=ANY=[], &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={0x0, 0x3}, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x5) ioctl$KVM_GET_CPUID2(r3, 0xc008ae91, &(0x7f0000000200)={0x1, 0x0, [{}]}) 2018/05/15 10:15:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x9}, 0x1c) 2018/05/15 10:15:28 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x200000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:28 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) ptrace$pokeuser(0x6, r0, 0x7, 0x9) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0)={0x303, 0x33}, 0x4) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000040)={0x0, 0x101, 0x7, 0x1f2, 0x4, 0x4}) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000100)=0xfff, 0x4) 2018/05/15 10:15:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x4]}, 0x2c) 2018/05/15 10:15:28 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) fstatfs(r0, &(0x7f0000000080)=""/253) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f00000002c0)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) ioctl$int_out(r0, 0x5460, &(0x7f0000000300)) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x1c1083) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000580)) getsockopt$inet6_opts(r1, 0x29, 0x10000000000003f, &(0x7f0000000180)=""/235, &(0x7f0000000280)=0xeb) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) rt_sigtimedwait(&(0x7f0000000340)={0x5}, &(0x7f0000000380), &(0x7f00000003c0)={0x0, 0x989680}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xf, 0x8, 0x3, 0x40, 0x8, r1, 0x6}, 0x2c) [ 317.022904] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 317.658403] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:29 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)="3b956f1904ac6a0a6a3efba1e430a4d57d1c07e1ab0d265f2e341dc058b25cd0339c7fa3dace9139118ec1ef06f3e70ab0dc420390314b036e22c91c7a6d7cbfc7766cedb95dac13ac46d6f44a2f59939c98ae395dfab004c19011517572d375c65750c14451c88f28cb8ebf8bd216a3e84bdc28d0c45ae07112eeb4e0a58e10d657d308a473cfa99e8714d9e506e7b0d62c429a1b6b1851029a9a37c1d2b691d5123210d382df0d3755b81532f414") ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000100)) exit(0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) fsetxattr(r0, &(0x7f0000000040)=@random={'os2.', 'oom_adj\x00'}, &(0x7f0000000080)='\x00', 0x1, 0x2) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:29 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000040)={0x8001, 0xb5, 0x4, 0x1000, 0xa, 0x8000}) 2018/05/15 10:15:29 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x1f000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x7}, 0x1c) 2018/05/15 10:15:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x5]}, 0x2c) 2018/05/15 10:15:29 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'veth0\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) 2018/05/15 10:15:29 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x40, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x4000, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r2, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r2, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r2, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000080)=""/237, 0xed}], 0x2) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000400)={0x5c8, 0x6, 0x7, 0xd4f, 0x5, 0x800, 0x5, 0x4, 0x8, 0x9, 0xffff, 0x4}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="070003000100a15e0000"], &(0x7f0000000300)=0xe) syz_open_dev$sndctrl(&(0x7f00000004c0)='/dev/snd/controlC#\x00', 0x1, 0x40000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000340)={0x0, 0xfffffffffffffff9}, &(0x7f0000000380)=0x8) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f00000001c0)=@in={0x2, 0x4e22, @loopback=0x7f000001}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000200)="aed1023db3837c64c526e5", 0xb}], 0x1, &(0x7f0000001800)=ANY=[@ANYBLOB="18000000000000008400000007000000e000000200000000300000000000000084000000010000000400b500000200005509000005000000fdffffff0101000040000000", @ANYRES32=r3, @ANYBLOB="20000000000000008400000008000000ff0200000000000000000000000500000000000000000000000000000000000000", @ANYRES32=r4, @ANYBLOB="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"], 0xc0, 0x4000000}, 0x4000000) 2018/05/15 10:15:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, 0xffffffffffffffff, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x2]}, 0x2c) [ 317.868596] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:29 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000040)) 2018/05/15 10:15:29 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$sock_ipx_SIOCAIPXPRISLT(r1, 0x89e1, &(0x7f0000000080)=0x7) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0xfff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={r2, @in={{0x2, 0x4e21, @multicast2=0xe0000002}}, 0x2, 0x10001, 0x2, 0x0, 0x7}, &(0x7f0000000200)=0x98) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xe803000000000000}, 0x1c) 2018/05/15 10:15:29 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x500, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:29 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xef, 0x20002) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000040)={&(0x7f000099b000/0x3000)=nil, 0xffff, 0x0, 0x8, &(0x7f00009ee000/0x3000)=nil}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) [ 317.972798] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x2000000]}, 0x2c) 2018/05/15 10:15:29 executing program 2: r0 = syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0x29d, 0x0) sendmmsg$alg(r0, &(0x7f0000003740)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="833db4fd73edcc808cb7ee62a93d7dee871b9dbe076d438f9c63165fa3f9608be4d987070bbdb868c19bb5499310ea271873b7d6b9c560b91639b21a50408fa6b8d3d60840d1a7", 0x47}], 0x1, &(0x7f0000000280)=[@assoc={0x18, 0x117, 0x4, 0x77c4}, @iv={0x50, 0x117, 0x2, 0x36, "5dc628c2d1bdc17f36dd0b56011b3d5b261abd9b7fd443e7ee57156a429e8dad3a70e0872e0e109f5875325676b6496836008aa37455"}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}], 0x1080, 0x1}, {0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001300)="fc857c3c8642ffc2db8b7b6d28cdca43b846bcbae543f2c830b86f84622534f77022f85645fb723a5f2b2d0cd2c2fe7da8ff885f8b45c5081471203a6384c6b774adf17175b827b0bcb7bf2affc2ebe57e564b47466e750942aaecac8737dcc8a36a19ce1159f9c2bdf9829089b6170b54ed1955760fe3e48bb0d8a8bdb63a0810340d464bbf7c3fe3288a25219e0314c71b7dcf42d8f82403a9ab801aa02cf7d0f4bc3c44ca", 0xa6}, {&(0x7f00000001c0)="0e3939f73ff5d332b8072924c0be854eec51ff70", 0x14}, {&(0x7f00000013c0)="bcb2c35ca18dda5b771dd2680a1ef377392833e8dd3f3d41003e83f8a31242ce05e28a74ef47cb0f0cb75f8701bf37489a23bb17cd6fa43871d9bb6b66934e34c4626c2840af12d21fce9428a491691cc448d5d5a763a1082ff5cc5f026e6800fcbff212228fb2cc154e09d5d5a45713ad07badf2884bd440857d4e11693fee359c3002a538e8bd7a720f7a8e8662030841d2b0195bdc1f53e7bcafc85310226da58c737042c469b8ca7fb75a0aa80f55d614704ad7769dece102f96d3e498b1b02e0a708e0c17e6581a8acf64861963887c1985f5", 0xd5}, {&(0x7f00000014c0)="ec1c211fc56057a1d2b589e1b661b264886a0cd276dde6faaaabba48656c632b26732d61bfaa770711c2742462556fa4bb6cff5f0915aeb6454c9b13e69497750f98013f571f861e1e46bd4f635512f63f27cd3cb9f3beebfc4f12e99f1d6c24f155657a20ea4a498e5040c690195a1b82d011f075057c3647044e065af81df299b181ee252d3afcdc2e5b2fde98b6d5b3e1", 0x92}], 0x4, 0x0, 0x0, 0x14}, {0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001580)="d172fc98421d7cc4d19e0ea8e0369dd3b534cdbd2e204410b46f60eba880c5e50c", 0x21}, {&(0x7f00000015c0)="6f23c495441dcc4206ad91d681a3a73d1b00c1b81a074569aefecc6a939f84f2ea703964bc606afa03d0b4edcd833f5af272dc182e3c5ca3a5a6962e582d92d01951dcee6c8caa0ac70adf1afc290bf76b06b99dd8d8dfef60198db833df2dfda720da92adb6bf23651dd6724f2561347dbc24e83126e350342d1e1c16623db7cc7e88a0f8af37b2d265f04e5dd0212de057f14e7b2aca7c412421330ed9cd3397ebee642a76e83a0e5e17f42007a5db62376905639fb41729401cc00848efb5da18a1d0bd62efe65252", 0xca}, {&(0x7f00000016c0)="c8aaa8e8d27869b784e9f94320b1360461440d1ed5f7d6f2649af60f471095e62e96c1bac7a74fd4dc4bd25e45f07b5a59ea83a472f59ff9ff7b1a02ae206ce3310d4c47dc414292296dc25eab2371d9ac564a0bdf232fb7857909b3d2aefb8b5da5c214a4b786876d91350f52167dbba7adabc418377b34ed1052efa18800592f8381215bf1f9fde61574112af88ffd45febec9b861453567d45e10f287f4e5806be45a4443ac818d23576aa35a7b37ba53d2d89e5c8a3517c7f9c8e8e5dd4c2787f04acfb2d7a22ac813becb36ed6c67e3c56fbfcd73136e408b211e14d9aa14c43a80972056fb36a154cf34b80ad23c8574090789ab9666", 0xf9}], 0x3, &(0x7f0000001800)=[@assoc={0x18, 0x117, 0x4, 0x3}, @assoc={0x18, 0x117, 0x4, 0x157}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x3}, @iv={0x80, 0x117, 0x2, 0x6b, "f7db0980613ff7f354c5992014151fa32f1d8eb5fb445fa8cfcdb42edeb9fcb44efc351da7d441bb20e904ddbff4c6b0e975819738f625bbe98c06693a75f3c4814e9afc5a8751cd098bef00e19304d10a827f4b43d6531d5dcfa25a56c1344b580ca0deef88b45171db7b"}], 0xf8, 0x40}, {0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001900)="5c703e98224de665c74df04420863e1ab3577bbebcce10a0ed3cdac97a195f3dac3e0c0fbff18785045dcecb7da769e2f71d5a3a574749bafaaec54b7b74b871746b9f6e7f13367aba570a9caca1442fd5d3dbc9ab50ea9673da3176796b4ceb4d30eb3babcd0c8a42c2e2a072b203b1f6c5b9ed0a2b59f89ebaf2c52c71dcbd4a737d583d5819f3232369dee2367e4f68794a038de5fc5e2edc20964f308c95c1574ba4837306cc22f8300c0379491a18589c1312397fb075a9176547be5f5402145f5dc3944a040f9fdef560c58412d95bd3e92befed669274d9e2a32d77ae7b91bbad908cb311", 0xe8}, {&(0x7f0000001a00)="c4f8b785696c0092c75cd9bd81b41f8a6a02a69610962b6be6ce6ae20d3cf480ed5f92327b07035f1e5e04057ff4b20f2a3287b2afabdc11039f30967b66eaf91bfef8329fd9476011ba0b4a4e2d48190186510415fa18066f71b813eff666bec6fdc6af62c9c3640c276fd943bafbdbb3fb95a98859a4e7fdd358a996e8553c9392bcafd2204a5e237230914d776f9c06254df43f26096068146841e6acca77584e506189a4b7125b", 0xa9}, {&(0x7f0000001ac0)="8a80a0e46df21cb584604663274580f1f94de0249e9cee0a629ecd20e376607e2e87ca06a2905062ffb0eb6fe78c551ee57505247eb1", 0x36}, {&(0x7f0000001b00)="de25829e2d339b5f547ab5a16ff9747b", 0x10}, {&(0x7f0000001b40)="4b8a78f76b89b9fd9ca5d1d2bbf30f2452b8fbf3faa584e179aa38beda175bb587fbb58d0cbb828d4f684d6923fe5be40dcc4812ba102603f640d13fe126421cf0889a981483bfef0cfa1b499f254b34fe46d96b8af0fea00656ebdaaf03ca3c225892a4e80d29a81ecfa36fc3ba9c5d229bf6f6f8250985cb71d0b1fe795297bf3901fc2f75553e0a08ec1fd381d3c43bb11fa6baa2684984252f050dac1bed7f5f566ee264b81752d53e6784cdb6d63744649ac05cb1fce15a90c2d4c309d2fe0f5681db766d053af8ee099fbefab435193ff0f1d0dc90c1ba55141659564eecfe0c1f212d8bb9c98de943020366b1a6b028d49681", 0xf6}, {&(0x7f0000001c40)="14c01744dd12ed9b6ff51b8671f378479dd80b4ddbaaf9505ec5d47c845186172b78c66821eb80a4e5aa04a0766dac500372db44c2546176cddf98c9a0453b3202f97fb3b0e25eafe7212ba5d64f5a2a12961fc7a0a6aa55f54c5c84c30470268180d3feedcc9df9b0900187fc16a40fb7b01ae392356c363cb520ef7ea58fddc7a83aa51659ca33888d81c560db3345794b5e2f4331f5599a1e58600134f54af11a321fa686317fa14cb4bed6501dcf347d402dfe404bf534e071117a2db2e55f6bd6c4b989e2b1ef3eb4d552d44ba8639f218d898325d296631c7ef1", 0xdd}, {&(0x7f0000001d40)="280015abe99f484754581c1712499a67c4e5fd4ee7d0c52c77984b217f4fb37a032866940e91f7428cba07193c3dd86824a88b1965943e9b915282517ebcfc74192b0acb2803600a40b4860a556d7e9f663cc915b472848a4dc5c820641ea5f57657a6022ca7c1044de5b46beee786bb415781aa1fc48f07e04d1554c7052ac910cb818f9343a19cf5df6e43c70d7d010dcc53538ff1fcf1efb2ac83fc2c81f71ebaf06ff5fbeeeaf332f2422cab0033df4514115da4713dd7", 0xb9}, {&(0x7f0000001e00)="a03bd686de2a864b8b4055864de6e235b66ce3c12401450c64d244f2ba30c57ab83fafd4f023251f58ef31c87c6d4ec784591fa3d5d1b502da997e56e6054de634acfb5c59171933512006db1be40b985f4bf346f3c430ec357e6b730d820578c2d1b4b1e4ebea15035c93ecb3acd7efb903e307caccd867cd18dc47cd7ad11ea1d999efd5497f384ded289e119aa1a9032df52a01ae121a146ae7fd144059f376fc26490f602191de2b0ec8d2774bd2e74292aa5ebf0440e9052f0d72abfd0e8902705f64cf016ec58831b12a77d6699b", 0xd1}, {&(0x7f0000001f00)="7e7266e9d7cf6a3e3cf2fbbab4eac81893952d8692bb747b71a1d699b64cfa6ad8d2fb90963431495d64b7d2cabce371e63235d8c5c8c23f022025f92b77768a30b0f1c0a6132be600db43323eb97a7154e7a681180a529fe1ec6bc0c702b55654e4a8d44003eb249dffb9226eb602ffaf809d79efa7f0f249896f92ceab94872ea2d36278639451fb35b60363f86180e891e4df630bdc049df2afcfba379922d18118682a43019cdfe2e88c4800333196ed2937af2b86a1bff9bd", 0xbb}], 0x9, 0x0, 0x0, 0x4}, {0x0, 0x0, &(0x7f0000003680)=[{&(0x7f0000002080)="38e9a0c5d7704e70a7fdbd27f4e1af5201c3bd04b3b32e516c5d7106c0968d0ef45d6f79aef13a406bc26d5137f60dad8725984f7afc729a2db2164ac7dad8830c5a1bd45ac6cd437dfa28e858c22f979e71b500d2ca497da781c5095847b7fad1f79b472df806bf679fba1a6ba0604f29a193c2dcf34eaa496b3eb8a46a2d288ab783e58c5247e36e3a4ef27ca154407c724f3a56cd83", 0x97}, {&(0x7f0000002140)="b17605c7f77362b3f9d4a7fc4f90d19e1744c32e364e729f984336ffd90f9131ac659a6103328ec6b28b4d4b6230218940320a811b6558291eedb8b91b9ee217ebb9d0dc22a4e9d6f1433550cebfcdb82a88f9e66e13f5a737c11a74c9184c30af11a120d60667a22c1248aadc88c446a3ec32ef5108fbb16b3bc0ccb38c337c3f5d081a3bd47482eef93c6f26c1b157e52043ba717a78f80960cb0d9ba4e7175a7b71353ec0d985eef3b12bc2caec6b4b54f0e4b6af220244a808", 0xbb}, {&(0x7f0000002200)="d768e426fe55dd83c3dda9b88620e7d0de89d79af8c12fa256181b63d5c655f6cb7d0a3987fcad15fe20546a8a99f2e966f9a757f5402803cefc2af97c0b173d7cbebad7d614adfa14ba2a5442b97893bf7eb06f9b3e1e5b8ca1e845b449236ef0676b54633f2e0709490335cd757f5c3dc664fc68490c483668678b7a4e8c4e82561ab4b8a894b2cc5618cf32199fb9f6e11455a5344230094b6beffb95d432bb2a8e7f2c3e503b53bbc9e73bac3f12c9d16f9e6613a1cf57a4e192d3033bf365f756154f81b91df3db5e2acfcf12c8e84236e038be8803cdb953e6fad6400d197180111cb9668cf393e1234c6267ec7d8c735f5bafa2cb", 0xf8}, {&(0x7f0000002300)="11351a7953eabb87a4f13f489ec94ee70ba30a7f794b687f65a14df2368dd5c5a167bc39d415214be748a0b858bdb04a758adc84b79036363f788bbff3bac28646edba0595648493abbea2bc1a0186da5645cdd6d2e481fab9e2bf2fd7dd92b22cdf541483c21066007579f385d6555e98848de242292d5807256fcedf8e5732ea96f8aa68cd078731a2b50cb33971c01fea7106a0d432f09069a7344ae8f349c9680a89e722aeb1938a5b6c2bb592bd444097f8e465045942d2435b759eaef2540d1d3a854ea3fb7dd439c817d35e1d566ddf1f666c15ee38881fd09c1f761dfa4ce288eab1aa002ef0", 0xea}, {&(0x7f0000002400)="e12deda3aa971b4ba500dbd19b090b032879829a", 0x14}, {&(0x7f0000002440)="3ec12c8038ae3c84017b86a932cf16247ec455dbaf022b91232e9aa6c5ff534664d633057fe5bfc3aa682e0b0158b49ba32c6095c67831078c5b2ad335a954d656e9205c774e91bbe9c0fdb3934874399ee6c76051f0df00ae8773ca23891ffe4ecaceaa4d6521b7379db29aba3c6bb2ff3ce4624be701f937a995dbee70c16d4ae3d90ea638918e221ce4deaeab9d752fea94cfc7afdf27e2de0f81359cba9bf688", 0xa2}, {&(0x7f0000002500)="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", 0x1000}, {&(0x7f0000003500)="da5b7767a63e62ec498640c5e077d4095f4949c44ab766c327a781e517b041b9f88d52e4f053daebc10acb2af587ca92d736eff53736e9d545810ea7666bb49dabb51298f48d81c74444d48596715623ec84acce549ae51cd01661b3c6acc3e5b8f8d46f73431f4b023bfc420e1ea27913a6655cf0f811831dea7f78696da7b2d6db059fca64aecc413f10c8dcc0c989e2716f48c04f5b3cd7b59dfcf485c99f5191497facc4d3d62a4c6e59ec5d7acca1f424fb680c0d1d6481801cf13d3f283d8b8356828c4820549c3c35d5cec3260bce7a6a14ca155e2cf7c5989c60b751449b8602f1bc9b06a95e62c9433a80706dc1e757564e", 0xf6}, {&(0x7f0000003600)="9639142621649c33525062db833b9b53cdb1509eca48653744493999856299a53c152233909cc01c899d2adf03a5e49ed4a706ab36ddc46cb2204ac0ec19985c9c4efc28f5e409690af8312c0eaae032737b9a17db8db44890a21f6a7cde1d27d7333453bb53a14226a555d05e65ab5a666034c63b", 0x75}], 0x9}], 0x5, 0x20000000) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1, 0x2000) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000d86000/0x1000)=nil, 0x1000}) r2 = socket(0xa, 0x5, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x12, &(0x7f0000000000), 0x4) [ 318.676261] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:30 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x10) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x900}, 0x1c) 2018/05/15 10:15:30 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x100) socket$unix(0x1, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) write$sndseq(r1, &(0x7f0000000240)=[{0x1, 0x5, 0x7, 0x8, @time={0x77359400}, {0xe0f6, 0x1}, {0x4, 0x6}, @raw32={[0xfffffffffffffffa, 0x1]}}, {0x800, 0x5, 0x1f, 0x101, @time={r2, r3+30000000}, {0x8, 0x80000001}, {0x101, 0x2}, @ext={0x54, &(0x7f00000000c0)="f0ee69646facbbbd2f591ae9a60394aeeb86dd0b4e4bb358c6d37820145827b365b7eb996c097d7ca7f8507ed816c158a608c41e5fd48ea2061b2be851ab41fb9ffd3228aab5a65cde91f57d1601eee5e59c29c9"}}, {0x1, 0x9, 0xd81d, 0x1ff, @tick=0x10000, {0x9, 0x5}, {0x401, 0x5}, @quote={{0xffffffff00000000}, 0x20, &(0x7f0000000180)={0x7, 0xfff, 0x1, 0x8, @tick=0x1, {0x5, 0x400}, {0x4, 0xfb}, @time=@time={r4, r5+30000000}}}}, {0x5, 0x20, 0x2, 0x7, @tick=0x10000, {0x3f, 0x3}, {0x40, 0x1ff}, @raw32={[0xb, 0x1d5d9fe2, 0x7]}}, {0x3, 0x0, 0xfffffffffffff001, 0x41b, @tick=0x3, {0x2, 0x7f}, {0x10000, 0x51}, @time=@tick=0xce42a1e}, {0x4, 0x100000001, 0x3, 0x330b, @tick=0xfffffffffffffffb, {0xfff, 0x2}, {0x81, 0x1f}, @connect={{0x7fff, 0x7}, {0x2, 0x9}}}, {0x0, 0x101, 0x2, 0x8, @time={r6, r7+10000000}, {0xec1, 0x9}, {0x80000001}, @raw32={[0x1, 0x3, 0x1]}}, {0xfff, 0x9f0, 0x6, 0x7, @tick=0xffffffff, {0x3, 0x2}, {0x2, 0x9}, @quote={{0xbc, 0x2}, 0x5, &(0x7f0000000200)={0x1, 0x8, 0x5, 0x8, @tick=0xe1, {0x10000, 0x3}, {0x1ff, 0x5}, @addr={0x0, 0xd451}}}}, {0x68b4a02b, 0x1, 0x40, 0x5, @tick=0x778ff183, {0x6, 0x3}, {0x3, 0x9}, @raw8={"8178d43b0f6db012013ccbb7"}}], 0x1b0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) accept4$inet6(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, @local}, &(0x7f00000004c0)=0x1c, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:30 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x5209, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xe]}, 0x2c) 2018/05/15 10:15:30 executing program 0: r0 = semget$private(0x0, 0x1, 0x81) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000240)=""/114) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffffff, 0x2, 0x0, 0x9, &(0x7f0000000000)=[0x0], 0x1}, 0x20) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x3, 0x40}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0xffffffffffffff70, 0x20}, 0xc) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080)=0x16d5eab, 0x4) 2018/05/15 10:15:30 executing program 2: r0 = socket(0xa, 0x5, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005880)={{{@in=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000005980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000006dc0)={{{@in=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000006ec0)=0xe8) recvmsg(r0, &(0x7f0000007040)={&(0x7f0000006f00)=@can={0x0, 0x0}, 0x80, &(0x7f0000006fc0)=[{&(0x7f0000006f80)}], 0x1, &(0x7f0000007000), 0x0, 0xfffffffffffff90e}, 0x40) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007080)={0x0, @rand_addr, @local}, &(0x7f00000070c0)=0xc) accept4$packet(r0, &(0x7f0000007100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000007140)=0x14, 0x80800) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000007340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x11}, 0xc, &(0x7f0000007300)={&(0x7f0000007180)={0x178, r1, 0x304, 0x70bd27, 0x25dfdbfb, {0x3}, [{{0x8, 0x1, r2}, {0x110, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r3}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x24, 0x4, [{0xffffffff, 0x4, 0x1, 0x6}, {0x9, 0x8187, 0x9, 0x10000}, {0x3c974bed, 0x8001, 0x9, 0x8}, {0xc1, 0x8, 0xffff, 0x3ff}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r4}}, {0x8, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r7}}}]}}]}, 0x178}, 0x1, 0x0, 0x0, 0xc000}, 0x4004000) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x4e22, @broadcast=0xffffffff}, {0x307, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x10, {0x2, 0x4e24, @rand_addr=0x67e9}, 'team_slave_0\x00'}) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000380)={"697036677244300000000000000399b0", {0x2, 0x4e22, @broadcast=0xffffffff}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0xf8, "b79d855ab1f8a8dbaf05cf3696ca46c28bfffed84626a382da89d3de95543f5565128d168728237698c83b183c303b5ac77c9613c72e34f27064b48ba2dfc8fd1d2e298c6c75429b9c33a5a5dd5412198e517c6b940fe78964d7d7549c68f863dd8e11b04e902d2e01d5b35fea8adf98a17f7edec9863fe9c0231c1e9bd193cfa29aa1491eceaa838ea40709c6a8dfcb66ad18f815cb8f5d018b706a9f88c528d301e7464c767c7ddc7662e446a725d456c0590af10c29fa6d311146dd2cb4edca4b4549eebe7b106a4bae5973f06976a66500a2f033fd7a5e3257939561a68b6638fff40680d97a9060a2f708db68fdd87085176fce6b42"}, &(0x7f0000000200)=0x100) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r8, 0x6085, 0xc1d1}, 0x8) 2018/05/15 10:15:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, 0xffffffffffffffff, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x11]}, 0x2c) [ 318.886051] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xfe80}, 0x1c) 2018/05/15 10:15:30 executing program 2: r0 = socket(0xa, 0x5, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000140)="0e3f2b292aef490c94f4694e569b2e1b9381555fa7071836520d5c42784a5207ce78f25f4291508ec0fbaa570053274480264391") ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000180)={0x101fe, 0x0, &(0x7f0000779000/0x3000)=nil}) connect$llc(r0, &(0x7f0000000040)={0x1a, 0x204, 0x165200000000000, 0x5, 0xa2d1, 0x9, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) 2018/05/15 10:15:30 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x74, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:30 executing program 6: socket$bt_bnep(0x1f, 0x3, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0xffffffffffffe06a, 0x0, 0xffffffffffffffff, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000180), &(0x7f0000000380)}, 0x20) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000000)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x100, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000000c0)={0x21, {{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x88) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) fcntl$setflags(r0, 0x2, 0x1) 2018/05/15 10:15:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x18]}, 0x2c) 2018/05/15 10:15:30 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000651000/0x1000)=nil, 0x1000, 0x2000, 0x7, &(0x7f000004c000/0x2000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) chroot(&(0x7f0000000040)='./file0\x00') [ 319.051381] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:30 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x80) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) r1 = socket(0xa, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x12, &(0x7f0000000000), 0x4) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f00000000c0)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000140)=0x80000001) [ 319.673867] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:31 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101100, 0x0) exit(0xcb24) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f0000000080)='status\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x500}, 0x1c) 2018/05/15 10:15:31 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x8000000]}, 0x2c) 2018/05/15 10:15:31 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x10000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:31 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000180)="a6", &(0x7f0000000140)}, 0x16) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x72441, 0x0) accept4$vsock_stream(r2, &(0x7f00000001c0)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x80000) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000003d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000003dc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003ec0)={'vcan0\x00', 0x0}) accept4$packet(0xffffffffffffff9c, &(0x7f0000003f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000003f40)=0x14, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000004140)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000004340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000004300)={&(0x7f0000004180)={0x174, r3, 0x100, 0x70bd28, 0x25dfdbff, {0x3}, [{{0x8, 0x1, r4}, {0x158, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r5}}, {0x8, 0x7}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r7}}}]}}]}, 0x174}, 0x1, 0x0, 0x0, 0x4000000}, 0x90) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000580)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000000)={@empty, @rand_addr=0xf087, r8}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:31 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:31 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003400)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000003500)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000003600)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003700)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f000000b080)=[{{&(0x7f0000003740), 0x80, &(0x7f0000003ac0)=[{&(0x7f00000037c0)=""/49, 0x31}, {&(0x7f0000003800)=""/66, 0x42}, {&(0x7f0000003880)=""/125, 0x7d}, {&(0x7f0000003900)=""/213, 0xd5}, {&(0x7f0000003a00)=""/179, 0xb3}], 0x5, &(0x7f0000003b40)=""/4096, 0x1000, 0x1f}, 0x57520c63}, {{&(0x7f0000004b40)=@ax25, 0x80, &(0x7f0000004c00)=[{&(0x7f0000004bc0)=""/13, 0xd}], 0x1, &(0x7f0000004c40)=""/84, 0x54, 0x4}, 0x1}, {{&(0x7f0000004cc0)=@can, 0x80, &(0x7f0000006040)=[{&(0x7f0000004d40)=""/106, 0x6a}, {&(0x7f0000004dc0)=""/5, 0x5}, {&(0x7f0000004e00)=""/210, 0xd2}, {&(0x7f0000004f00)=""/4096, 0x1000}, {&(0x7f0000005f00)=""/120, 0x78}, {&(0x7f0000005f80)=""/176, 0xb0}], 0x6, &(0x7f00000060c0)=""/74, 0x4a, 0x101}, 0x1}, {{&(0x7f0000006140)=@alg, 0x80, &(0x7f0000006400)=[{&(0x7f00000061c0)=""/245, 0xf5}, {&(0x7f00000062c0)=""/132, 0x84}, {&(0x7f0000006380)=""/19, 0x13}, {&(0x7f00000063c0)=""/56, 0x38}], 0x4, &(0x7f0000006440)=""/82, 0x52, 0x6}, 0xff}, {{&(0x7f00000064c0)=@l2, 0x80, &(0x7f00000077c0)=[{&(0x7f0000006540)=""/243, 0xf3}, {&(0x7f0000006640)=""/4096, 0x1000}, {&(0x7f0000007640)=""/18, 0x12}, {&(0x7f0000007680)=""/76, 0x4c}, {&(0x7f0000007700)=""/150, 0x96}], 0x5, &(0x7f0000007840)=""/35, 0x23, 0x24}, 0x100}, {{&(0x7f0000007880)=@can, 0x80, &(0x7f0000009d40)=[{&(0x7f0000007900)=""/146, 0x92}, {&(0x7f00000079c0)=""/119, 0x77}, {&(0x7f0000007a40)=""/242, 0xf2}, {&(0x7f0000007b40)=""/4096, 0x1000}, {&(0x7f0000008b40)=""/228, 0xe4}, {&(0x7f0000008c40)=""/84, 0x54}, {&(0x7f0000008cc0)=""/4096, 0x1000}, {&(0x7f0000009cc0)=""/84, 0x54}], 0x8, &(0x7f0000009dc0)=""/99, 0x63, 0x5}, 0x4a}, {{&(0x7f0000009e40)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f000000af80)=[{&(0x7f0000009ec0)=""/142, 0x8e}, {&(0x7f0000009f80)=""/4096, 0x1000}], 0x2, &(0x7f000000afc0)=""/136, 0x88, 0x20}}], 0x7, 0x10040, &(0x7f000000b240)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000b280)={'team0\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f000000b400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f000000b440)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000b480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f000000b4c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000b8c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f000000b880)={&(0x7f000000b500)={0x344, r1, 0x601, 0x70bd2b, 0x25dfdbff, {0x2}, [{{0x8, 0x1, r2}, {0x98, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x24, 0x4, [{0x8, 0x2, 0x1ff, 0x2}, {0x9, 0x4, 0x7, 0x1}, {0x2, 0xfffffffffffff836, 0x100000001, 0xefe}, {0x8000, 0x8, 0x22, 0x7}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r4}, {0x204, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x101}}, {0x8, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x80000000}}, {0x8, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x100000001}}, {0x8, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r5}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0xfffffffeffffffff}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x7c, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0xc, 0x4, [{0x81, 0x7, 0x80000001, 0x9}]}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0xc, 0x4, [{0xd4, 0x81, 0x1616a4bd, 0x7fff}]}}}]}}]}, 0x344}, 0x1, 0x0, 0x0, 0x40815}, 0x0) 2018/05/15 10:15:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:31 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x8200) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000080)={{0x7, 0x4}, 'port1\x00', 0x10, 0x10, 0x3, 0x100000, 0x100000001, 0x9, 0x5, 0x0, 0x4, 0x1}) [ 319.859386] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:31 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xb00]}, 0x2c) 2018/05/15 10:15:31 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x9, 0x83, 0x100, 0x3, 0x0, 0xffffffffffffffff, 0xb0}, 0x2c) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f00000000c0)=0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) sendto$ipx(r1, &(0x7f0000000140)="6f6edc6ff5146f48fd855c69a5084c986127fbe705af100dd6d555d9865036a33a5c059d972d4f35a4e90051bc7ff38c1f91d9a66efae34a43569509c7be847831549f266431308e46d3f1a81a75544faa07056a031aec2c4ea3b4442321bb5426eccb7d6c2f2b238e8d65a087c3d9932f6aa55fe898e186d794b9d0ad5a35f2fed78a8b99eac9e48c27fad13abb5a570ef93d2b26284183798d7efc5e77ce16fbb5099f3886696ba8a1d33c76bd2dbf58f5", 0xb2, 0x8014, &(0x7f0000000000)={0x4, 0x3, 0x9, "6cbb39abd495", 0xff}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1f, 0x20, 0x3, 0x40, 0x0, r0, 0x7ffe}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:31 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x4000000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x4000000000000000}, 0x1c) 2018/05/15 10:15:31 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xc]}, 0x2c) 2018/05/15 10:15:31 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x20000, 0x100) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000080)={0xd584, 0x5, 0x69a9de1a, 0x20}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f00000000c0), &(0x7f0000000740), 0x2}, 0x20) 2018/05/15 10:15:31 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x2000000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 320.028717] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 320.665209] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:32 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='oom_adj\x00') exit(0x200000000000000) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000100)={0xa, [0x6, 0xd13c3b, 0x7, 0xfb, 0x4, 0x0, 0xfffffffffffff001, 0xfffffffffffffff8, 0x401, 0x10001]}) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000380)=""/4096, &(0x7f0000000040)=0x1000) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0xb5}], 0x1000000000000094, 0x0) 2018/05/15 10:15:32 executing program 2: r0 = socket$inet6(0xa, 0x2000000801, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = socket(0xd, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x12, &(0x7f0000000280), 0xfffffd7d) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0xffffffffffffffff, 0x1, 0x1, 0x3f, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000000)=0x5) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x28, 0x7, 0xdb, 0x1, 0xc75}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={r3, 0x2c, &(0x7f0000000140)=[@in6={0xa, 0x4e21, 0x10000, @mcast2={0xff, 0x2, [], 0x1}, 0x1}, @in={0x2, 0x4e20, @rand_addr=0x80000000}]}, &(0x7f00000001c0)=0x10) 2018/05/15 10:15:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x1000000]}, 0x2c) 2018/05/15 10:15:32 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000000)="b703008c5b11db", &(0x7f0000000740), 0x1}, 0x20) 2018/05/15 10:15:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x2000000000000}, 0x1c) 2018/05/15 10:15:32 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7400, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:32 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x7, 0x2000) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000380)={0x6cf, {{0xa, 0x4e23, 0xa25, @loopback={0x0, 0x1}, 0x5}}}, 0x88) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000480)=0x100) getsockname$unix(r0, &(0x7f0000000280), &(0x7f0000000440)=0x6e) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f00000000c0)) 2018/05/15 10:15:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xa000000]}, 0x2c) [ 320.872956] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:32 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x80000001, 0x7, 0x400, 0x2, r0}, 0x2c) 2018/05/15 10:15:32 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xe448f909}, 0x1c) 2018/05/15 10:15:32 executing program 2: r0 = socket(0xa, 0x5, 0xfffffffffffffffe) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000140), &(0x7f00000001c0)=0x68) mmap(&(0x7f0000b79000/0x1000)=nil, 0x1000, 0x0, 0x5c831, r0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000200)=[@in6={0xa, 0x4e24, 0x7, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x3}], 0x1c) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) read(r0, &(0x7f0000000080)=""/186, 0xba) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 2018/05/15 10:15:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x9000000]}, 0x2c) 2018/05/15 10:15:32 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0xa00000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:32 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000000), 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) [ 321.016046] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 321.673645] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:33 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x4800, 0x0) connect$ax25(r0, &(0x7f0000000080)={0x3, {"efbdf5141b2dae"}, 0xb9}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x7, 0x40000000, 0x40, 0x800, 0x2, 0x1, 0x28fc, 0xff, 0x2, 0x3f, 0x26c000000, 0x7f}) exit(0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:33 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) getsockopt$inet_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000200)=""/131, &(0x7f00000001c0)=0x23) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000000)="e6db6b6c3cfe7f8a7eeff94d529955f5f80552006639908fbc5cb33cd21693ce92c21ee3f6c227431cd7c0300c7530a9896a8c343910a001267300778de5fe9357a38ecda18acb617e58da8d3bd7e2e3b3beab01024a5509ff23fe9c61b0c6bcaf94a6c814a70dc3785af0c28e2855184bf9d10db1b02e421730bdc03090fdddb40d53b6dff8834baf373e1860df4ead68ee437f138f97ead4e6ecab5904df41f12a9b281490e34ee9941758639c67c8239c133a2ffb31b85a07b13e1825ba5d40efdb579ede320b60e1ec3183121814075df35e4317684caec13f334e6b3afbf032b0abfbccc6cf939ca7dc22c894") ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 2018/05/15 10:15:33 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0xc000, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:33 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x800000000000000]}, 0x2c) 2018/05/15 10:15:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x5455010000000000}, 0x1c) 2018/05/15 10:15:33 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) recvfrom(r1, &(0x7f0000000280)=""/155, 0x108, 0x1, &(0x7f0000000140)=@vsock={0x28, 0x0, 0xffffffff, @my=0x0}, 0x80) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:33 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x4800000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:33 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:33 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x500]}, 0x2c) [ 321.962417] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:33 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x48000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:33 executing program 2: r0 = socket(0xa, 0x10000000000005, 0x1) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000000280)={&(0x7f0000000140)=""/241, 0xf1}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x80000, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000100)={0x1, 0x0, 0x6}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)={0x1}) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f00000000c0)={0x200, 0x4, 0x1, r2}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xfc00000000000000}, 0x1c) 2018/05/15 10:15:33 executing program 6: r0 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl(r0, 0x8, &(0x7f0000000000)="ef8508e9da4c610c989a9462d4") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x83, 0x8, 0x2}, 0x2c) sync_file_range(r1, 0x8, 0x1f, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r1, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r1, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r1, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:33 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x200000, 0x0) socketpair(0x11, 0x800, 0x200, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000000)={0x7, 0x70, 0x400, 0x80000000, 0x4, 0x3, 0x0, 0x4, 0x20004, 0x8, 0x3d, 0x1, 0x2, 0x80000000, 0x8, 0x2, 0x401, 0x15, 0x401, 0x438, 0x7, 0x8001, 0xe1, 0x3, 0x6, 0x1, 0x7, 0x6, 0x4, 0x2, 0xc, 0x2, 0x10001, 0xba, 0x577, 0x7, 0x9, 0x9e, 0x0, 0x1, 0x3, @perf_config_ext={0xf7, 0x4}, 0x404, 0x40, 0x2, 0x7, 0x6, 0x7}, r0, 0x4, r1, 0x2) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:33 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xd00]}, 0x2c) [ 322.125955] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 322.752653] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:34 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000080)="00000072f14e8b00") exit(0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x10c03, 0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:34 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x2000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:34 executing program 2: r0 = socket(0x0, 0xb, 0x2) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xa000000}, 0x1c) 2018/05/15 10:15:34 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x1100]}, 0x2c) 2018/05/15 10:15:34 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80000001, 0x800) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000080)=0x4, 0x4) r2 = geteuid() getresgid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f0000000180)) fchownat(r1, &(0x7f00000000c0)='./file0\x00', r2, r3, 0xd00) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:34 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='oom_adj\x00') r1 = accept$inet(r0, &(0x7f0000000180)={0x0, 0x0, @remote}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)={r2}, &(0x7f0000000140)=0x8) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, 0xffffffffffffffff, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:34 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xa00]}, 0x2c) [ 322.961408] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:34 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) lseek(r0, 0x0, 0x3) 2018/05/15 10:15:34 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x9, &(0x7f0000000040)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:34 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x4000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x40000000}, 0x1c) 2018/05/15 10:15:34 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xf]}, 0x2c) 2018/05/15 10:15:34 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") listen(r0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:34 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x400, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x401, @mcast1={0xff, 0x1, [], 0x1}, 0x20}}, 0xffffffff, 0x100000001}, &(0x7f0000000080)=0x90) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000240)={0x40}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={r2, 0x8, 0x0, 0x5, 0x2}, &(0x7f0000000200)=0x18) [ 323.120319] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 323.750563] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:35 executing program 3: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000040)='oom_adj\x00') exit(0xffffffffffffffff) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000100)=""/202, 0x23}], 0x1, 0x0) 2018/05/15 10:15:35 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x2) r1 = signalfd(r0, &(0x7f0000000040)={0x1ff}, 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) r3 = fcntl$getown(r0, 0x9) r4 = getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) lstat(&(0x7f0000005900)='./file0\x00', &(0x7f0000005940)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000059c0)='./file0\x00', &(0x7f0000005a00)={0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f0000006dc0)={0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000006e00)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000006e40)={0x0, 0x0}, &(0x7f0000006e80)=0xc) stat(&(0x7f0000008180)='./file0\x00', &(0x7f00000081c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = gettid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000009840)={{{@in=@rand_addr, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000009940)=0xe8) stat(&(0x7f0000009980)='./file0\x00', &(0x7f00000099c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getpid() r16 = getuid() fstat(r1, &(0x7f0000009a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r18 = getpid() r19 = getuid() lstat(&(0x7f0000009ac0)='./file0\x00', &(0x7f0000009b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000009c80)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000097c0)=[{&(0x7f0000000380)={0x113c, 0x20, 0x1, 0x70bd2c, 0x25dfdbfc, "", [@generic="e2407d67553dc14308f18959999e498aa751bb031dcb09e7a2906a15310ba77084bcd9db3f32eada6b37719cc576a983de4dd91deff9f4d20d1678314c94e1a8912cece816f83c055bf3dd38629351ec88e71689db66802294e0a3d9f2f21005da27560d5de5d99a8c6985d1ef03996de4a4ee4b403a7042f1693d04be5914af520dd6e783865a5b7acc88ccf7971f4a1090f696832d51d7ffe77007a1559f55e6d1ccd5758cea48179bcff37adc51d8ebff6388ce82828219b39a652280437d0a62e366e941482d6c507a0df5dba015eb829957b0637916df03c4604d09f5a6a0e8d5943522", @generic="8667f05b2503cba78b126ac17a989dcae8b087f89a9f6d2e0b756436e72e100950f4695a3ff0dd8208cc9f8fa6151e68af6254b936594a29dae0f001387eb83a486acad7", @generic="d7895682f067bd5e2fa82a55c5143c5fe8ffc85bffb98927d2f18a4e2be4cab837b403161ac11659a8c8e1227e0cf9b27cf0dbce02dfbb27f892b94ce4faaea942a22c5afc0797b60477f0e354b884a657263c4960e03c26d836854ed34ed73a3e46c58b0d2095a07773fbceb2a823152ee9c0614adff29fde30fd3f4f1221449acb6e1b9c38739ef06e16bc2d3f93a2edb37b1022d1f7a987abee82705dbf05fd0b112585db29878c476b8e59356bc91447b97bbac8cb5d7576d9674a0b978dcd9f77deeb531657893657d84096dec236612429aebceed79bb1044c18dc7fbd7ab3004df883685cc51ea094d769d58e95ddd959c3024cf67bb0547081ca9ad2fb5db43639a661f5dee8df06b8c188f1ba3861fdddb6bd8be9b4a3df6a7e61e0ca5b75f9bdda06640a0813178504caadf9b51b5853db051f4b32227ac0c897a00337f3f89a0cc75eb863a8eb588c6b32661b7e6b8ce6e202ed7614b659fd3c62f430432b4354b2493d5068d1e3b4f768662a2edb834a26f19355ac5d610494acfc44739bc8cb02867f820af0316018fb6cf0d9cc0075d30008763f05c0c7ac7746dcffbb4a9214e913c4afaddc840d1112d4f395acdf36a35414146325787f7c5a0ade3da80ca0ca44e57d7abce9607d5e9974ec6ad69c2ef2592ad1b5916ec9c299eaf3ac313f078a351727cd5b59891f5d19e98e40b0d5ad3f2b966f787ec0102f3489bd3c182cf93f10a17976703abbd1f1e9596830a67c46d93b2bbc8c2f7dcca32277755387739a3c9b7909eb8feb3fc0abe1ebeb10b5ff726d5775e24db5c555abfe68f96dcead87dbb11912c17ae428f53119c402a7222e7f1dca1742bcbc9d6ed24a4411ab18cbdaca965d2562bc8c42e4cd7c843bc79f93b6ae6d2f1d6940489d99a3ceb975772a6a5bb6119cd813767b83f3fa1939ceeeebe00a5a9e984bd6d3972bd778f95993be456d049d82255f9c87b9ec1f981382fbb3bf4b57d85f00b64280ae164fe2c60b498eae661a6c281c9bab7ffa4125cd8dde2efa49cdb51025de758d9c0916581049335c7d3eaa0cc5a3dac6b278b787858c61579531839ec5b7c83c1c18ce84cbdb429207caabef5188998ea3d3a75bac11043eda32b0dd3d70c0baddd31f19d1097ec391a1f651df654cef3978e75477f8c76643ec8db82e4a47b02e559449d72c04782a8e1e19ad4b5f741e221e08a64bec0e1e2e1b619c920ea2ea8629e640a6bbd27a1db97a2590d52ec64ef736582c762780d7b6491deb32878d4edf2498815b66e538c29424a2b9ef01dcef37f201fbb94990d1ad8242e1ab5ec124277a561270761c03d7bcb69a184d8cafb291faa86235e0ae69b44fd0f63d886af737f31b267686b4e34adc331303c3ad44cba0f58bf3d9b634f41f222b020532572da6da9aeb239ab586f8de7d03db0fd61fbdc07a387cf9f59fd98cee8b6226930c929e742c89c6307efc5a1d51317bf3fd4b579c9de50754fbf252de74204e64450c8e63d74f1e1ab4d99eb21307a5d4ab40d3415d7c95a2821e6cd62450a0b5b0d182e6c45cd61bf9df1ff4f05aeb04c255ec14a85f18dc56c67758b42fc3977f1785a7df101874cacc388be8c4c154a3cdd6389e1d4030f0791849c902ea713f44bc62674183983408fce78600bc369a7bce102c3ae4c1fc1d10879c88b8a05105c3769d718502c6464588ce8c4141f19298cf2c138bd62201c7463119667a48ef200a1fc123933730d40cbedd1b20a5a422388fb6cf527deeabed887bed17a081b29163064f32b8e7193b64d1f31d373800783336f96d4db1d056775c6fcd1b8cc25efc5edc967c59c6ac869ee42246cbdef64c8c897c72feaa716d34f8873c8cfabdb7090e24efa6714d2099eedb427407d8318c5f44f929673bbb2a5fb51ddf9c507f07885a465de51f4fdcd725411129171747fb9bd3c11b3c0dbedfb7df04e8f4df534e6a64f0541a2c5c8a6fa9845560d98fee55e58a86155e07dd935e229067da956f20953c6851c2b057626906aaff4ef4f9b2e27cb82a3d1a4a93629ef3f99f4b53920c5c922eaaba915eec3e13e2a5b8d32195d5e9300ff77381e7ad6413ede58eb066f7308d95294fbea7bf16a0e2d50b417e69b8615a9d01b4a2000b0871524af3f536ddacc978b3df199c3bfc2234b3d1749a9378fd88f86e734aa87695360eb523e7ca1ee3260f01c8c3eff73fabc890e54d4f0434f0961c1562f1547c016fd459a612ae341a79c3283217ed976d3d024311d1735252f01c821d0ff3fbcb42e63dd8a76a16cb007e73de59d5cd79fc2834d34b71817670e4b8e08655a1de787a972ddf6d6d89b1dd0337a185d9e6a7495cb7cec93b7ac0d07c38e72daff8aaa22f843d9a1d03dc88d33163ede47038f23f02138da162650734ebed6e5c240ff3910271a985291e0ce94fb39c58b727aa5884b4475d6d52107571e5f2f3bd2d9eedce61d2f4d14c164ebde603302d157e2a7f41f9907f9a8f0263217de2666e40497b513e6117d49c2f711037425514471105be7a35811905e5dc12d96ea7377a18ba2361043ec9e9010b19d48a200d30b7eb2efc374aa158f0e8ce0eb9633effc1b9590ee150113bc0389a810b4c53ecc304939b2a22321944dbc47bf3e69ff5e95d4d3544466f285483954229f4398f970d2f1ec786981c0b353c5634a90f7981fa80d20f6698b7af96d6d2e12a5bea78429f4ca16511ee69fdf4588ee70b97f0cd04ee622a560344831018ba0e3ca3cb96bff9c47cb9fa686f82e2f56dca7e4f2421636a7987a7195d0305b657bfe2b5ad3e7f6765e0fe11d14392efa6218b9aad9fe1a3e8ddfc94cbd2bf82e113132974e4bfd9d264aa38df25c198a04eabbb92d003aae7e10496ad636f71dc1950bd02a68e59acaa363a236aaf8296e821a3a3346835c6e00543f8bfb89242c8cc5001ea325978c0b196651e06ba19d17328e879c325870948170789b1e4c5a4bd68791bb4abe304b43bcb400cd355404922a1b05d13dd024cb57fd7e6afa7b814907dd54bbd3cb5e272fcfa2a7838aa5c77612b1245d78861dffa2c7c01fc3af4c7d1ffb4c2a682ad19a0ea52d451ffb4908bf1d4671b283a2080ea8cc6ccea4ea8c14157405347d82054770ce4fcf4797b7301d6c4c5fb2cd9c145505bf295ff519b95a2d9da5d3f879fb3a4e32ed15710941bac081942e335b2561d7897f07d426876db5b64b85a347cf881b72c844297660e01c3b65b37dc9bcc0931d0928dadcf2072650fef15ef831cbf9381cfab522eab2bb778b89386edbfc367a94040a558ea92d688d7567728ebb276bfe0b69ab1d3de04a58e0e6f7c694f34cf97fbf369e10943bf160cac39846b175205ed38b9b87dcb7f7f34254c028362e79d514ee11ce6df2ce2e728c858468de722d0cfb3deda898726b6ee8cd1844b85696248a55d635de62f7849ae08e6df3ffcfbad20e0e005d4e142e6b422f59f273dc3b824261bf699356d15e4fbdd7266c2d4abf6f7859eb07c9b5bb696a1001d8b8c87aa91c85d5ce10662161779f96a6b17fad16da50872920dd65d7294cf3f194a99b0e0bd121a08abe12a0ae504832ee04b4756d906b268fdde4495b290f4d050d9575fd37e7db1c3a75f7ec276fc4fe1b1cf328aecedb70973f388d3175363845891ad13909876c965ca7faf6a8835daee45398e7ab4846c2149e76d9389d3092a7e71adb06850c6ee953d02ef827b538ec36d8bf124c3acba0fa8f64730a2c2efde48112976b6b95890fc84194a0841f5834951acbf3225dfe881ea8856b372d1b9e637524a39bd1c0c928b9d1cf9914ac26983eb662f477fd25fecab83fc6475c8d58cc40a891d0e26c0f64be070606569813af8f9e5ebecedcaab852b7b52518141b5c25392ee9855e10fd9ab7a03eeb3bdd79fe5bdc0018f921876345e32e9f986304b8b20abaec0b046e6cff3a9d68b8447d83a54282bcbb6d1b1efd2d7a28c9e972d4d8b8851555179af856e4cc3da2d239879aa8a84ecafd9b40cfba17c47710c644a2c3ea926986c02e9ab7418743db62cd37cac7cbce7f8465a067743652195f2330eb8e819ca9f9a18cc6a70397f35630ca02d62bb9e6fd282102922ae36d29be03ab330d6ce3c7716dbf5f19b09ff89e10a3da71854642e5a8bae99e0151fda8415a94ecb9af7aa680d4e24a598eadde158a93a865cc75b3517edfb2ccbac430173db80043e773eb171341e2d45a00b433eae6a10a923dee931bf4181506067dbe00eb445335892a7fb4a05305ccb3de90a807b6ada2c95420ec2a84c171abecf5d076e09757158722f0c53c9da8b042dcd0660d0b6506e2392accefda67be10da8690d27a9293774c37ecd99123d47a9e8e63fe8f652973b11f6f755a38a80797f0ca09c66a9441f23f572eaed7a7ef657029c1bbb68ab1b334524f9314fd1347e5dd786a1ec7c753b51bf9a3f27485a31ecfd7ecc5a946a68a5c1cf0cfdb215cf478ce17d156b2264c1f8543823c052eaada7b8a9e590db9b34869fae9a9800ab6f0727c7beec633579f4d36e90d45ef036f236392e807d7238cc955249522da8473e78884c4ad788a5b169b7bdd107ae2deb29fa86a7e1736113663e6e17c2fd963f6795c36de72a27428ad3fd1f9900c0f63530bbaf461acd03eb67af1576a6278d0ef578488fd4588412cf0281ed17dddacdf620f555d7a4d428559e958d4adb2c21c70230df84f7164f379f74c6f89557d8d32f54b2c614000e4ed590da98813c20f7d0fd113effa9b42c43703e3a819b33b5dcdda3520deff91a38059fa206c34c62a1379fc50ad0a941098a255daa288e5853db4e4cddde5e326c74d3e383424ff87bdf03b72b7feff3a4775c9f54343cbb312166c3e10969619d6ded9193d34025acce3b4fb4a8c356da6d14ad272bee200e19f2db78df156960c3e217d950bcd5d3464de8e2714ccbb655f25a0a02dce75bce5a00ab54e73c539e0bbade03b966729d83d665fc1d66c85021ffa5ae93cbc31ef896c40758aaad8135424f8b902cda24bc943f729cd645906e1fe0ade9d551ae5f7cd08450be1203f4c997e1184535d1678af5d21ac961e1d43cb5ecd644a5eb629fc57966b09e7a55d5acda8b3065d650fdcc455cd98bbe9b5b13eb174d8c130bd3e64cc0cfea12cd45a88a11a50d4f0db0a5d6c9851e65d3a503d67a9dd1c4ca4c930776242217328f6ad1d2b78fc79ecd1977f09b79155dba226b38a18fb6f0f9ae81237a741ef76940f09be5ff51455c36cbf6e4e094c4f02daf8fa8d0c8028073adda13270fec7184aecdda9c8354449a131e3db1bbf5cf15581d166a3eaef2aab27d4a7dcb243ae7eb7ff2527d321cf8008c0afca688b96297ad9ff74d38b85c04abb7fec9fc9007cc7652b72753718a9776e87f0c716c3485c4bfad5897f561d5c5e5297238b55d583536202837052d3a3c0d8f1ab221b4c1dc9eec1645c89d5c1189e024df6b7c1c8299b18d1689e2504c64cf387b15cbe10b46e0acf11e01b8ad0bef0264c2e821e190951be86458f91bc250d829ab1f7681319a6326b285ce2c671aacb0afd2249e7dcdb148c262e33e1699e80fc7e642a5010c428db3cd28c5c52c54addef64362099ea0f4f0a262ad66eab258780573a678c3a3a3524c2fe52fe97f37cab37a1230e0708e0c511ceee39e4c6c969a120620b6ebd03222f9458ab1849e7811645098f66df5da7299a622c1da6b796f23a6b013b940132662612a77e9371c8da2bc596d329cec61205b8525127624bcf5ed846b"]}, 0x113c}, {&(0x7f00000000c0)={0x1c, 0x1c, 0x38, 0x70bd29, 0x25dfdbff, "", [@typed={0xc, 0x94, @u64=0x200}]}, 0x1c}, {&(0x7f00000014c0)={0x229c, 0x1c, 0x913, 0x70bd2d, 0x25dfdbfd, "", [@generic="3ef598b8e9a9b72ec644a2c18d38bbb60301ed1c849f978d49efe9659ba86943692f500e3bc993dd90eebdbca271730ad85d", @typed={0xc, 0x36, @u64=0x7f}, @nested={0x10cc, 0x21, [@generic="c7d053492915b40495bd253ba12e17e3f5abbc2214c84111fbd0dcd7686cca96e754b9eaa91394bf9f0f3ec1e34a05e04fe766a35c95131a40b944ab690a09a601581576de1c4642bf3cd964cb1c4b8d2270b3109a3b3382951184fbd28ad08908c0ef9ddf6fddb392a1313aa3da08c5d6b4edea2de4f91e465f56b42f362c910e389720e2e61f723634543728d20d1e9b742948af7072c1a3d5922b5190629f6d0b1bad7207237a075771af50651bbc3e0392a2", @typed={0x8, 0x5b, @uid=r2}, @generic="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", @typed={0xc, 0x64, @u64=0x40}]}, @nested={0x1174, 0x32, [@generic="aa9f255a943c52a57a6f52571de26aa75470c18e3d80a9ef1ad16f78c04b66e2ad335ab0e288dcbc4ae2e366a37f50644eff83669bed70d30ec76c1d68f53847b5cefc8fcf01599cfd667d0580ebc0f05907a30cc919419406dba253293121258feab15ea65fbdc369fbb69fe21b8c7460573d29d7853f4a5fdba8a16e1673e3fcf2d9b2d39231c634783c968840f7b4b3dcc7e4cf859e4f9b50c93385e744caa93bf6eb242960d1de4f5277f170e3e7aaeb0fdc3e0562b004c45321734e8ebc1f8fa44de9d29ec9ac985650713133bcfb70541758c3af6c2709c79b41706bbfa0175baa5bcef44af5ec3b043e02c004686a19bfb82ed035", @generic="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", @generic="a2be0769e227dacd3b9be7b532089554b409a8d1455703a11293dc36ef874175743ed450cf2d18bb20f70cfd6e126081c48223b3742b5219eea9e79210451021aa81fc70113cc77799b502fa56a355d3934d9c1391727cd76153104ef2fc433120f888ac0c86a205de21ea9efae917ac3357a9270727e5"]}, @typed={0xc, 0x3b, @u64=0x6}]}, 0x229c}, {&(0x7f0000003780)={0x2158, 0x22, 0x314, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x8, 0x4c, @u32=0x20}, @typed={0xc, 0x59, @u64=0x4}, @generic="58fabb55b7764ee679cfebbab5beee419798736d3a63c239156c80d5d303d225d04fcac65701728d73950062bdaf087e6e55f3b979a9f7bbca47cf", @nested={0x1018, 0x8b, [@typed={0x8, 0x3f, @u32=0x5}, @typed={0xc, 0x3a, @u64=0x9}, @generic="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"]}, @generic="93b69e7d3b0419c360b807eb7c8da39bffa5438e406e191fd1d324c8a58ad1ae0f0cdb96", @typed={0xc, 0x82, @u64=0x80000001}, @generic="964d1583845d4a7cb87b48ebe9f4936824f733ad760b37643b5b74736afbf30c60be53c336ad5f5fd92f6d0180a6dad12583134c8498f12f1278d8c3ed68712ed6a3ddaa16d29d05bfda7d33874909f942e4040cb3c6f7b668079f93c358e1c77c9abb6047c522316835b91448d4aa4a3117c4fab81ea0a1f35fc30bafcbf445389f8d3b7118f80e12a2ca5e41b6a813e1fcfee7a6c59bc43ccde0e9af95667db578e9d0ec6a7914f8be1d37f6e41e", @generic="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"]}, 0x2158}, {&(0x7f0000005a80)={0x1310, 0x3a, 0x120, 0x70bd2b, 0x25dfdbfd, "", [@generic="ec7b4dbfb213430d43467b388bbb3bfb356b56a81335bfa5ee3246b2a855065d2ea1a501769c2ac431f23901d66a95fe56b7d42076497409fffe569daf64c7ef9c37c1b823b01f5dc8fd6218753cf5248c701c6ea0c7a9a2294725936635ced54c4c69bb3aad4c644f6f76906d8be0c1522c2e8b77f97f605e346c4976657cf01d46a57f5cda036d9e8c1f4e76d67ac191", @nested={0xc0, 0x61, [@typed={0x8, 0xa, @u32=0x7}, @typed={0x10, 0x2f, @str='/dev/amidi#\x00'}, @generic="6fef27ba53056f3c407a0a5df5771053c005df40c1", @typed={0x8, 0x79, @pid=r3}, @typed={0x14, 0x27, @ipv6=@dev={0xfe, 0x80, [], 0x10}}, @generic="d3e2774a7aabaa479146f655d4843b40b410c3bb0f16e274dfee8e1c2d31351a306dd7d4e9404b29d953118f6c64f80c71645fe92d690151c5f8e60520057fedd741e6b7deb17bcf7cb1ab94aa70737452303aa08db63f232f1b09b0812b3736d8f260986c788de8c53231cc191147df9938"]}, @typed={0x8, 0x79, @ipv4=@dev={0xac, 0x14, 0x14, 0x17}}, @typed={0x8, 0x42, @u32=0x400}, @nested={0x3c, 0x21, [@typed={0x8, 0x5e, @ipv4=@dev={0xac, 0x14, 0x14, 0x19}}, @typed={0x4, 0x84}, @typed={0x8, 0x43, @pid=r4}, @typed={0x8, 0x83, @uid=r5}, @typed={0x8, 0x61, @u32=0x80000001}, @typed={0x8, 0x4b, @binary='!'}, @generic="437b94", @typed={0x8, 0x40, @u32=0x641ed754}]}, @nested={0x1120, 0x74, [@typed={0x8, 0x4b, @uid=r6}, @generic="74e6fbff5a3a4c9c4a34a487f2f7cdcbd161de0ef0c862f5815cd9ef57dccc80829d38c45ab5d03a11cbdbacb644baafa7a7a983a06bc25855b75094d8ece60b15bf6998c7c46ead581e8cd1f50979ac05a4cc83dacea31c7c8ada7b15bcfdfd772b48ba042c4b5cb0413f72488f64da2bc3b041bc47e43b0e2a445888a7e688913c11215af6097df898e84a9675c6a8a8c8f28bdfaf0b6530806cde85495f99d6c0a94e06d44bc4a848c0ec143923", @generic="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", @generic="52319756bc4c310b1181bd8bb0cf86385df28e0a8f96cfc1c4cbf3f1990683c61ef1942cb7a84972e82273acbcc8d4293ec2b9012595c778fc9a16916f83e6a06c135711369c6bee5323f85da6fe9172991e4b6d7993", @typed={0x8, 0x36, @ipv4=@dev={0xac, 0x14, 0x14, 0x10}}, @typed={0x4, 0x6a}]}, @generic="43ba685af533e276b2a96e70f429c3ac53562b51b0343b1bd2c79d1625a08d46c6f0fd8cc13760c43d7b2fd61a093f1d352d47471d4ba1f3770b93", @typed={0x8, 0x68, @uid=r7}]}, 0x1310}, {&(0x7f0000006ec0)={0x12a0, 0x1c, 0x800, 0x70bd2b, 0x25dfdbff, "", [@nested={0x174, 0x66, [@generic="a5b1eb173e0742709756229bf2e44ba8463f4fcd466f2581bc6e5d7d0861511643b7cdb24fb406bb9080a8cd8a4cac2e6e2e0736a8b9ae71296d969c8ddee28eec4224d9100a5738f075be7b6f059cc10259490d9f0ed1c89b250a4cfb02c0a7fdce3270f27e200fbc067cb6e0f6c0854a906ca9b4c8b2b2bef5d0a2763378512c8dcb676de2627510d2c74920", @typed={0x64, 0x5e, @binary="b576f4f4d5310b32852ab9a9c7c95fee04982b538c1194107919d06addddc0662736ec22698bfcf9c0b16f5b38515bcb67335940e54ebc8a5ab4034c863c847b1a5474037b87a5050cd3a8b82d67d00eb28fad334656104e96eeaa79a3ffde25"}, @typed={0x8, 0x4d, @ipv4}, @typed={0x8, 0x28, @fd=r0}, @typed={0x8, 0x56, @pid=r8}, @generic="85d8a61eaf88bdb8161310a36b308c7365e73f3eccca4ec68266835f913f4eac0bbb97a51cfc596cfcae4cd6ea9d26f1f799810aad746a10ad5f02d1392cf067a90f105ec1557489dd7f34324415104aeeaf593cd5724054", @generic="1201d1", @typed={0xc, 0x78, @u64}]}, @nested={0x84, 0x23, [@typed={0x14, 0x16, @ipv6=@remote={0xfe, 0x80, [], 0xbb}}, @typed={0x8, 0x83, @pid=r9}, @typed={0x8, 0x56, @uid=r10}, @generic="8473a366b5e1d90fcb8e2ddf3aed6f95fa23386a2ed69acf79a4537e4f0bfa4eaeb64a31fb4bc9e148c73c02ae614947c15cfd1e287019bda1ed19fb2ad83bfaf77173e6c418610369cd8d836648ad83b74d465d82a16c01dd"]}, @nested={0x1098, 0xd, [@generic="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", @generic="518687f38b69dc1f6e2eb390f8759a8f4c43f19731b72f949e47115b2ae6d3fa56ce75465d3d86f3e6be47f396d1c9502d23fb22f5904f2b6e83bfe9daee218f13e5a36867ee89d775ba9cde89c87de7970fb791786621e588bd5aaac2250686606e7380afc4c08d1ead34bc24e602bd6c0b4da86a0787e1f17673e7647376b1490c6a8fd90cec0a5035832515d0f5f3d3"]}]}, 0x12a0}, {&(0x7f0000008240)={0x12c8, 0x2d, 0x4, 0x70bd2c, 0x25dfdbff, "", [@generic="62609d91c51455b0064d62edf50078418b375b01ce", @typed={0xd0, 0x5f, @binary="441619aaaa27d47466640d03b08bba8166e1a049ddd65378b9d14eaebc859c36c7c1e38889ecdf1c09e3ab4d59aee173330c04213b318ae81b23e93a1de9522a3b413306e72a98ee18bb21f8be5c2afac1dc13529c43f654aeaa44fd6cce72d28081813d974f1bcba3ae52c91d81a5ab9b5e43710e42aae23b4fe6325f19b0d9a1dfc564683f9022c94dac809ca2628d0eeb507273499234dc5e3593dc2ad46aafa9450cb5fff3d0b49fa9258f136877be0c9ceaaa790470d6042d42f016c83650f51e23654c951c1b2673"}, @typed={0x4c, 0x2a, @binary="74e7d13c64d8f0bdb70953ed0079c5b6d4cd7966b1c9df0cdb9553b04659433981ccd96fa845a771e49098bf7f6aa8e4bce7f84c13411388373a4ac3349ea6a2b2c3849862"}, @nested={0x1028, 0x71, [@typed={0x4, 0x37}, @typed={0x10, 0x2, @str='/dev/amidi#\x00'}, @generic="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", @typed={0x8, 0xf, @u32=0x7a46bee8}, @typed={0x8, 0x38, @uid=r11}]}, @nested={0x8c, 0x21, [@generic="8017add9e30bed413f45059a6edbad30a5917be1162c0920fefde254a7c44937023a49e60ec53bef446b1914281fee3b6ed09f0fd2a6abe2094957041230099c3caffffb5a9a19d800810c3c1be5dc9af604040b4962abce954746d7ca0964380e3b", @typed={0x10, 0x3a, @str='/dev/amidi#\x00'}, @typed={0x14, 0x75, @ipv6=@local={0xfe, 0x80, [], 0xaa}}]}, @generic="57dce92f3e09b1e97d7c1fbc3047462a0c41977585ab7cd931bdf61fe36d0fdeea33b69d9508f3dffcf4e18f666a3e6c9bec084985bfe25a4367c64f610753c654345f12bd6ca6713e9abca3e948cc4a4a2fafcd520248a0cbb013132c0a4d841bf31aece7b4684f074ab4759db850a32549af1480fa65da3bfa453a95b20e98cbb5328dfdf4cbb0d5ad51453892aabd4e1295f6d9c57be46b9a44efa6078fbceafa0f2a2032485dbe1247d54a127810053696c1796be7ca7b067c9d6ea6c5613adf9b24ba77d412", @typed={0x8, 0x5c, @ipv4=@multicast2=0xe0000002}]}, 0x12c8}, {&(0x7f0000009540)={0x26c, 0x15, 0x800, 0x70bd2c, 0x25dfdbff, "", [@nested={0xd0, 0x4d, [@generic="9eab69124c7827e73261050a635df08568979ae2bfd90f38dd467e678ea71b00253b27282fec8bd14aa12c4c6c39cd6aa62fa490466d369b2e32b84f3b4666ae91f4faeb5465d0d0aeb30e74a67f2cbdce7f01a0ea530d4a5dd36b5dd212b24f19f919eb521cd0b65b08a57eedcb3f8b45836207cbce658dbc1c7c4aa075557b0e82e5110f83f4a5199c58f85bbbfad6eecc3bee51ae624406da976274ae93199714ed8c97c48cde213f814084d07c7c8ff0905050157c6c68f95c02cd6fdb6d60ca73191e15b3b52bb77a85"]}, @generic="4786af8fa9b05268f72a306188f60c44e11c22de3bbaa188bf7b22c2b73ee51aec56bc45ff848f103c2697cd2be2bfa27ceb525cf16af9230239ea93fb1128b5c3e5b2d4890187e7f7864134abb5456739dc6da9caec5b16bf38d8a1198167a79c0c61570d05cae38fd555ea8ff83acf14b07dfaaef57f7c71683bd997e0551591a9f5cbd250d90903c04ebed1f08cc489be19b03868422ff67a9bdd1d474f8ed10b49415f165e5e672be0b422581e8936ab28f172e5b5021b2b5225702a9d6a370a75ec237daa6ffdef9f5c3a529f22c1254fd48eb4a6e3c257c3473ed4b2494fbc805cb9d6e1f33bab7342c9e150818f90", @typed={0x8, 0xc, @fd=r0}, @generic="e2fd83c3bc435f63caabb1e05f837c38821b629d427c079a8528242d39ccb9962654b488f809b31db655e83e9ca97f5fdcfcc3d5bb6f89206646ca1589a1d1e9513664d5017030b9c4b3557ac58d2e3161535899ea3b67821c41b908bed42f5ee67b18e8d294295f9de42945f428b7c8733038b578b0759946d42f89337743cdc9dd9fbdcfbd6f80f69d1112073921b3"]}, 0x26c}], 0x8, &(0x7f0000009b80)=[@cred={0x20, 0x1, 0x2, r12, r13, r14}, @rights={0x30, 0x1, 0x1, [r1, r0, r0, r0, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x38, 0x1, 0x1, [r1, r0, r1, r1, r0, r1, r1, r0, r0, r0]}], 0xc8, 0x8040}, 0x14) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xa890b295}, 0x1c) 2018/05/15 10:15:35 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x5, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x10]}, 0x2c) 2018/05/15 10:15:35 executing program 6: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0xffffffffffffffff, 0x1000, 0x47, @buffer={0x0, 0x83, &(0x7f0000000080)=""/131}, &(0x7f0000000800)="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", &(0x7f0000000140)=""/192, 0x99, 0x14, 0xffffffffffffffff, &(0x7f0000000200)}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r1, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r1, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r2 = getuid() ioprio_get$uid(0x3, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r1, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f00000002c0)=ANY=[@ANYBLOB="07000000000000000080000000000000000000000000000007000000000000000800000000000000090000000000100001000000000000000400000000000000"]) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 2018/05/15 10:15:35 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="c6a3006076fdbde835458f0ac732ffdc26262c8523bf0e2cf66f") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000080)={0x6, 0x2, 0x0, [{0x8, 0x100, 0xff, 0x80000000, 0x4, 0x40, 0x7fffffff}, {0x8, 0x20, 0x7, 0x5, 0x3f, 0x14, 0x8}]}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000200)=r2, 0x4) remap_file_pages(&(0x7f00000f4000/0x4000)=nil, 0x4000, 0x435bd40debe7536a, 0xffff, 0x1840) 2018/05/15 10:15:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, 0xffffffffffffffff, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x600000000000000]}, 0x2c) [ 324.074119] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 324.085955] mmap: syz-executor2 (21871) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/05/15 10:15:35 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000040)={'security\x00'}, &(0x7f00000000c0)=0x54) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)=r1) 2018/05/15 10:15:35 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x1) ioctl$TTUNGETFILTER(r0, 0x801054db, &(0x7f0000000080)=""/250) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r1, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r1, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r1, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:35 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xe}, 0x1c) 2018/05/15 10:15:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x4000000]}, 0x2c) 2018/05/15 10:15:35 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x9000000000000, 0x2) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000)=0x1a, 0x4) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x41, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f00000000c0)={0xfff, 0x8, 0x6, 0x200, 0xfffffffffffffbff, 0xffff}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000100)={0x2710, 0x0, &(0x7f00000cd000/0x3000)=nil}) 2018/05/15 10:15:35 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7400000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 324.282945] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 324.870916] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:36 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000040)={0x0, 0x6c3}) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1000020a, 0x0) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) socket$inet6(0xa, 0x0, 0xfffffffff4fab5bb) 2018/05/15 10:15:36 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1000, 0x101080) ioctl$KDDISABIO(r1, 0x4b37) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:36 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x400, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000100)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8001) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e21, 0x4678, @empty, 0x4}, {0xa, 0x4e21, 0x1000, @mcast2={0xff, 0x2, [], 0x1}, 0xff35}, 0x8000000000000ff, [0x1, 0x5, 0x4, 0x8000, 0x3, 0x7, 0x39, 0x1dd]}, 0x5c) 2018/05/15 10:15:36 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x400000000000000]}, 0x2c) 2018/05/15 10:15:36 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x10001) 2018/05/15 10:15:36 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x68000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x100000000000000}, 0x1c) 2018/05/15 10:15:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, 0xffffffffffffffff, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:36 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x4000) r2 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0x100) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r2, 0x6, 0x2}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) [ 325.089460] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:36 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xb000000]}, 0x2c) 2018/05/15 10:15:36 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000040)={0x1000, 0x8, 0x100000000, 0x30, 0x400, 0x8, 0x8}, 0xc) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:36 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x40000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x40030000000000}, 0x1c) 2018/05/15 10:15:36 executing program 0: socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000140)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, r0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r1 = socket(0x3, 0x7, 0x400) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x19}, 0x8}}, 0x9, 0x9, 0x800000000000, 0x9, 0xff}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100)={r2, 0x2}, 0x8) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:36 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x7000000]}, 0x2c) 2018/05/15 10:15:36 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000080)=0x200) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f00000000c0)={0xffff, 0x6, 0x200, 0x11}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) [ 325.284673] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 325.866637] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:37 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='oom_adj\x00') fcntl$setlease(r0, 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000040)={{0xffffffffffffffff, 0x2, 0x6, 0x2, 0x94f16e9}, 0x0, 0x9, 'id1\x00', 'timer1\x00', 0x0, 0xb7, 0x100000000, 0x3f, 0x7f}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) exit(0x0) preadv(r0, &(0x7f0000001580)=[{&(0x7f0000000200), 0x23b}, {&(0x7f0000000240)=""/39}, {&(0x7f00000017c0)=""/181, 0xfffffffffffffd98}, {&(0x7f0000001740)=""/121, 0x107}, {&(0x7f00000018c0)=""/47, 0xffffffffffffffba}, {&(0x7f0000000400)=""/12}, {&(0x7f0000000440)=""/50}, {&(0x7f0000000480)=""/245}, {&(0x7f0000000580)=""/4096, 0xffffffffffffff5f}], 0x4818a3682b0fc37, 0x0) 2018/05/15 10:15:37 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000000, 0x810, r0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0x3) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:37 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x4800, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:37 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000100), &(0x7f0000000380), 0x40000000000000}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000080)="98d2096298535cda84e6620d3be0fef0f7a9e5", &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xe00]}, 0x2c) 2018/05/15 10:15:37 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0x6, 0x6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0x8, @local={0xfe, 0x80, [], 0xaa}, 0x1}}, 0x7, 0x1d10, 0xfffffffffffff001, 0x7, 0x10}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000240)=r2, 0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="00100000ef06231f982178f056d0438e3f86f3edb7b9d7ab037bce99dba0354dafdd3d780afa6a9e3810aa6ef10b488eec2dcea953e2fa288ab319bf446585fbd07ae7ac855cc0035eb06aee5e5bbfac884407b58c8937a12fe296f40169b3b2f67df688d5970d2306ae8b35728c4e1bb829b0c877db2e7d1b9c9ef804174d1dce6c27db83577e3b83bbd87f6108f80f222adbceb601c491fee5a0ab2974076271d17c1df564e0dfa5cbb89366401ffb82253ddd181c5c19cf70d74ebdd7a83d44c5cce1a508b93afd5637a00b5ea03f76d9b9d460d72c5d167509b05da6aa972d804a6ffddbf3d5abe54b8766793eb7a35fc58e05e53bce96979956bba98f0ff95c7ab9820adb15c243bb0807ba3ec9cfbdb0c31811aa30bbf27be2f513d9f7dae4470162d4446f86d0612044ef82819934c513d5428fd7ad5036b9be5f585c792409c0c2162c92adefc34b7309b508e686a0421ec5955dff16841fd04f58c998db7698680a54e6b73297e275c620863c51d29b0a3533754e15c399ba2bbd0b6042164bf98adb40c5f290cd192ae657d5c12dd0460cf0a17740b8e0e673a501af5599234c4f73d2f994008e45f397f02e9a082f02d47665b211cb15a8cb809836b25644db0d048174fbab11fb1dd657f4a052854ecd843bf0c9792c9103355259092bf540cfa631ec947e24bb4e0603993e39b54c71bc5c3e8a3d5833f0afc1c4d86e89bdfe59861cb5ee2145c00e398ba9b39fd25c51a0016723154705a6ca07866c8adb746ea0dd7a0ffb9cce5f98500a4b60d31e2fa2baabed04f14cbd3ab0d9f4595c744406943df8ec8508ab7bdc6df33d01899ec8fdece3b57aaa92c1cf319e904942e52d7f7707dbef14de984f8bc82e523fb6576286cc7383aa13cf6479c9dc9574d46c85f884b5a402baa9392eeb6a2ef4b365f4dfb1d5339e26b6d2bc6eb32c060f4e51e12e163ba51f2e45b60a25ad83f1a3b5908901f7f9a58d6e2423ddc610f77d133e473da2f6e639c1e67bce1f0a8a201e13f4af28483ba4c31b7bd6dccc0907f6c949da358a12587c35d8e1f70561a4168c40a798c2b178d4155b2f1a2c506128f71da39953ec32e602b587a51a1729f7f303acf8eefd52fe578b58a88b964ef739082f74e7441da4c15bcc6107d28416e72a6ca146668c189b7a493cc6f4db870532537e3003619a7668f93f9843da9d2d94b4951418a4d857277648dd9f600cb9f5eb6fb874627e80f4b7a2f473a120fa59fcefc90bb97c978d2b0396af3d27c4a61063052cad03298d9f1f244c81bdbcb24315fd5e33ce42eead815a866054b72a25dfe8a70c3c72ff8d78c1640e65d600ff66946fb709bc4e7230016aa8d54c72ffc7177fe1de40c02d12fa854593d7d701695f02467bd8327459fa4b5012afe00dd90ea01166f1ecc2e2cc6e8047aea9304edb8bc1ae155824306ad75a39171a869a30b3e012dd445d0391910373f30dc56e19eb22e43d469094a99b8c24a204ffcacf45f2f251ddd9262cc6871871669932aa399e26cfb79b9c0838be18940ce6bba84affca5251c6bbf8223365c55e66432df1c83909ff25f8981f5f908c4eda75a34da34e8bf7f9d3997ea0c82fce3cf016827ce8ea0bcf2b1095501b2ff5f5ca4e615cc3c8f7604a323969e815c9985c2040dc87f883e914632ae0bfb5a9374cc0793ba0c27fef371f23844d386da5d071a9773ddb0349cf5defe3856cb1f013442cbe43d2eba0b2e758cd2ea1c0f6aadbe7e45ba81d55a2e6670a3e188d7c0423083b75664260690c603f2fc48513acffc572cdd4a419c8f21bc06176c4e5d66d09d177b83b05a8210d8ceac318127f40be220535ba0b6efa0ea541ba31afbc5452ad085f0c659b1fcaba9f18522c480674090e6e27baa62f34bc51624c9b234402b5d3feb0aea1fdad4f4a593ca5a86c201f1426816bf20c594b2b8368f7ba2f5fd7caee90a43f0fc11652933947c872f64c7610e3a08469e875dad05f42233533273e44b76dd6fd95ab38469c973c30db7af83d1233273e0dc16f1b6847c86082da52eff2c281573ec80e546a3e4c64655193c739c8cdd6802f3d4224dc5e44d327f73192a53e42fe0fdddf68a1ba1efda955d0fdee3761248091d4b224fbd688eb0de8473c79ee6824c7f05ba37a6257d77d6314c3bbf06db5f75ae964fb540c02e5cd611cdb2c01809662752a794525138ec62b6c0613cae3d95dc2e02aff219c62c563cd06f340a27d19bc9a0ebe9bce853ad46560e66fdc6a80262c3be817dafafa300a8714af7b6bfa929a77af06b1cb2b23e1197858e66665dfd6d55c4d33fc598484fd8410cd3e3849d711a6524415117f254edb9ce6b9579203160e64e99dd8b309cc4bf100e6406991ed5cd359f6f5e053750fbbae40442c583f8730a6cc4904ce2b4a727386cd81ac75b928bbe45215ea5ba1b6ce555d2edfe29a08b4dc8ac00c614b77485f0c7f14f3e1c1bc120201bdb6d3931a3fd3d533f01b7bc1724d31472170ca0d955b6c0f453cb310e391d25b9fa4cf28da7027a863f39ef799fd534be3df74bbee64ffbad6a4cb4adde8173179ca1087ed4852886fa60468e57967de545fe0f8859a536cbb11e37d45801a05b36dfe7eba0b95c0be17fa1034c89b3e72c0269fa0ef94d32c005be5af9f13f9fda2d411f12fe0680881817d6a0731cb03260543aa7f775e17937e5268b664f27f0c2a51886fe7052c64535aa421761a4419963cfe0c84da098b177358c59259390108426333dc8dd6f012a658a6a48151225f06077ce9d5c55fa644cc4db5f6da85959df6efc53bdbd591f3a975f755fa1db709628ea5f651d9e6038dc02a457649c05118be4ea2492708ff00c96fd8bb4b7fcb60dc6a1264cb9673ff848058862f323928fda2346fc71706ffd65353b2de6dde7c44af730cc84431bfd2c52022630eb1fe12415dffa9ccc37c708e557378daed6656ea0da76d505a39e2689e3f78e071cc37be4f4344fcf0658cbc93f41c91c56e16ae102315ee7774498c572ee0761df98a538f27390340b210bbee26fe236b73675a59ae2d940f44957438decd0adfa06d5fa15d3930e117cc836be5c0aea76b440af5c4c732d9957986d700b4f501bc2538bfc32065126d89d0196de87c733df5cd543ddca1ddd17b88bdf9aa09c56be653bf321292a29d51d2b27bea52d3d53fc6d6e12e19a604289a453197037160f491bc04b6c384db41caf790674aa79282503cff1c81fef5e01de5e777f9bf108d34a999947162bc0352aca3f8a2b807a9aa18ee9882fb5815c1aff469acc23bab23920d147c21bc7fde276c99ab6ebd7d26353fc066dec57d2e442906921ac03c89da28222fc2a76b29890f098676cc3947048bf654e08237e85c38c4446b3696be1103c20d8774c8956f36a39b6482f9442934f283e129c94235b9368511b4c6efca00b2967989ab74c897bfc58f79f4d91bb340b6756131d237d8e33e68b30105c80cbed867a131b7f997265396f050f864c01e0514b18182cdbc42fa6ea31d5ed5d5bf5a0be503478be3ffedb444e3446a52b064fb59024352bea53cdb42bc45f23a3589bec87b42df5fc8d3027de4cf9b471c291b4a6e9a03f899aaaeda6f10262c11c3d9a599616e08467d003bfa63f9093fd83eb072fa2d32389598a7cce586ed7f8b2c704f6bbbccac720e50e1a1756cf4180ae2e7c554712cebc42d0c20705c47c067a83556e98fa8d2f3f62a4eeda5be962e4728c4b0b84143ae746f6db7cba2fc54b6d68b9a3aa5a2c1b0e50acbda48f3cc5a3ae8b7d245549976c45744d301b5ff51b81fb5ad9323ec679ed39737500cd05bf14ab341783092c738441c5faf311c021dc5c6536aa9ad7f611128defb354cb02d88e6d90d444c2144e01f9dc45fb8256c70a8cbe0ad6dd5fe770d0369ce9ea1593b2658eede8e21a485a1a383917bc7dc6d29126d4ca71f4db209b96d0e1e374f52429454c99027b6a493bbac2e97a41a8708ec750ce7a4a8c34e02cdef95552d565b18120ce9e68fb9950b9be2768f82257517850b6bd86da3c7b4062690540b959c52cf1ed203e29da62c2f78f34badde56bcbbd47d467d481f8ddd45b547c51a3e608968e2812ad4e7821721533299d567a85bfa4a581e875b4f4e9d546a77858004e767de6cd47817e0566ab04c386154517eb312179df996043ae07b7d80fc48bc40ade428f178fcba6713b43b857b5abdc7eefdcb0f3ccf13b490b354ea7afd8a98d6df443d7314eaeb82aa14469dbf897572c746666e151221a5888267a229de51f16234c5c877bf99e2584a1521d3e51d7d5782fbbf38e25af9f3ac9913460d51d600a82516bfc791d4af50ef48ea69e7ebbae01f1a65b1c1c1df1826e7444ae6e3af05027d980d5cd8d4989cb83a5b06c651cc2bf90c4670973b79d3d4e31b53604e281d60defc3dc5ee0b97ebf46526d19cb7d37de4c3564ac262e6b0d7ef666aafec57a3743050b6eb4ea9342385de89a4dce424dd275b55d1c52dc6079f3ef3a2173ea475dbdb7a0ea4d533512d76f5b8bf0e49e40cf8614c97118dd2813c42e01f370e55ddc4a188b1d46a8cf18e33a40f76df1ebb50965adcff35339c0075626d38c6087210094689e085b5a32d5986c54e094d5ddeb7dce5fdfd7004de0fe98b9daa4216c821f641a11c50bd023e5800085c00c8cc693e4a95c8624b16af4590c6181fe81376fb11726067b0b7ff5561b94df4bafdde85ddd8d622f8ad340dfec13fb829107ae64c88cfb324f854b8ae7c108001dcfb792dd3c310283994e7f551cc9d8fd7eb5e17e6fde75168fa809cdb261a4b0a5cfc3e5eda7f492eb6f9525b663991f1edeedde9ee9d4cfb4e0e57b0a5a64220e50b19a5054d3591c77033967a307909d1e554eaa3de8cabaacc0fba05587b026bcf19397286214b48f99a5cb5761385ecadf97667498e56b9895e68569c33237ae94ecb12cb165971b5cfe35e6135dda3c8f3b267de8f964bce80f4941556106574be0e61899c0b0bc65a3e66e9a4c78e041547524eefb8f126878533af7cf7439f773dead9906ae6664979051667db81a5c4c5ef862939137a54cc962bd478c7cbe68b6febff87974393d5ce38e03ca8f2cb7b9760976a747a746cd751d9ce99fc4deeb2ad05155a897e76f4d01ae434458f4fa6a82ea69117e3b58aaff788cb98f82b2c0b392768a3a5b29aeeab20baaceb8748436634e897186dc018fa52d10615c52e388430ab5311d548b2021af47ea8d1df6053fce2939b2da2c0a010454ab928cebe31edfad2e97099019540f17666052dd7acf2e8ffcc174178cc5e484e93aa4d57aff805a6e002dd87ede90fc99382ef97a99ffe4e9af3c186bc8bae69f6bab9071c8238620c246970f0d01e094af2608eff92c3cad5a42272e106142615a21ad48a3198115d96db11741e7ff473e1cadb68c40ef6dd2897c067fe355da5f9f98b869f9b80b31ad4093cdebf50ab6b401218590d5c929c232b1798198df0c9eb9c3fa65400171eaeee1afac5da9e6a3e6faf436d5b91da77bd9c84227eda57b1f2bfddec21defbd472c26d84dc0a5993ddc2387cc95cf3a654eb8aa59884c2a940f09b42e6585825e92975381d8fe4795231d9e959d021554a8efe9422526be2079ae8e3d8e568ca32988c6f5d31b7101f262c6d96ad108ae50cf13d2fd54084760562eb3a5b3250d26aba4d253881489952fe075c5785a81fa7d3f5286e99d02429700f32e414243a8f8e700254999846b3c64f481d117ce5725b9f3842bc7881"], &(0x7f0000000040)=0x1008) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r3, 0xe39}, &(0x7f00000000c0)=0x8) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000935000/0x2000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x50000000}, 0x1c) 2018/05/15 10:15:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xb]}, 0x2c) 2018/05/15 10:15:37 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x14, 0x800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:37 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x48, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:37 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_SIOCGIFCONF(0xffffffffffffff9c, 0x8910, &(0x7f0000003380)=@req={0x28, &(0x7f0000003340)={'bond0\x00', @ifru_addrs=@hci={0x1f, 0x0, 0x3}}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000033c0)={{{@in=@rand_addr, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f00000034c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003500)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e20, 0x7ff, 0x4e23, 0x6, 0x0, 0x80, 0xe50c3a0a58543ddb, 0x5e, r1, r2}, {0x2, 0x3ff, 0x3ff, 0x648, 0x1, 0xc2, 0xfffffffffffffe00, 0x7}, {0x9, 0x9, 0x7, 0x10000}, 0x4, 0x6e6bc0, 0x2, 0x1, 0x1}, {{@in6, 0x4d6, 0x3c}, 0x2, @in, 0x3503, 0x1, 0x0, 0x6, 0xfffffffffffffffb, 0x7fff, 0xfffffffffffffff9}}, 0xe8) r3 = socket(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000100)="c60600000000000100f66fe94a10e966e3b89d36f7037eb24ae59ef5dc760e87984be2d776f8290bf47309b9ddcd07ae478488af791256b35f50c9d233034b50eb593c43b08067aa6232b848c603743dd8d4c633ba4d5b521b6a1402a246fc4646bc9ba416af5416cde2583e208937d67b1a0e4ed40fb17a8c231a6c928d910fef7ff7600d163404ed073d51bc2f9728e633cce63f62d48c") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x12, &(0x7f0000000000), 0x4) [ 326.086483] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xc00000000000000]}, 0x2c) 2018/05/15 10:15:37 executing program 6: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x200, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000180)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r1, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r1, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000100)=""/31) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r1, &(0x7f0000000080)="48c40b16fd8393954412f6850b73cdaf187294ec48bef3ede1986964f8bced9e93f03bed37fce0e44cbf1b435ecdce78ade687139164a3c5096af386250db6e89651d177e5645e730463341faf99fffc26cdb358000000000000000000", &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x4800000000000000}, 0x1c) 2018/05/15 10:15:37 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) [ 326.276661] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 326.870204] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:38 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000380)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000003c0)=0x0) r2 = getpgrp(r1) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000100)={{0x1, 0x0, 0xe2d1, 0x3ff, "2fb53ec9f45d97cdf760eafc2efeb409bca0a421eaa40ed8b312e27a120bb587714b1a0c51bb85dff87024c1", 0x6ed}, 0x0, 0x0, 0x2, r2, 0x5, 0xfffffffffffffff9, "882113a72b7ae6b0f57d606d56243487d8545477d330af8b0fe25bfdf68addff5b8280a144bcc7c1c47b15ef428f7403d2373377f3b6f9ea9a167b9d7c5fca5c", &(0x7f0000000080)='usersystem&}wlan0\x00', 0x12, [], [0x9, 0xffffffffffff20a6, 0x400, 0x7]}) exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) ioctl(r0, 0x733d05f9, &(0x7f0000000040)="31214b1075b37c1c7fec37a3") 2018/05/15 10:15:38 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:38 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x100000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x1000000000000000]}, 0x2c) 2018/05/15 10:15:38 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x5, 0xfff, 0x3f, 0x4, 0xb022, 0x100000000, 0xffffffff, 0xfff, 0x271b, 0xfffffffffffffffd, 0xbc2d, 0x6}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r2 = semget$private(0x0, 0x3, 0x0) semctl$GETPID(r2, 0x3, 0xb, &(0x7f00000000c0)=""/235) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000240), &(0x7f0000000740)}, 0x20) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f00000001c0)={0x7, 0x0, [{}, {}, {}, {}, {}, {}, {}]}) 2018/05/15 10:15:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x7000000}, 0x1c) 2018/05/15 10:15:38 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x80400, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000280)) mmap(&(0x7f0000312000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100000001, 0x600000) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000380)=@routing={0x3f, 0x12, 0x3, 0x53, 0x0, [@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [], 0xbb}, @empty, @empty, @empty, @mcast2={0xff, 0x2, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}]}, 0x98) r2 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x6, 0x2) linkat(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00', 0x1400) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e21}, 0x10) clone(0x0, &(0x7f0000000440)="574c74bde4c914f40b5a357940dfb821fc38aa9c70bf9bf56fe1eff50dbd6b68ce06ccb1d1ef16a30ced412b71605d424964520d1ee363ab93e88c87e06b5758ddce7bcfe03d56647bc7530c5bc37e6287aadae4d5a88d5cec72b60dadc256421fab216d3bffb961e8ff65", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000280)) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000002c0), 0xffffffffffffff42) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) 2018/05/15 10:15:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) [ 327.103534] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xf00000000000000]}, 0x2c) 2018/05/15 10:15:38 executing program 2: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000280)={r0, 0x5, 0xffffffff, "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"}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x1000000}, 0x1c) 2018/05/15 10:15:38 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) unlink(&(0x7f0000000080)='./file0\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen$netrom(r1, 0x5) ioctl$sock_SIOCINQ(r1, 0x894b, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x158) clock_getres(0x6, &(0x7f0000000000)) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) quotactl(0x5, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f00000001c0)="f82c58334d08a35235bbb26d80942810b280") 2018/05/15 10:15:38 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x5000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x700]}, 0x2c) [ 327.232485] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:38 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x101100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="00040000"], &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r1, 0x4}, &(0x7f0000000100)=0x8) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:38 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x1000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 327.906200] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:39 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xf000000]}, 0x2c) 2018/05/15 10:15:39 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0xa80) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x100, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000280)=0x14) sendto$packet(r1, &(0x7f0000000800)="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", 0x1000, 0x0, &(0x7f00000002c0)={0x11, 0x19, r2, 0x1, 0x5, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000380)}, 0x20) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x400800, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0)=0x3, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000140)=""/184) 2018/05/15 10:15:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x9000000}, 0x1c) 2018/05/15 10:15:39 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0xa000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:39 executing program 3: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x100, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000380)={&(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x1, 0x2, 0x2, 0x3}) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000003c0)=r1) r2 = syz_open_procfs(r0, &(0x7f0000000040)='fd/3\x00') exit(0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000140)={0x9, 0x3}, 0x2) preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:39 executing program 0: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @hyper}, 0x10, 0x800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) connect$netrom(r1, &(0x7f0000000100)=@full={{0x3, {"48429c1f046492"}, 0x3}, [{"a38ac73b6da2e2"}, {"0083279aa98d42"}, {"e4f2ed6c263420"}, {"90660d28f5d552"}, {"c8567d10c7bb5a"}, {"bdc52b7c9c71ed"}, {"763dfb3f168028"}, {"8114692fbd9841"}]}, 0x2fc) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:39 executing program 2: r0 = socket(0xa, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000100)={{0xa0, 0x3, 0x80, 0x8, "27a5d448c0478b775b996c54e8bfa124b6707ce3d0b51590407f16aa63c3a26ee00e8703eac5ff69c1b8c02f", 0x7}, 0x0, 0x0, 0x7fff, r2, 0x4, 0x0, "c4ef1e1be5d5cdace1bead9291cd39309a5891fbf66595c49124d1b34096c5c6c77fa25907a1661b7267ec252d68474c0a028fbcdec501e2309fc84998f6097e", &(0x7f00000000c0)="248f76626f786e65743100", 0xb, [], [0x4, 0x267e6ecb, 0x1ff]}) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) sendmsg$nl_netfilter(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x8, 0xb10, 0x70bd2b, 0x25dfdbfe, {0xd, 0x0, 0x2}, [@typed={0x8, 0x2f, @u32=0x3ff}, @typed={0x8, 0x1d, @uid=r3}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x40005) 2018/05/15 10:15:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:39 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x4000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 328.250353] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 329.033319] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:40 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x700]}, 0x2c) 2018/05/15 10:15:40 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380), 0x4}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:40 executing program 2: r0 = socket(0xa, 0x6, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:40 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x2000, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000347000/0x2000)=nil, 0x2000}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20200, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000000)) 2018/05/15 10:15:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x400300}, 0x1c) 2018/05/15 10:15:40 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a00, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:40 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) gettid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000180)="ffff0104000073") fstat(r1, &(0x7f0000000040)) exit(0xffffffff) preadv(r1, &(0x7f0000000040), 0x10000000000000a9, 0x0) pipe2(&(0x7f00000000c0), 0x800) 2018/05/15 10:15:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, 0xffffffffffffffff, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:40 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x800, 0x0) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/46, 0x2e}], 0x1, &(0x7f0000000100)=""/105, 0x69, 0x5ae}, 0x6}], 0x1, 0x141, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:40 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x600000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 329.384010] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xfc}, 0x1c) 2018/05/15 10:15:40 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x2]}, 0x2c) 2018/05/15 10:15:40 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000040)=0x40000, 0x4) 2018/05/15 10:15:41 executing program 0: r0 = semget(0x2, 0x2, 0x200) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/32) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:41 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) ioctl$sock_ipx_SIOCAIPXITFCRT(r0, 0x89e0, &(0x7f0000000100)=0x1ff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000180)="b2a01c3fa7157d8594be40f9027a8f60c771498d0244ee2334e0146c47edecb7bcbda96fe38c78ed1d79184e137494c3584f8cce62d538c94a60269f989d548b17184f4255cd2d49a4f7b6bf9a6fd7b2304c1e2d69008b740000000000000000", &(0x7f0000000280)="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", 0x1}, 0x19) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) getpeername$llc(r1, &(0x7f0000000080), &(0x7f00000000c0)=0x10) [ 329.519577] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:41 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x6800000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:41 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x2c) 2018/05/15 10:15:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@add_del={0x2, &(0x7f0000000040)='sit0\x00', 0x2}) r1 = socket(0xa, 0x8080f, 0x0) ioctl(r1, 0x8902, &(0x7f0000000080)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x40002, 0x0) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x401) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x12, &(0x7f0000000000), 0x4) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000140)) 2018/05/15 10:15:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x3000000}, 0x1c) 2018/05/15 10:15:41 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffffd, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000080)={0x2}) 2018/05/15 10:15:41 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x6c00000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:41 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000280)={0x7, 0xffffffffffffffff, 0x4, 0xc8, &(0x7f0000000040)=""/200, 0x8d, &(0x7f0000000140)=""/141, 0x47, &(0x7f0000000200)=""/71}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) [ 329.713135] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 330.176051] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, 0xffffffffffffffff, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:41 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x18000000]}, 0x2c) 2018/05/15 10:15:41 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000100)='threaded\x00', 0x5d6b) fallocate(r0, 0x0, 0x0, 0xffff) fallocate(r0, 0x3, 0x0, 0x2cbd) sync_file_range(r0, 0x0, 0x0, 0x2) r1 = socket(0xa, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x12, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040)={0x7ff, 0x8, 0x3, 0x2}, 0x8) 2018/05/15 10:15:41 executing program 6: lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x2000, 0x0) connect$llc(r0, &(0x7f0000000140)={0x1a, 0x33f, 0x81, 0x100000000, 0x1f, 0x8, @random="b6d3c1d2cf5c"}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r1, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r1, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) 2018/05/15 10:15:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xf401}, 0x1c) 2018/05/15 10:15:41 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x300, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:41 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) mremap(&(0x7f00005d1000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000817000/0x1000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, 0x1c) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x20080) getpeername$netrom(r1, &(0x7f0000000180)=@full, &(0x7f00000000c0)=0x48) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000000)=@generic={0x0, "b3ca70bb38e06a000cf110d3fc6d31e72402342494b2d685b675135ecc37b69957c6799b2c4103b8a91c8c76964e44032099e795082a2965241a865c1c330cad657cca4033203f66d8296fdd3651be0ea087dce9dfe1dff4a8dde79999d1af8c2c808d739c252901f6d52aa84a10f11abb0fd90d5245ff9eb3de01003a48"}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000180)}, 0x4000044) r2 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000025c0), &(0x7f0000002600)=0x4) r3 = syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x7, 0x10000) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000400)={{{@in6, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) 2018/05/15 10:15:41 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000040)={0x2, r0, 0x1}) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) [ 330.520139] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 331.312051] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:42 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x8]}, 0x2c) 2018/05/15 10:15:42 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x81, 0x0, [0x1, 0xa1, 0xabac, 0x8]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:42 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0xffffffff00000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:42 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) sendto$inet(r0, &(0x7f0000000040)="d721105c1b02baaf7e85f0dc901204497a63cbf1a514ab693c4824bffa29191e5c23882ab4aa42c21f938af0040b5fcaf8ef6867fc9aa4d00fb4ccf12f20973eee06987c5ae8a86a16b382bb86fcf9ae4dbfbaedb56e918a9cde093535d38aa56ae9ade6094fbcc5ed774371ff79511fe22ba5094c8d8a6493", 0x79, 0x48005, &(0x7f00000000c0)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/05/15 10:15:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x50}, 0x1c) 2018/05/15 10:15:42 executing program 0: mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xffff7ffffffffffc, 0x8031, 0xffffffffffffffff, 0x4) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000548000/0x2000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 2018/05/15 10:15:42 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0xca}], 0x32e, 0x0) shutdown(r0, 0x1) 2018/05/15 10:15:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, 0xffffffffffffffff, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) [ 331.491104] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:43 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) socketpair(0x10, 0x802, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000080)={0xfffffffffffff2c6, 0x0, 0x0, 0x1f}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f00000000c0)={0x9, r2}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:43 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x5209000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 331.539315] Unknown ioctl 19464 2018/05/15 10:15:43 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x1000000]}, 0x2c) 2018/05/15 10:15:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x20000}, 0x1c) 2018/05/15 10:15:43 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) timer_create(0x1, &(0x7f0000000400)={0x0, 0x800000000000034, 0x4, @tid=r1}, &(0x7f0000000340)) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c830, r0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0xe3, "64659a82e0e2fec7aba898c992f9ef1a2349ea1853431188dc9396af454d53b6b22708af6b17a83a3e63d6fadc9bb1fdb934ea4c230995693bc65b97ee37d0e19d78f5367c784f40d63138b841316c09c2e89b66d602254edfdec245e315ce960fae3e529d9b477f09af3a6dc962ddd05993adfec32ad83ff4538bd21cdba4551c7f6a93ab69d810e9f34f3508948679e2904fdd26031e3f7ccdb3532253f459c4a7912a4476ad2a92c3fe8e3a109e02b4c298884cf739e9dbca9ee9466869536457a283e603bfe092befe6ae9c72052f15d95c923b56a1820db8809cb1d0c299580d6"}, &(0x7f0000000040)=0xeb) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000380)=[{0xa, 0x61b}], 0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000280)={r4, @in={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x9, 0x9}, 0x90) 2018/05/15 10:15:43 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0xcb47, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f00006af000/0x1000)=nil, 0x1000, 0x0, 0x5c834, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000100), 0x4) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x9, {0x2, 0x4e24, @multicast2=0xe0000002}, {0x2, 0x4e23, @multicast2=0xe0000002}, {0x2, 0x4e21, @broadcast=0xffffffff}, 0x10a, 0x2, 0x4bd5, 0x100000001, 0xc43f, &(0x7f0000000040)='ip6gretap0\x00', 0x9, 0x7fff, 0x400}) [ 331.641730] Unknown ioctl 19464 2018/05/15 10:15:43 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x3000000]}, 0x2c) [ 331.674477] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 332.294714] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:43 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x2000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:43 executing program 6: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7f, 0x400) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x4, 0x8, 0xffffffffffffffff, 0x5, r0, 0x200}, 0x3f71526f61bf2ee8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r1, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r1, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r1, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:43 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4000, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x1) fcntl$addseals(r1, 0x409, 0x2) syz_read_part_table(0x605, 0x6, &(0x7f0000001380)=[{&(0x7f0000000040), 0x0, 0x7}, {&(0x7f0000000380)="1686808800b654430e22a397f5e6d433ba498dd7d8855990a1b85965b7692b77beede16d392a86419dcf803a02fef0cc87821103d4d1d9631e9c697e08deb0e08fc0f0bb6815c99b8733a25e9566bb3accb8d85fd7efa9e1b3c9d288b9f563c1c2a9c3ed68506d9f773e4bd5e2e3a8ede712b543f75d50b39759ab4d06013fe32a421b58a5ee5af58ada09cacef4108319858f9682650ba550f5c8539e9724794a3b76e10a67845eb74fe685460805225b4debf459b07669b904874a2c17cf248656ca3c828006a06647679593e67a1ba4f3263fe7a9e4737084b330cd825cc5a90f78dbc33a81fa1321793bb8370798482a221748a476dd6bbcb21ed90e167bd9e9b48f1a9818b05862149a2550dfa5bef9e0cd3981fadfa98151e88c47b210f94f4648f7ff324c0b8d65a1a92cbebed2c98bb059c87928f0fbbb8ef03b8443820605218c7724a23071a0c2b97ab214bea2dcb4223ffdb61e4ae3c2a26313ddd2ce3e89ef19c80bbd09b980598c61c5e56bb771d838ffe43870ca0bca6e53abd6f783509b4613bd5e7d20a13502d51f30761900d00d62fbcd24d7e979425a04f140671a9b6c8df9bf123586ce7c9178b1490cc27582a5d1de07854821599f10a414fb5f89325020c12cfdf6d43556999db1f79603bd544974168a833989447677135bdf2c5374f0e2c40ca40d6c9046527f4c7cf7784b27dceac7a243069bfd52c556545095ea3b5714e0f152596bea3d4aaefd63d799cd3d0bd5830d26cdeda005c601c4bac0e275ec4b1439857e675ee99db053d058eb21c1bb91e18ee75a9a716f4984a9ea7111624142230670ae22ffc1f5d5f77fcb33fd48ccb69d79c89b3e2add6b76820bd9c1e2d8a97796ce2660a6160e48a96ac3176e71ea850420b3c6d8f09b5e7a9cb3b9abcd0abb3bda2de7fb572275aa315ac8fc2980e5e264e02131811699a9ea2f6f836c4f357d26bcc99f3e0a444d40c3919bef7c313e542274377512e3221c0f29dc682bc94787235957f2bddae5e87a6c7a04f7131880dcb90a9d845db2df247de159784a0c5efc07a9de4538f8c4e5aa18aa3c31e5da82c96156e47bd70376c2700dab4828f64a3db9af04c7ffa33fde5f0c08217ef2400887317e6a77ff14a4a16969884271e1c644aeaaa82d3166281c1996964b2877d7c561ebd5cb6c0c9afd73c8e9272f85bd89b8edfb87552ec4801a5039814a98d68edb8deea7d72e48986e1c964237c27b0b645e65562b8d2aa96e205b88901e6ca89d154195b4f729b8189da844d6e93e7732b915876b986f479b088fffbde0330987ce4617daa3fb8ab5a332faa006bdd553c01350c735123226cf631250f5fa528e57d34f0b497c12f57bddf624bfd9e50fae11c75a8dda35a7d77f751d7ea6aaf339d09844669b0eb006cc3348f6f5badbabe7587f04fb675a9cd24efd9e6322444ad231b7d71b31e627cdaa97248e8bd6d8894db50afc0b91664a59cd0a469d43e255e7c1d03dd533415fbb1ca4389e8aefd2b3eb159f27dbf2aefeba843ca670021f980ff673cc2a8527dc9da7c353bcd936fca756d33d407963e67af4db11da4ed736df6a0eb5d374bc23bf9547d3f2b226bbe4e203cba694ea83e23c887cd01e1f48cb17d93ee2f49fc3e67abb1cfc6e6e2cb676b3ba9aa78502de485988fcdca38698cdd9b16aa2793e21bca229df7f4d124bd8ecc741521cfb95de319a40ca421f2a8917ebdc9d663238b09b1061d7013d1223b8edfc7a7ffda9ea98ca816d28ae7a1338a73f621259a20479fecc68e302f20c62c48f96e83113692876d17454d287ef8767b78f19f90ac63ea22c899813f549730aad176621cd0b5b049ebafaa65cdfe764375baed17c2662385b1dc83d612e4a42cd465adf97d6aed522e7a1b2d769f6f99f25fe0dfbc12e1beca9fbe47eba0e1d085c6b025e67091a3838b139726ac7e1e888a25a30b8ae8b16a14d7b76bdc91bbef5f3af64c71d78525c2a26cf88846c352ed65b64a9803727784c50aff334f2d5793fc73abd3f1d08d23ada395173268283cfb4879cd11175f763f9b45d4ef402a424c4d6f74b7db6cd26244093715ae3d79553bd11ea96f8a6206ead5432860b3826f750a4593826a26cb6343cdcd18ba5bf56e7e862ca8496f59446e95ad4afce62cf3ad60d01cd1380bea5ee971867c1908938d03f7b37e4c51b079922ad371ba169ee0519ccfaffd8a45d715c68868b0e8ae1a6f16ab2b081553436158e3bb6d0cb5023d156712bb60ca3fc3dfb499979a3d68c9189800a4021b7d2d051957174fcab5ee37266bfdbb2bc9aebf545d6060226edf2e0f2c28566446e76584833e16f657656f16d6b880f4bb493fc5c1db010539d65a8672510163b6fb0605fe42d90e0a150f13947105b4622c05f77fd55dd6ffe11fcf73ecfe1310d8eb3a0e6694aa863adac604d2e4263c3122168bfc8e3591ecb3d30dd880b07445f17eece5b7890468ebab517efec868693157aabfc0c710cc156a794cf232ce7f6767910a79e9f40715fa6281c8e61209bc577280c838cdcffed801b25cc9692b5d86a84bd26686a6b80457a04efa41f84ff4b9d4dd91a89157ba4fb3debc7165f59e30689b874797172d8db5efb686dde54f14d1073d0ca219dbf552da91905c0cc9132cb8d0dfe0362fed5dcc7113e3a88e0af6a7ec3e90110fbffd2d0fc2fa4990dabf8d40e82f1919aed68e2462bd3adb3f6055e96c8afb10f35a8ea3e96f66042b7fd47e60273889009d7e77f32684f865ef128520ebd3d9b342c8f155540c9bbe300b44478184a35a878424cf8ee773b43409a0256eec44daec8a4002dded0165c6e2cab77961d9a5b0458948cb19546c529bf22107db63301689edfbb78698eba7236cab129c929e16e08749f0e79f948c52f3a7152e6560a21d1ebb0149d699bede37bd75ab6baa740666007ec99b000d77a385200632666e9b144d7a5903771949e7e74c23c1e11b27127a3e7ebfea35d70a1d744f509cd6fa5e5c3418d23531d4a49decbeeb04013d397b01e288e22bb035e4c7a3a47c4f1e46133ec71a382195983ddb6fb10d4a3304259982b241b35d97b00eca3411b429c195bba0e6483c25681671e21ddc5424ce77b9140fabc5ad3d4788bf393d02b8fba5083fdc1fa5a9d87358123fc76e7e829014b859fc2e526a137590b0cba0ebdb1c25037aa1db2a61159485b2fd5bd145893293beec66cc1c9111ffe42ab713fc744ec107974560a617202b7fd445dafc1a01af066e497e234dcad2108f8c3a0160352ae5f63936d93e81db234854c8595fed17d5c317f460146158b9442b247aabf1fdb670b7868c1c60db67b16526f37d8ed203b347e05ab40ca69d1ed35de591e1a60fca641fdb11236eb1e265cd1c58188b8b630d7a92749cb4b0ad60ca9654c8989ac4b49236dc9ccbfb54bb49504e632380ef05c33e299585bf74dc06a46a2b27c32add4aa52ec72c57ea017ab09f7b0ac5c74f69220a205dd760b6e5b52a8472372c54967d2d7da8ac96f983ccdf4d864ac2c781e8788467d22ce46e418ce9a58309796f3a892c9f3f8759d55e9846f042db07b496ec10a5790d8c0fbaa4ff46cf2eb0e53c33c9ab0081a93f1722f94726e6b9da8191eb09dec29d372040169d5d36698dc5b4d26e3c9813a0f98057a8ef1a0fe95c481ac6a60fc294db373cfe7dacb5e2abe9864b0e6989a47d45c5466a091cb9a783f7c41b7e3b4322ab0417cdbae6a49b7d40af34b3ff6a97e679713a9c1d67b6e03f98df540f84781da1ef254a314528182ff85f34a3c6db151e53a8984c681766e2df3259efcf96da9776aa9a38fdaa7a4d6766ca9bfe80e2e8eb01f901e768197e27c93ee45fc6e4b85d40079be4070eb91b51d8ade060c70d0d5462dc9a8b34c12214fba54fa70ba667ce7c585fcfb3d835752c5ff893db1f9bf74667111f395360a0e3b12b6b0a492d387ef06fcb18ce2e71cd224a7763c90ee284cbee2cb4f302d8033a94d41f62d556cc90824de9a41ac13d412fc744f870997b88d3914b458339ed83febd2e83c25aca4470fee0cdcdb401e1182e1dcaebdae468c283bde97a65b58d8628bc06ccedaf79c2c0d7bf67a85149276d245a0a86072909f2565f512ec0fdf0cacd116f7773c2f69638cb62d1242c68d4552587b24d3ea1698960d94c8a592e72cd12d4d4601ec87478424a90a780d34d15acab29e28a93a1b720da763a2881806288e8b56618dcf88b88200a2efbf0b7df7043c05d722e6893c379b8c2a34445296f97c218f513771800cc76d035058e0a3f2756d43f9679654997aa41230452bef2e2c6d4810c4fd665ab5aa26e61bad6150ef487e82279fb66a59f38b2e764fbe6002b372b390baa5dafa9d196f77421a5bda82e5e88fad2418647b5ab82aca0fa7b7a12dac36ccdda751a83b2d287042ec69d527eeb5d1f9636db4011abcd2d549a0a8bd995065d68e9fc0ef494b911f33db39779fb54bbd18e2a4588797773c1a730ff84febed4c48bf94261e78122760089875d2f4ea0ff7172a3c8f7900143a324682fda9aefc47f42d63ed66438137cdde119c65c6c4c5dc8cbfaa38e413d6a5610971600f256659e75a4b07809d3c384d2ddcfcd3814577419a3640e59ce958e01929a46888c12ae5c897e69538d08200e710c8a59f74326569fcbd02580d9c18fc1ea10c6cca062464fa3f73baa04dbc8bbe925be0e2eda3f02255673335516806bef212316c87e4d1913be71f94a6307d1a67ddccc729b4f113df31a89642a008e2e3cd317b6a2a7ae4f6dcc4cf1c1e123ea0cb03e7b68cbaf1decd03167459dc249f41b3e18040d8a891f962c372ed669f659f96030fd36a3c8b41bf75a0a5419c7d508c692cb7b655fce7ff45b22c9c32639f4580e697d312f1614e4c0caddf85c100c7eb38353bbe7155afd1e978d3ab398746a3a24c05c57927b05011c57a3ea9e0bd3f4bf01f357c7d84bb3718f1a997c505385268c667f8d89694b4757c96408889af57b907277c933d180e2cca2fc23a761d8ad077b0c4b7c3861684ed6e584cc9487eaa739ecd18cd0bacc4c236391319132ea8ac7c01680245f7af495b474adde185dd63fba04c6c6f3a288bed472e49cdf8b11815e4d1e09cb53581b48ce8e993342c044af483241d03859a6f783766ab207c5bbf10e60af03c642ed63c0626b992dc73d69f3f1ef25ef2db03c455ac0dd40c6f4ff84f596577e4a1f7590b7990a02842e17fa59d99f8868dd149a268f1e4876fe11f0b8fb7e7dfd9d3ff4147962821c4fc82334eb822349b9456bb64359f394ff891469e507aa61223100f15e66492965157995a8c898964308966f9a0e3a378b7adb898f8ca2f68dd96e40ec4cc78873f7920399e2d29477081507fa1da9349802891ce705f912a74debf816a4aedbddef446ee9165282052351c12a5d43d54ab82e0ef726cb63623465f7973fa88f3b4fc9ea53a92248c462ec98f54221f13a4e13d36c54f54522f55d0f074b2c049feab1ca1639d9d4549592b5d1bf89e28c24c4c90c03600a43b7be5026cd084779a33ca8658acc823c0311de9145d83ffc93ed3756f5a65b0ce16f5c133f1a69daa3618e4ff95f4ff09d426d2a244923c2212283cdf3a0068719e7a1ed21b5f6c65bde3daabd5f91e799f0329fe23e313a2c98549c212ff593ad60a9ce57678e1e1f1f409103ee14678c2a71324b9cecf2193160efa32cb26e28016d026579af8749eacfe4a256762cc7ddc64f45ba08b78a0c86c454b0caf097148", 0x1000, 0xffff}, {&(0x7f0000000080)="63b8e8323c64fb256224b750b23605a5960056e067c933f25c5d96f473d128079c268b5e60cde94b97cbdbc1f0ec8d933359b00fbaccceb878e60e2a4790381f5544f11a84146acbed7a442a710db66ea3b8e88a0c9d962373dcc66b3cf6db19583d85f837de4f95f830147d017803350f7d07f6236a0a0fff6ef1c07fa015aa42b097e552f7fd60c2b9e50abb817b17b4993517a98bf1beb907cf49dc31a537454065d46fe1a905263f4f761f7c4bc7d4171003d05b7fc5bcbcda97b9b3e2e777a7b5ed031d90821871f1e5c7da304a5981f5dfd8a0833c", 0xd8, 0x4}, {&(0x7f0000000180)="c730b00680c09d6f85e807b5aec67c18802d63e529fe3a620dc4738c16209d0dacee808f7ae7a106c4d67ddcf0260ee4017529dd5ffb554d73110bc7b64da10acf5f31208aba10f0302c9240010f", 0x4e, 0x9}, {&(0x7f0000000200)="56f33bf7b2f710634463006a0cc6326083f77f3b1d4e59537a58aa7021068fb5d51b8e63d4eb36386801086553a4ff08e108dd41baa8c9481a1a17bfd7ca8cc4f4bb1b7d3dc809f3b90831fe17a870a1a2933c52349964228e056561de4b6f9204ea15a7c8edd4", 0x67, 0xfff}, {&(0x7f0000000280)="52367b6002b74ed9b2a6f70b297e36f77c410a0febc6ac71f7c4c7115246d21f81df33c3027969da193fda60f7865756d20c65bc191352b60a178e8ffef2144aee75f5e8adc655df7c46891ec2760410ea07e9313beaa4bb23141a2c39fc5bd838df4878d96536c2967029c36693f5b1928ed322781060bbf454", 0x7a, 0x5}]) 2018/05/15 10:15:43 executing program 2: r0 = socket(0xa, 0x5, 0x100000000) read(r0, &(0x7f0000000040)=""/192, 0xc0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x40020000}, 0x1c) 2018/05/15 10:15:43 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xb00]}, 0x2c) 2018/05/15 10:15:43 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) 2018/05/15 10:15:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:44 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400000, 0x20) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000080)=0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:44 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x2) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:44 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x4]}, 0x2c) [ 332.507663] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:44 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x1) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/05/15 10:15:44 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x6000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xe00}, 0x1c) 2018/05/15 10:15:44 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0xd5, 0x4) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:44 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x80000) tee(r0, r1, 0xae9c, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000480)="d9", &(0x7f00000000c0)="2e4eca5f1818f9e402f0d7553c7b5ab14ba53a", 0xffffffffffffffff}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r2, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r2, &(0x7f0000000700), &(0x7f0000000740)}, 0xfffffffffffffd6b) openat$cgroup_subtree(r1, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) [ 332.655133] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:44 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x2c) 2018/05/15 10:15:44 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x300000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x300}, 0x1c) 2018/05/15 10:15:44 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000040)={0xfff, 0x5, 0x4, 0x0, 0x7, [{0x2, 0x80000000, 0x2}, {0x81, 0x6, 0xd5d9, 0x0, 0x0, 0x208}, {0x1, 0x8, 0x3, 0x0, 0x0, 0x8}, {0x1, 0x6, 0x6, 0x0, 0x0, 0x2}, {0x3, 0x6, 0x2, 0x0, 0x0, 0x4}, {0x80000001, 0x400, 0x16, 0x0, 0x0, 0x80}, {0x8, 0x1ff, 0x10001, 0x0, 0x0, 0x2}]}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x8001, 0x4800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x10) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)=0x7fff) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000340)={0x0, 0x69, "ce58aa99107cb3e849b9f341cbffb08e7a4928d3fd1ee6c25950c594ac2995ae166f3d05b7a826e55b713ac5ce70c60660c24ed610cc707eee8250e3f3610e78e9ce4adc809bf5ad5e517a17c7c42801a8a5079129b65913942c3f8332b337c73479ad7c2278727cf8"}, &(0x7f00000003c0)=0x71) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000400)={r2, @in6={{0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}}, 0x10001, 0x200}, 0x90) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:44 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4800, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000080)={0x101, 0x20000, 0x8c2, 0x1, 0x0, 0x6}) 2018/05/15 10:15:44 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xffffffffffff0001, 0x2000) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@empty, @rand_addr=0x80000001, 0x1, 0x2, [@broadcast=0xffffffff, @rand_addr=0x4]}, 0x18) symlinkat(&(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:44 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) [ 333.308767] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) [ 333.391775] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:44 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x5000000]}, 0x2c) 2018/05/15 10:15:44 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) r1 = open(&(0x7f0000000100)='./file0\x00', 0x1, 0x54) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000140)={0x8, 0x2}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:44 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) write$eventfd(r1, &(0x7f0000000080)=0xff, 0x8) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:44 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x48}, 0x1c) 2018/05/15 10:15:45 executing program 0: mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x7f, "72b56818a0ec3cbfd641d663dc4319f7262a2b9f1ee3eee743d6747c7478e85e81bedd8674c540148856502778029ece1178d8cbd9bf7b75a2c807eeb85f5db979d60c9c14d3100b15a6ae7f051e80da6c805daec523bac4f9bc4476be76cadb4111e30a9a34977801d072e83cafa4f89f21f29d2e29dda54e0a9d668091f1"}, &(0x7f0000000100)=0x87) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e23, 0xffffffffffffffff, @dev={0xfe, 0x80, [], 0xd}, 0x9}}, [0x3, 0xcc3, 0x3, 0x6, 0x86, 0x5, 0x7, 0x7, 0xf673, 0x7f, 0xf0a9, 0x10001, 0x7, 0x7, 0x53]}, &(0x7f0000000240)=0x100) mremap(&(0x7f00008e2000/0x4000)=nil, 0x4000, 0x800000, 0x7, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) [ 333.529381] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 334.202936] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:45 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x20000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:45 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) socketpair(0xb, 0x3, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:45 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x7000000]}, 0x2c) 2018/05/15 10:15:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x803e, r0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x8000000003, &(0x7f0000130000/0x800000)=nil) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x5}, 0x1c) 2018/05/15 10:15:45 executing program 3: r0 = open(&(0x7f00000005c0)='./file0\x00', 0x3f, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}, 0x3}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') ioctl$TTUNGETFILTER(r0, 0x801054db, &(0x7f0000000180)=""/160) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000480)=@ax25={0x3, {"4c6e4b6dfcc9fa"}, 0xfff}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000600)="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", 0x1000}], 0x1, &(0x7f0000001600)=[{0x108, 0x1, 0x2f98, "08409a09e59e77af9aa473898d093a516e35cd9b04dfc404bc67976b1046ae26b3b5b36d13e04b1d268caf143c48c19370989f2892ae7af88b98fdc438b77bea28566171ced6370ea8e863a622e9400ba518bef006ecbffd70098f958bfc926297fd701a43890942aacc00886540c0c97cf186f24043e5be6d030422d25803e78d45599d8835f3f1b82de21b8410aa911dd7a73a1765768a655aff26090bed28c5b1933b3bb6994d69d0751ebb93930ba711c1051560c68452b5a585a188c6f9231bc831654ebe7b616562d7911a2ed984761dd3c42ee7cecf76478972cd5a83cbfc360ee0b9a5b0a14c52381a3b9f6a0a"}, {0xe0, 0x10f, 0x101, "33d18cd1a92feb3fc54f9890d4ee004e944e229043263b386726200e5dd81b450f87bea9d61de0ab043bdcce35e70b275edf6f6ed5edbd78ed11ad0c687731a9386c0049f079577803652fafbb0ee4a61bd1ac9cbc56f33e4d97a45315006aa27c0f77fe1bca7f63b6248aafe9ce099bf055e31a1916f5b4f0cad9d47b3a67b8a8ea207a6bd14f800229a9ab90a1144ec5d453783bd42e511b5a24465de00e5ea490320e69e212c063f8d67d02bf07f6600be06ea3839cf0414494cd73b94de199f3c6fc7175e653306928"}], 0x1e8, 0x800}, 0x4000) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000100)=0x3ff) exit(0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'veth0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000002000000e60000007efa33b405d78c0827fba53f3a70672e7567ff2355b17b2ebc53a2c8a3faaf6a093e324247d2daa04ab00d2efd698420e1da80bb3309c0ec90ea0902cf4fd0e7f092e189ed1ef24009db1e6c95945873f7f6baadba82b0fea0c2b777ee542b0d882df84be0d6946babfefcc1241a088dc1fa65ffd2f350d4b3663be7a5240af2d970bd29084e44237915f17938b396c0bcecc0f7bc9c5bfd39b5ad190652d17753ec7164bbce6de6615b141082218c9e7ab9317b29ad611350edeeebe2062d763a03b836fbc275cbaccc3f430e19868998f243ff9d207e49a50fe8b0b047074bda4f79d55781"]}) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80, 0x0) 2018/05/15 10:15:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:45 executing program 2: r0 = socket(0xa, 0x5, 0x1000000) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000da1000/0x3000)=nil, 0x3000, 0x0, 0x30, r0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x18000, 0x0) r2 = fcntl$getown(r0, 0x9) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000080)=r2) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000)=0x1, 0x4) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000180)=ANY=[@ANYBLOB="8d000000190000000bdd3bf4471815dcead40562fa952fc46c0dee5fe3aa4ae84903b9a3ab72b72902d081b7fdc9156f5e59e7afc8ca77a7c54e01a756bdc34cd8850a1e47fc45a8"]) [ 334.362688] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:45 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x8000000]}, 0x2c) 2018/05/15 10:15:45 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x101000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0xfffffffffffffffd, 0x8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r2, 0x0, 0x3, [0xd00000000000, 0x3f, 0xffffffffffffffff]}, 0xe) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:45 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x1f00, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:45 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x95b290a800000000}, 0x1c) 2018/05/15 10:15:45 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f00000000c0)=0x8, 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f00002b8000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00008b9000/0x2000)=nil) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x2}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={r1, 0x53}, &(0x7f0000000100)=0x8) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:46 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0xc5) 2018/05/15 10:15:46 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x10000000]}, 0x2c) 2018/05/15 10:15:46 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x20, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:15:46 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x700, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 334.549244] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:46 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KDENABIO(r1, 0x4b36) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000080)=0x100bf) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:46 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xd00]}, 0x2c) [ 335.181318] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xe000000}, 0x1c) 2018/05/15 10:15:46 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x700000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:46 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000300)="a6f0e1b845445ee3ee6a7436f74df7693e5d06eeb2e4303d573c750d3a1af0fc51074c0d70ded99ac3f02779074ceadecc5570d1238f4114af94a90e06b6e80406103a55d5db5f7acfe7f903d6360571adff4b9274899ace2271583edfe4bb3f5e3512686873c2366d629f39340dbfb576ef0e92a8dba0b403", &(0x7f0000000200)="80392fc37744fe39a32e69fa6e1f510985092a3c0c9b2c9e874eb4c136faba2d6433900d7fbddc7d32c04770f4d014e097058a73ec388c017e5db4b6950252bf1cd9cb65623ecbeb0c8660ca5c7ebdf992fbcc79c7837e5bbcdfd7b95e17406045bcdda771a8d8e25d6d52b399a279bc14115c40d5fed5c192dda918f7ffdbfa893e214603c53df0175151da2d072fb235252996109e46fd570e6dbb40014c40516eb290d59f0579f609e3898df5b5cae2a247adac4e981fb0d8c3f8d866ceeafdeb122b2c2b17dad480329e3eda3f8c86796db20dde1f0474d25e7c4c1504c9028fcb6c2aae01"}, 0x20) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0xb8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x0, 0x1, [0xf54e]}, &(0x7f00000000c0)=0xa) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000001c0)=0x40) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000100)={r2, 0x1, 0x0, 0x6, 0x1}, &(0x7f0000000140)=0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000380)}, 0x20) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180), 0x10) 2018/05/15 10:15:46 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r0 = getpgrp(0x0) ptrace$setregset(0x4205, r0, 0x203, &(0x7f0000000040)={&(0x7f0000000000)="0590b03202f4337bfe0ceda901cb181f52e8453ca82356467b904119b819221dd65f9569c9de78903c6288d076fcc4750a7b9676eb53b75c79092c32ff3ecab8", 0x40}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x1, 0x1, 0x2, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000001c0)=0x8001, &(0x7f0000000200)=0x4) 2018/05/15 10:15:46 executing program 2: r0 = socket(0x7, 0x5, 0x7) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r2, 0x1, 0x70bd2b, 0x25dfdbfd, {0x2}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_TYPE={0x8, 0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7e}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8841}, 0x4) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000200)=0x1) ioctl$int_out(r0, 0x5462, &(0x7f0000000280)) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000080)={0x5, 0x7ffd, 0x10000, 0x7}) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@dev, @multicast2}, &(0x7f0000000300)=0xc) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:46 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x2c) 2018/05/15 10:15:46 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000040)) exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) pipe(&(0x7f0000000180)) 2018/05/15 10:15:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, 0xffffffffffffffff, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:47 executing program 6: r0 = socket(0x40000000002, 0x3, 0x2) sendmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000200), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1000000000000000010000008b7f2f9c"], 0x10}, 0x0) [ 335.489453] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:47 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x2c) 2018/05/15 10:15:47 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x100, 0x6, 0x200, 0x9, 0xdfe8, 0x6, 0x1f8000, 0x8, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000100)={r1, 0x5}, 0x8) [ 335.589102] raw_sendmsg: syz-executor6 forgot to set AF_INET. Fix it! 2018/05/15 10:15:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x50000}, 0x1c) [ 335.689603] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 336.290190] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:48 executing program 6: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) getrusage(0x0, &(0x7f0000000240)) 2018/05/15 10:15:48 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x2, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x2c) 2018/05/15 10:15:48 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000140)={0x7, 0x9ab, &(0x7f0000000040)="6254e551e694b8900e6f6eadfe682ce44f64397d6c12c00f339b48c955bbcec4953a4514f1f304c32c0493950929f624db124e47bd4c742f45fc142520f109b18daae26da5c7a402", &(0x7f00000000c0)="ec7a638f31061caa3ecd00b35592dfd339a5fd229583a2f6df0b3d09f4567b1aa7c6284a3a8372f82fd0a67598c0bbabf720b80adfaa7eb6531ada22e0c417cda4c47e00d00250bb91608915f9abac6b4112b21c989666f5ead1de86abe6f98316a629f1dee9200c56ede17af36e039e80fc0dd5ef5f090943d1a0115b2599", 0x48, 0x7f}) mremap(&(0x7f00001f2000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f00006bf000/0x1000)=nil) clone(0x0, &(0x7f0000000200)="8790a0b4312555a5af3ff7fddd28579a5e6df1", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r1 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x401, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000380)="20e6f628283f1a702db13a046d16961f4c580513eaddbf") ioctl$KVM_NMI(r0, 0xae9a) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000180)={0xfff, 0xfffffffffffffffe, 0x1000000000c}) 2018/05/15 10:15:48 executing program 2: r0 = socket(0x4, 0x5, 0x0) ioctl$void(r0, 0x5451) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) setsockopt$inet_dccp_int(r0, 0x21, 0x0, &(0x7f00000000c0)=0x4, 0x4) setsockopt$ax25_buf(r0, 0x101, 0x19, &(0x7f0000000040)="445ab85a0d1cfb97680020e64c4e09f994d1b39896ff3461a90976a75456c643aaf97c4ed029cc1525052a58e0383481be3e99aaa01d2be92888a94e3b930b5174f1607d959708232e5f0e59b69ab6685019325fd6831d2637e1fdec35c0046b69aba8dfcd5384b7f535ebb829102ef74b57c347aad2897055424e", 0x7b) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) fchown(r0, r1, 0x0) 2018/05/15 10:15:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x600}, 0x1c) 2018/05/15 10:15:48 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000080)=0xfffffffffffffffb, &(0x7f0000000100)=0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140)=0x1, 0x4) exit(0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, 0xffffffffffffffff, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) [ 336.620894] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xb000000]}, 0x2c) 2018/05/15 10:15:48 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x6c, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x240}, 0x1c) 2018/05/15 10:15:48 executing program 2: r0 = socket(0xa, 0x5, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000200)={0x1, 0x7, [@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x19}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @random="b1524a9f0ad8", @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x10}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1f}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}]}) bind$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r1, 0x1, 0x18}, 0xc) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f00000001c0)={r0, 0xbe83115}) 2018/05/15 10:15:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x300]}, 0x2c) 2018/05/15 10:15:48 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x952, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 336.775194] audit: type=1326 audit(1526379348.255:35): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22470 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 [ 336.797847] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xfe80000000000000}, 0x1c) [ 336.905379] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 337.411276] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 337.423159] audit: type=1326 audit(1526379348.902:36): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22470 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 2018/05/15 10:15:49 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000100)=""/138) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:49 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x500000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x800000000000000}, 0x1c) 2018/05/15 10:15:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, 0xffffffffffffffff, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:49 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79e058439ed554fa07420e8496de320b6fba1f02acc7edbcd7a071fb35331ce39c5a") flistxattr(r1, &(0x7f00000000c0)=""/2, 0x0) 2018/05/15 10:15:49 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xffffffffffffffff, 0x8031, 0xffffffffffffffff, 0x20000000000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x2180) mremap(&(0x7f0000561000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f00001b8000/0x4000)=nil) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000040)={0x4, 0x2, 0x0, [{0x7, 0x9, 0x8, 0x100000000, 0x3, 0x8e8a, 0x5}, {0x8, 0xffffffffffff0000, 0x3, 0xffffffff00000000, 0x7, 0x80000000, 0x10000}]}) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) mremap(&(0x7f0000035000/0x4000)=nil, 0x4000, 0xb000, 0x3, &(0x7f0000ff3000/0xb000)=nil) 2018/05/15 10:15:49 executing program 2: r0 = socket(0xa, 0x800, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x3]}, 0x2c) 2018/05/15 10:15:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x2c) 2018/05/15 10:15:49 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f00000018c0)}}, {{0x0, 0x0, &(0x7f0000001a40), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="f8000000000000001501080002000000b63713ed925bea3d85eb2f3b4e16da5e8ee8e317a89eefbbd96426940800000000000000e8a354c4e3189dd3013c14f305c2f6b19823ece7b21a7aaf8888e59306fa78001999cdab17cd096ae49a88830c21e1ba982e9db11ac27697b173f752d04e7e1e15b670babb47e851c871c4777a5ff751a156fb7b6ef59c9dfa82588946189df807b9eda883fc578e8794de98926d9e554be88bb3cb08a2f56ad97f3b2adf90eda0f5ebef67c8cccae136a041765366144c012878c2ff8cfe19d2b98b65db1be0505dd1898e8773bc7dfd3a9653b35ac9f76aac8134ab7f3fde3d2035fbba3e2d81bf6200"], 0xf8}}], 0x2, 0x0) [ 337.650501] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:49 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x6c000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x6000000}, 0x1c) 2018/05/15 10:15:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x8, &(0x7f0000000680)=[{&(0x7f00000001c0)="e8cb32d00c51deba21ddad3568d5a840ef168b3ce6c04b05c4ac2d1721eb1f7235cf6dbb26811457344a8d7d0cad14ccbbe078c5978ea8d1ec8aa311148d52a38700daed1b0f992326abed8a32b6", 0x4e, 0x3ff}, {&(0x7f0000000280)="c2fda645777eb4169a914a42921a1069a63defa7ee65cf13e0e3a32ca95d1593b87cfe6c2443f27a56994a42c07cc363d5ce7ab41f5f5d894953ec990c47a7e90daa4e3acd14d4252b7d577704dc550a84a04b4c42b1d37d65fb096c4db8bb4bdf71be704a51a0b6a3c840087adeed7acc3632ee5b334846c5949559d024f7d7728313648c6bd258a1c73dadaa1200c4f518f1e95de4b7756fb69f5c002e3c1605ab9dd4a4e2db93ec549745a4fa509232d09f918145fb2abaf83aa0f442ff049d367e69877fbed82bea8f55287db5fbf6ae29e7cab8424e647bb679615cbc464ff54db92b13b380b0", 0xe9, 0xff}, {&(0x7f0000000380)="74b006fc339f975505585a91168dd3ad12deeea328a43d6cf0cd213a0b45198d329932d33d81f3b3e34055c5492dad4006cdc5268a3da5d22debd8a87726268c7752e1e5a038c3f5918b9b7098f2fa47b372a96109548766af73606996f67073762b6fe8a4429cacc3ea4be473dac53efc6dd59a557917bd116f8c575fb899e296ddb93408b74cc07ff1f844ebacacf37bed1ebf30d53a90cf3b4f68f471dbe3f4876cbd94af32bb3702dcc939524657e74d87c143e0b25ff5b8080e5278", 0xbe, 0x2}, {&(0x7f0000000440)="fadc9a5d4c7a1e6cdb1d8e49d15ba90cb2e58b95bbe926634af7437e5721cc10f7f9fd6c8a590d4b9bffdc8b617675961cf899de67c64a000e114fb1c4c3ac76", 0x40, 0xc6}, {&(0x7f0000000480)="d43d46e77028a37e6ff862e63ed08b2a9e686b8ecff08b230bfe4c7e5c07585d21cc901e51dfc74af429a065e8b2ad10ebca410575515b42323852728e0e649e3f06cff77801f6f2fa2d8a667c9165898ba88c1e6e5f603493c0f56208de46880880b96d1abba2ed9cbadd2df6067d66f5dc80022ea45c3a6a695afa603d19ea6df37015e00201fc27830de50bc1b175084e82", 0x93, 0x2}, {&(0x7f0000000540)="b91e8e7d6947960fdd7f85312f558092b9dbaf13ae06b91f44d7e6a334", 0x1d, 0x7c}, {&(0x7f0000000580)="05c0c99e574ddf4faa3fe1b17f629d54f5fc5955eac57cbfb6dc55f8ab202a15ba4a5a226ac792bbad38e24f9bc4a938031f4c60f5f57d4ad3594d9268507ec4c6783d2417fb4e98688f512bb47ab14d605ee3676f168701aae97a9ab35b20dec4", 0x61, 0x10001}, {&(0x7f0000000600)="0be2e429370db12fd6131cc33f4839aa7f8c428d1c1c621309cc321a37522e7c6ff6b2e89f9bd4bbdabf30c443a87ffe299292838fbfd7237c175e569ffc5c0388d8d12ce62f2a1952cd220dec074c8fe06f906ec06d4ccbc693a21d87d0f3cae678103b87e539e59011937fe867c2e8a234eb789f71a731", 0x78, 0x3}], 0x80000, &(0x7f0000000740)={[{@ssd_spread='ssd_spread', 0x2c}, {@subvolrootid={'subvolrootid', 0x3d, [0x34]}, 0x2c}, {@noautodefrag='noautodefrag', 0x2c}]}) r0 = creat(&(0x7f0000000780)='./file0\x00', 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@local, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000008c0)=0xe8) r1 = socket(0xa, 0x7, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000000c0)={r2, 0x7fff}, &(0x7f0000000100)=0x8) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:49 executing program 6: r0 = socket(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast1=0xe0000001, @dev={0xac, 0x14, 0x14, 0xd}}, 0xc) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000100)={@multicast1=0xe0000001, @dev={0xac, 0x14, 0x14, 0xd}, @rand_addr}, 0xc) 2018/05/15 10:15:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x2c) 2018/05/15 10:15:49 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x6, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 337.825005] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 338.432754] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:50 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_netdev_private(r0, 0x89f5, &(0x7f0000000040)="797daebc36065f4efe7941e7140bd2c786013d7292b8dd42040c163afff15d0886d219f01945f65b3dd9626beb8801f5d0b93b7b72b04172300e5ccf052f6f4446420fc56d215cc3d9496f04df50b4901bfccbd6f0a825b6bdcfc6") ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xff000000}, 0x1c) 2018/05/15 10:15:50 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) sendto$ipx(r0, &(0x7f0000000100)="ef96e806b6c472f6ac9382ed1642a2ef20be8d389af7a490352409e836e472e23b7d763cf62ab6cc64c9517901391b9c1933b94ebbc573d1c2b5dd5760d8dcc5463ff8898af8acb661e533e86583437b284717813a1ae29e7b96cfcc8409943be7ff602a4fa301697e91120bf9e12e7d2134448d654c0540be7cce9c45fc285369cc2fc0863048e59bd82728d319ac22f646", 0x92, 0x850, 0x0, 0x0) 2018/05/15 10:15:50 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x1f00000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:50 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x60, 0x800) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x31, r0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e21, 0x1, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x4f}}, [0xffffffff, 0x3, 0x1000000000000000, 0x6, 0x6, 0x9, 0x2, 0x9, 0x4, 0x334, 0x7fffffff, 0x7, 0x0, 0x0, 0x800]}, &(0x7f00000001c0)=0x100) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$addseals(r2, 0x409, 0x2) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:50 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x5]}, 0x2c) 2018/05/15 10:15:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:50 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:50 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x2c) [ 338.628109] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:50 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/05/15 10:15:50 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x1000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:50 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) r2 = gettid() kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000080)={r0, r0, 0x100}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) 2018/05/15 10:15:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x1802}, 0x1c) 2018/05/15 10:15:50 executing program 0: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfffffffff7fffffe, 0x50, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) umount2(&(0x7f0000000000)='./file0\x00', 0x8) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:50 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xf00]}, 0x2c) 2018/05/15 10:15:50 executing program 6: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000480)}}], 0x400000000000196, 0x0) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000100)=""/11, 0xb}, 0x22) [ 338.769276] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:50 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x20000) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x800, 0x1}, {0x7, 0x1}, {0x3, 0x4}, {0x80000000, 0x8000000000000}]}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x12, &(0x7f0000000000), 0x4) [ 339.424116] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xe448f90900000000}, 0x1c) 2018/05/15 10:15:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000003bc0)=[{&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000600), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r0, r0]}], 0x18}], 0x1, 0x0) 2018/05/15 10:15:51 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x20400) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x3, &(0x7f0000000180)=[{0x0, 0x7f, 0x4, 0x20}, {0xffffffff00000000, 0x5, 0xffffffff, 0x3}, {0x2, 0x5, 0x7ff, 0x50db}]}, 0x10) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f00000000c0)={0x7, 0x10000}) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000100)={0x1, 0xffff, 0x9, 0x2, 0x9}) setsockopt$sock_int(r1, 0x1, 0x3f, &(0x7f0000000000)=0xfff, 0x4) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000040)="e9340700000000000000272f520873bf3f85df05a6f3a22c4597645e0706de36726210d89d3b4b6727f9168a0202ec") socket$inet6(0xa, 0x80f, 0x7) 2018/05/15 10:15:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:51 executing program 6: 2018/05/15 10:15:51 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x4400000003) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:51 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x68, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:51 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xc000000]}, 0x2c) 2018/05/15 10:15:51 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x900]}, 0x2c) 2018/05/15 10:15:51 executing program 2: [ 339.921456] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:51 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x3, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xe00000000000000}, 0x1c) 2018/05/15 10:15:51 executing program 6: 2018/05/15 10:15:51 executing program 2: 2018/05/15 10:15:51 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x600]}, 0x2c) 2018/05/15 10:15:51 executing program 6: 2018/05/15 10:15:51 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x400000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 340.069303] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:51 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x7, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 2018/05/15 10:15:51 executing program 6: [ 340.719387] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x4002000000000000}, 0x1c) 2018/05/15 10:15:52 executing program 6: 2018/05/15 10:15:52 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x26100, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000080)=0x4) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0xa4aa, 0x30, 0xd94, 0xff}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e22, 0x3, @ipv4={[], [0xff, 0xff], @rand_addr=0x6}}}, 0x0, 0x401, 0xc1, 0x3, 0x4}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000240)={r2, 0x20, 0x73, "7fd431651509d29b12cb791793ca3a744f85a9615f7134030e34dd2c38ef3643cd9cced6a9fc3aafb33f35bb45a6385eabf23a8188fd40b35500efeebd4702c408b7cc9b7689e68f921774199d9c71512d4b2734cd704af8360833531a4bb0b824cc1067889827e76821299227248733dc5b89"}, 0x7b) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) sendto$inet6(r0, &(0x7f0000000380)="c0ff5932dbd9a0e34df30a40db4aec7fb6f874a2b1b9d851454551d79446233148bcabac64a4d598fd78249691fde034b4920064088abe8ca69deea12b42d786c518f6f06ccfcea369ee90795eb8581a80e09df561a703730f4b6558eb893e28d165ff5916b1a107b4f0bc1a40fbe723b183115f9269b7dd54449458f4d9ff7a3c2dc80bbf42e4976042254da488eeae59c0c9a443e59b660fb6b3cb49bab1a2d790b7", 0xa3, 0x0, 0x0, 0x0) 2018/05/15 10:15:52 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0), 0x0, 0x0) 2018/05/15 10:15:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:52 executing program 2: 2018/05/15 10:15:52 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a00000000000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:52 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x1800]}, 0x2c) 2018/05/15 10:15:52 executing program 6: 2018/05/15 10:15:52 executing program 2: [ 340.973490] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:52 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x2c) 2018/05/15 10:15:52 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x4c000000, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xf5ffffff}, 0x1c) 2018/05/15 10:15:52 executing program 2: 2018/05/15 10:15:52 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x2c) 2018/05/15 10:15:52 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clone(0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100000000, 0x400400) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000040)={0x7, 0x2, [{0x6, 0x0, 0x200}, {0x7, 0x0, 0x80}, {0x5, 0x0, 0x7}, {0x7}, {0x6, 0x0, 0xff}, {0xf07, 0x0, 0x9}, {0x0, 0x0, 0x1}]}) [ 341.117755] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 341.765840] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:53 executing program 6: 2018/05/15 10:15:53 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x4c00, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:53 executing program 2: 2018/05/15 10:15:53 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xd00000000000000]}, 0x2c) 2018/05/15 10:15:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xb00}, 0x1c) 2018/05/15 10:15:53 executing program 0: 2018/05/15 10:15:53 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x800, 0x4) finit_module(r0, &(0x7f0000000040)='oom_adj\x00', 0x1) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x300, 0x70bd26, 0x25dfdbfd, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x20000050) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000080)="f23229ed54db1cf7e0d188e976a29cd6") 2018/05/15 10:15:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, 0xffffffffffffffff, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:53 executing program 2: 2018/05/15 10:15:53 executing program 6: 2018/05/15 10:15:53 executing program 0: [ 342.053719] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:53 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x1100]}, 0x2c) 2018/05/15 10:15:53 executing program 6: 2018/05/15 10:15:53 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x6c, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x4}, 0x1c) 2018/05/15 10:15:53 executing program 0: [ 342.221943] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 342.871908] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:54 executing program 2: 2018/05/15 10:15:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, 0xffffffffffffffff, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:54 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x10]}, 0x2c) 2018/05/15 10:15:54 executing program 6: 2018/05/15 10:15:54 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x3000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:54 executing program 0: 2018/05/15 10:15:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x300000000000000}, 0x1c) 2018/05/15 10:15:54 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) fanotify_mark(r0, 0x2, 0x8, r0, &(0x7f0000000040)='./file0\x00') ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x8}) 2018/05/15 10:15:54 executing program 0: 2018/05/15 10:15:54 executing program 6: 2018/05/15 10:15:54 executing program 2: 2018/05/15 10:15:54 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x2c) [ 343.087500] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:54 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x2000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:54 executing program 2: 2018/05/15 10:15:54 executing program 6: [ 343.877294] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:55 executing program 0: 2018/05/15 10:15:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x8000000}, 0x1c) 2018/05/15 10:15:55 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x9000000]}, 0x2c) 2018/05/15 10:15:55 executing program 6: 2018/05/15 10:15:55 executing program 2: 2018/05/15 10:15:55 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x5000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:55 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x5, &(0x7f0000000100)=0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, 0xffffffffffffffff, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:55 executing program 6: 2018/05/15 10:15:55 executing program 0: 2018/05/15 10:15:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040)=0x4, 0x4) sendmmsg(r0, &(0x7f0000001440)=[{{&(0x7f0000000080)=@rc={0x1f}, 0x80, &(0x7f0000001300), 0x0, &(0x7f0000001340)}}], 0x1, 0x0) 2018/05/15 10:15:55 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x2000000]}, 0x2c) [ 344.192541] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:55 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x6c00, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:55 executing program 6: [ 344.988091] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:56 executing program 0: 2018/05/15 10:15:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xaaaa}, 0x1c) 2018/05/15 10:15:56 executing program 2: 2018/05/15 10:15:56 executing program 6: 2018/05/15 10:15:56 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xa000000]}, 0x2c) 2018/05/15 10:15:56 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x4c, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:56 executing program 3: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f00000003c0)='oom_adj\x00') exit(0x4) r2 = add_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000180)="3c96f04a62846de3ccaf0964b042307c45e314b7b890a660a0c1b417d46e72215aee94bcaaced741902cfee2251a563659dfded797c91a4d2830761739bb70b75455bfbe8c6ebd8a5374cb05e80ca39f996191e52cfeeea752e067b9d3339bb758da0c9e0858920fbaa1a5169f072acf06667fe9614fab10e4636ddb54136a5cca9254802dc8a42e541bd4e7340e1fa7e7", 0x91, 0xfffffffffffffffe) keyctl$revoke(0x3, r2) timer_create(0x3, &(0x7f0000000040)={0x0, 0x6, 0x1}, &(0x7f0000000080)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f00000004c0)={{0x27, 0x2, 0x1, 0x8, "d44f4627df8b994b49d5ab89e3e4908f2fe9641dc9ce7bab179f8ecf796c598ed11cea6ee4866886ebf384f2"}, 0x0, 0x0, 0x9, r0, 0x100000000, 0x3, "0aa48e9b2110527ef9a2e8b7087f4d9024708048b660637d73b5fc3e9497b9cdf182c342a1d32c53c64fb39fc94e023db3e643d262fb9ab52c7e24b1d7f2127b", &(0x7f0000000480)='asymmetric\x00', 0xb, [], [0x80000001, 0x5a, 0x1, 0x1f]}) timer_getoverrun(r3) getpeername$llc(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000380)=0x10) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r2) ioctl$sock_ipx_SIOCIPXCFGDATA(r1, 0x89e2, &(0x7f0000000440)) ioperm(0x10080001000, 0x9, 0x5d1) 2018/05/15 10:15:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:56 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x4000000]}, 0x2c) 2018/05/15 10:15:56 executing program 6: 2018/05/15 10:15:56 executing program 0: 2018/05/15 10:15:56 executing program 2: [ 345.277966] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:56 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x48, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:56 executing program 0: [ 346.055895] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:57 executing program 2: 2018/05/15 10:15:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x1802000000000000}, 0x1c) 2018/05/15 10:15:57 executing program 6: 2018/05/15 10:15:57 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x6000000]}, 0x2c) 2018/05/15 10:15:57 executing program 0: 2018/05/15 10:15:57 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x6800000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:57 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') r1 = getpid() ptrace$setregs(0xf, r1, 0x2, &(0x7f0000000040)="5e897528986a40f3735b53601896d0de80019dc6964922dd5dfe94a0ddb7b612c4b04a703db86569bdaa07637aa527c1dc9f4b58505e3138495ffe96befe7d832e17fad5c49c09924d2d0470c38873555cb12fb9a0c7e440") exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:57 executing program 0: 2018/05/15 10:15:57 executing program 6: 2018/05/15 10:15:57 executing program 2: 2018/05/15 10:15:57 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xd000000]}, 0x2c) [ 346.440528] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:57 executing program 6: 2018/05/15 10:15:58 executing program 0: 2018/05/15 10:15:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xf401000000000000}, 0x1c) 2018/05/15 10:15:58 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x74000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 346.579434] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 347.237886] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:58 executing program 0: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="ffff9d07e7f20ee9c1abaaaa86dd60ea2b200014000008000000000000000000000002000039fc09462be14c02253a90e34fe7c9102e8930b54d65aa09cfcee1a6271f059e5faf777a900cedc873c6d5b1fb", @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], &(0x7f00000000c0)) 2018/05/15 10:15:58 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') exit(0x0) fsetxattr(r0, &(0x7f00000002c0)=@known='user.syz\x00', &(0x7f0000000300)='comm\x00', 0x5, 0x0) 2018/05/15 10:15:58 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xa00]}, 0x2c) 2018/05/15 10:15:58 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) fcntl$setstatus(r0, 0x4, 0x4000) pwritev(r0, &(0x7f0000000300)=[{&(0x7f0000000000)='F', 0x1}], 0x1, 0x0) 2018/05/15 10:15:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xfc000000}, 0x1c) 2018/05/15 10:15:58 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x400000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:58 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x3) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:15:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:15:59 executing program 0: clone(0x0, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) chroot(&(0x7f0000000380)='./file0\x00') 2018/05/15 10:15:59 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xa]}, 0x2c) [ 347.541489] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:15:59 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x600000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:59 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=@deltclass={0x24, 0x29, 0x1, 0x0, 0x0, {0x0, r1, {0x0, 0xfffe}, {0x0, 0xa}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:15:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x18020000}, 0x1c) 2018/05/15 10:15:59 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x18]}, 0x2c) 2018/05/15 10:15:59 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x4c00, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:15:59 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000200)) [ 347.695741] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 347.784260] audit: type=1326 audit(1526379359.264:37): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22911 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 [ 348.333213] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:00 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xb]}, 0x2c) 2018/05/15 10:16:00 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x91ffffff}, 0x1c) 2018/05/15 10:16:00 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x7000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, 0xffffffffffffffff, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:00 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x8, 0x10120) exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0xe000000]}, 0x2c) 2018/05/15 10:16:00 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') exit(0x0) fsetxattr(r0, &(0x7f00000002c0)=@known='user.syz\x00', &(0x7f0000000300)='comm\x00', 0x5, 0x0) [ 348.559082] audit: type=1326 audit(1526379360.038:38): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22911 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 2018/05/15 10:16:00 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x68000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:00 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xe]}, 0x2c) [ 348.644138] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="b7a92269c6245b3d2fa55231a9f9faf5ab88780b1e881103a69aabb90ebd41e75f3621012c4dc0590229bc3cdde2d9beb996cfb1bcd0b620efa29794150b07d4bce63157976515b935235a54da62b8715de3dccd94f29e4abcb5f68d11619f915c3d54d0b50413012dd304a6ca4736646a74afb6cfd5bbb9169209991e51dbe8a3daf929e8200fe656e4a984d9ff011d71a9e96a90b28c0f88a7d27b9e3c4aa3222bb914b73f68e0fc21f2d8390ea114563ac3ac6f6559674a9b3e2fd25e9ca8053265553a11bc4615384a21fa1298293041154072e627b0030143821ae6083d5e78bb5269c5", 0xe6, 0x1ff}, {&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:16:00 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:00 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x2c) 2018/05/15 10:16:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x700}, 0x1c) 2018/05/15 10:16:00 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x6c000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="b7a92269c6245b3d2fa55231a9f9faf5ab88780b1e881103a69aabb90ebd41e75f3621012c4dc0590229bc3cdde2d9beb996cfb1bcd0b620efa29794150b07d4bce63157976515b935235a54da62b8715de3dccd94f29e4abcb5f68d11619f915c3d54d0b50413012dd304a6ca4736646a74afb6cfd5bbb9169209991e51dbe8a3daf929e8200fe656e4a984d9ff011d71a9e96a90b28c0f88a7d27b9e3c4aa3222bb914b73f68e0fc21f2d8390ea114563ac3ac6f6559674a9b3e2fd25e9ca8053265553a11bc4615384a21fa1298293041154072e627b0030143821ae6083d5e78bb5269c5", 0xe6, 0x1ff}, {&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:16:00 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:00 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xe000000]}, 0x2c) [ 348.786370] MINIX-fs: unable to read superblock [ 348.815723] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:00 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x52090000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 348.881228] MINIX-fs: unable to read superblock [ 349.429869] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:01 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) accept4$alg(r0, 0x0, 0x0, 0x800) 2018/05/15 10:16:01 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:01 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x68, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, 0xffffffffffffffff, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x15554}, 0x1c) 2018/05/15 10:16:01 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xc00]}, 0x2c) 2018/05/15 10:16:01 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') exit(0x0) fsetxattr(r0, &(0x7f00000002c0)=@known='user.syz\x00', &(0x7f0000000300)='comm\x00', 0x5, 0x0) 2018/05/15 10:16:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="b7a92269c6245b3d2fa55231a9f9faf5ab88780b1e881103a69aabb90ebd41e75f3621012c4dc0590229bc3cdde2d9beb996cfb1bcd0b620efa29794150b07d4bce63157976515b935235a54da62b8715de3dccd94f29e4abcb5f68d11619f915c3d54d0b50413012dd304a6ca4736646a74afb6cfd5bbb9169209991e51dbe8a3daf929e8200fe656e4a984d9ff011d71a9e96a90b28c0f88a7d27b9e3c4aa3222bb914b73f68e0fc21f2d8390ea114563ac3ac6f6559674a9b3e2fd25e9ca8053265553a11bc4615384a21fa1298293041154072e627b0030143821ae6083d5e78bb5269c5", 0xe6, 0x1ff}, {&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={r0, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) 2018/05/15 10:16:01 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xf]}, 0x2c) 2018/05/15 10:16:01 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:01 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0xa00000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 349.621687] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 349.642782] MINIX-fs: unable to read superblock 2018/05/15 10:16:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xb}, 0x1c) 2018/05/15 10:16:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="b7a92269c6245b3d2fa55231a9f9faf5ab88780b1e881103a69aabb90ebd41e75f3621012c4dc0590229bc3cdde2d9beb996cfb1bcd0b620efa29794150b07d4bce63157976515b935235a54da62b8715de3dccd94f29e4abcb5f68d11619f915c3d54d0b50413012dd304a6ca4736646a74afb6cfd5bbb9169209991e51dbe8a3daf929e8200fe656e4a984d9ff011d71a9e96a90b28c0f88a7d27b9e3c4aa3222bb914b73f68e0fc21f2d8390ea114563ac3ac6f6559674a9b3e2fd25e9ca8053265553a11bc4615384a21fa1298293041154072e627b0030143821ae6083d5e78bb5269c5", 0xe6, 0x1ff}, {&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000100), &(0x7f0000000380)}, 0x20) 2018/05/15 10:16:01 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xe00]}, 0x2c) 2018/05/15 10:16:01 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 349.752160] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 349.783686] MINIX-fs: unable to read superblock [ 350.416317] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:02 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x100000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:02 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x500]}, 0x2c) 2018/05/15 10:16:02 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="a6", &(0x7f0000000500)}, 0x20) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="b7a92269c6245b3d2fa55231a9f9faf5ab88780b1e881103a69aabb90ebd41e75f3621012c4dc0590229bc3cdde2d9beb996cfb1bcd0b620efa29794150b07d4bce63157976515b935235a54da62b8715de3dccd94f29e4abcb5f68d11619f915c3d54d0b50413012dd304a6ca4736646a74afb6cfd5bbb9169209991e51dbe8a3daf929e8200fe656e4a984d9ff011d71a9e96a90b28c0f88a7d27b9e3c4aa3222bb914b73f68e0fc21f2d8390ea114563ac3ac6f6559674a9b3e2fd25e9ca8053265553a11bc4615384a21fa1298293041154072e627b0030143821ae6083d5e78bb5269c5", 0xe6, 0x1ff}, {&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) 2018/05/15 10:16:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x5000000000000}, 0x1c) 2018/05/15 10:16:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, 0xffffffffffffffff, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:02 executing program 3: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000000)="005f008d6b34c0f9850027cd5478af00") exit(0x8) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000080)='cpuset\x00', &(0x7f00000000c0)='\x00', &(0x7f0000000140)='\x00', &(0x7f00000001c0)="5c65746831df00", &(0x7f0000000200)='\x00'], &(0x7f0000000340)) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000040)=""/24}, {&(0x7f0000000080), 0xfffffffffffffe5a}], 0x30f, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000280)="005f008d6b34c0f9850027cd5478af00", &(0x7f00000002c0)='keyring@eth1\\ppp0vboxnet0}\\@GPLtrustedppp1ppp1keyringsystem@\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000580)=[&(0x7f00000003c0)="005f008d6b34c0f9850027cd5478af00", &(0x7f0000000400)="005f008d6b34c0f9850027cd5478af00", &(0x7f0000000440)="5c65746831df00", &(0x7f0000000480)='-em0,ppp0\x00', &(0x7f00000004c0)='eth1.keyring#\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)="e4766d6e65743100"]) 2018/05/15 10:16:02 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') exit(0x0) fsetxattr(r0, &(0x7f00000002c0)=@known='user.syz\x00', &(0x7f0000000300)='comm\x00', 0x5, 0x0) 2018/05/15 10:16:02 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 350.616537] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 350.629354] MINIX-fs: unable to read superblock 2018/05/15 10:16:02 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x2c) 2018/05/15 10:16:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="b7a92269c6245b3d2fa55231a9f9faf5ab88780b1e881103a69aabb90ebd41e75f3621012c4dc0590229bc3cdde2d9beb996cfb1bcd0b620efa29794150b07d4bce63157976515b935235a54da62b8715de3dccd94f29e4abcb5f68d11619f915c3d54d0b50413012dd304a6ca4736646a74afb6cfd5bbb9169209991e51dbe8a3daf929e8200fe656e4a984d9ff011d71a9e96a90b28c0f88a7d27b9e3c4aa3222bb914b73f68e0fc21f2d8390ea114563ac3ac6f6559674a9b3e2fd25e9ca8053265553a11bc4615384a21fa1298293041154072e627b0030143821ae6083d5e78bb5269c5", 0xe6, 0x1ff}, {&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="8c2e72325485f49b6bc8cbedc030883575f771346c1511ea9edce129951aafe58e766f702e9d6b95dabded3d9158f54e8f7ec5299991bf6ffa01b0f36fa22cbaf54a0c03e534d53bab4434b2bebe075642e6833d73abbe8205bd5a2a57f31317fdb12ec4197263c8261bbc76070b912587ee17eeae2279fa5de9fc77075745ce4c0d59ca7b4dab8c5c672883a7e8f4bf40adc26888ebdb1aef6ab1d41b68c7061f3a9b7a051240033cb039a2cd73a2a3310b8b49ff312c03cf79ff2399d58b8005955fa7bcd4e7501b2800f30a9df53d7dc90aeafac49e724bc0d33c90b23bfec9fd611f4ab7673f749a1653df248cd2a0e507bbbc1c0cba9d048deac7f8bc", 0xff, 0x8}], 0x400, 0x0) 2018/05/15 10:16:02 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x20000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x9f948e4}, 0x1c) 2018/05/15 10:16:02 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 350.734265] MINIX-fs: unable to read superblock [ 350.736375] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:02 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="b7a92269c6245b3d2fa55231a9f9faf5ab88780b1e881103a69aabb90ebd41e75f3621012c4dc0590229bc3cdde2d9beb996cfb1bcd0b620efa29794150b07d4bce63157976515b935235a54da62b8715de3dccd94f29e4abcb5f68d11619f915c3d54d0b50413012dd304a6ca4736646a74afb6cfd5bbb9169209991e51dbe8a3daf929e8200fe656e4a984d9ff011d71a9e96a90b28c0f88a7d27b9e3c4aa3222bb914b73f68e0fc21f2d8390ea114563ac3ac6f6559674a9b3e2fd25e9ca8053265553a11bc4615384a21fa1298293041154072e627b0030143821ae6083d5e78bb5269c5", 0xe6, 0x1ff}, {&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) 2018/05/15 10:16:02 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x6]}, 0x2c) [ 350.835922] MINIX-fs: unable to read superblock [ 351.408488] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:03 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x7400, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x700000000000000}, 0x1c) 2018/05/15 10:16:03 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:03 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x2c) 2018/05/15 10:16:03 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="b7a92269c6245b3d2fa55231a9f9faf5ab88780b1e881103a69aabb90ebd41e75f3621012c4dc0590229bc3cdde2d9beb996cfb1bcd0b620efa29794150b07d4bce63157976515b935235a54da62b8715de3dccd94f29e4abcb5f68d11619f915c3d54d0b50413012dd304a6ca4736646a74afb6cfd5bbb9169209991e51dbe8a3daf929e8200fe656e4a984d9ff011d71a9e96a90b28c0f88a7d27b9e3c4aa3222bb914b73f68e0fc21f2d8390ea114563ac3ac6f6559674a9b3e2fd25e9ca8053265553a11bc4615384a21fa1298293041154072e627b0030143821ae6083d5e78bb5269c5", 0xe6, 0x1ff}, {&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) 2018/05/15 10:16:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:03 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') getsockopt$inet_dccp_int(r0, 0x21, 0x11, &(0x7f0000000180), &(0x7f0000000080)=0xffffffffffffffcf) exit(0x40000001) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x2710}, {0x0, 0x7530}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x4e21, 0x40, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x6}, @in6={0xa, 0x4e24, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x7fff}, @in6={0xa, 0x4e21, 0x1, @loopback={0x0, 0x1}, 0x2e2e}, @in={0x2, 0x4e20, @multicast1=0xe0000001}, @in6={0xa, 0x4e24, 0x20, @mcast1={0xff, 0x1, [], 0x1}, 0x2}], 0x80) 2018/05/15 10:16:03 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') fsetxattr(r0, &(0x7f00000002c0)=@known='user.syz\x00', &(0x7f0000000300)='comm\x00', 0x5, 0x0) 2018/05/15 10:16:03 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x2c) [ 351.608201] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 351.627297] MINIX-fs: unable to read superblock 2018/05/15 10:16:03 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') fsetxattr(r0, &(0x7f00000002c0)=@known='user.syz\x00', &(0x7f0000000300)='comm\x00', 0x5, 0x0) 2018/05/15 10:16:03 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:03 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0xa00, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:03 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="8c2e72325485f49b6bc8cbedc030883575f771346c1511ea9edce129951aafe58e766f702e9d6b95dabded3d9158f54e8f7ec5299991bf6ffa01b0f36fa22cbaf54a0c03e534d53bab4434b2bebe075642e6833d73abbe8205bd5a2a57f31317fdb12ec4197263c8261bbc76070b912587ee17eeae2279fa5de9fc77075745ce4c0d59ca7b4dab8c5c672883a7e8f4bf40adc26888ebdb1aef6ab1d41b68c7061f3a9b7a051240033cb039a2cd73a2a3310b8b49ff312c03cf79ff2399d58b8005955fa7bcd4e7501b2800f30a9df53d7dc90aeafac49e724bc0d33c90b23bfec9fd611f4ab7673f749a1653df248cd2a0e507bbbc1c0cba9d048deac7f8bc", 0xff, 0x8}], 0x400, 0x0) 2018/05/15 10:16:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x5000000000000000}, 0x1c) 2018/05/15 10:16:03 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:03 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xd]}, 0x2c) 2018/05/15 10:16:03 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') fsetxattr(r0, &(0x7f00000002c0)=@known='user.syz\x00', &(0x7f0000000300)='comm\x00', 0x5, 0x0) [ 351.798430] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 351.807123] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 352.424230] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:04 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x6800, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:04 executing program 0: socket(0xa, 0x1, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:04 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x9]}, 0x2c) 2018/05/15 10:16:04 executing program 6: exit(0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000002c0)=@known='user.syz\x00', &(0x7f0000000300)='comm\x00', 0x5, 0x0) 2018/05/15 10:16:04 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) 2018/05/15 10:16:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x400000000000000}, 0x1c) 2018/05/15 10:16:04 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)=0x641f6d2b) exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0xfffffffffffffece}], 0x1, 0x0) 2018/05/15 10:16:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:04 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x2c) 2018/05/15 10:16:04 executing program 0: socket(0xa, 0x1, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:04 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) 2018/05/15 10:16:04 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x7, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 352.745751] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 352.765541] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 2018/05/15 10:16:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x48000000}, 0x1c) 2018/05/15 10:16:04 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x2c) 2018/05/15 10:16:04 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:04 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x952, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 352.858716] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 352.880951] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 353.548569] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:05 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0), 0x0, 0x1ff}, {&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) 2018/05/15 10:16:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x4800}, 0x1c) 2018/05/15 10:16:05 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x11000000]}, 0x2c) 2018/05/15 10:16:05 executing program 0: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:05 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x10, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:05 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0xca}], 0x1, 0x0) 2018/05/15 10:16:05 executing program 6: exit(0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000002c0)=@known='user.syz\x00', &(0x7f0000000300)='comm\x00', 0x5, 0x0) 2018/05/15 10:16:05 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x2c) [ 353.737860] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 353.754700] MINIX-fs: unable to read superblock 2018/05/15 10:16:05 executing program 0: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:05 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)}, {&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) 2018/05/15 10:16:05 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x4800, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:05 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x7]}, 0x2c) 2018/05/15 10:16:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x3}, 0x1c) 2018/05/15 10:16:05 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0xc]}, 0x2c) 2018/05/15 10:16:05 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x4800000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 353.877818] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 353.880214] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 2018/05/15 10:16:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xffffff91}, 0x1c) 2018/05/15 10:16:05 executing program 0: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 353.968103] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 354.532328] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:06 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)}, {&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) 2018/05/15 10:16:06 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x11]}, 0x2c) 2018/05/15 10:16:06 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x1f00000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xe803}, 0x1c) 2018/05/15 10:16:06 executing program 0: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:06 executing program 3: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/netstat\x00') exit(0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) mknod(&(0x7f0000000200)='./file0\x00', 0x4, 0xfffffffe) preadv(r1, &(0x7f00000000c0), 0x1000000000000097, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r1, 0x4, 0x3}, 0x10) sendmsg$alg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="8217751260141e7bf2bf6d2778902781153a26d8ad154670fb722c9d5338b91af9df3449fbef4a6f8a7e1b9ce734ce70960f5d48ade648de0468b70375c05c36d6a66422", 0x44}], 0x1, &(0x7f0000000100), 0x0, 0x80}, 0x4000) 2018/05/15 10:16:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, 0xffffffffffffffff, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:06 executing program 6: exit(0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000002c0)=@known='user.syz\x00', &(0x7f0000000300)='comm\x00', 0x5, 0x0) 2018/05/15 10:16:06 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x2c) 2018/05/15 10:16:06 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x7a00000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xb00000000000000}, 0x1c) [ 354.828724] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 354.848976] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. [ 354.940084] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 355.644492] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:07 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, 0x2c) 2018/05/15 10:16:07 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)}, {&(0x7f00000001c0)="81", 0x1, 0x40}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) 2018/05/15 10:16:07 executing program 0: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:07 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x500, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xfec00000}, 0x1c) 2018/05/15 10:16:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, 0xffffffffffffffff, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:07 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000380)=""/4096) exit(0xffffffffffffad68) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:07 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') exit(0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000002c0)=@known='user.syz\x00', &(0x7f0000000300)='comm\x00', 0x5, 0x0) 2018/05/15 10:16:07 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x2000000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:07 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) [ 355.874199] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 355.889754] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 2018/05/15 10:16:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xf4010000}, 0x1c) 2018/05/15 10:16:07 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f00000000c0), 0x0, 0x1ff}, {&(0x7f0000000200)="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", 0xff, 0x8}], 0x400, 0x0) 2018/05/15 10:16:07 executing program 0: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:07 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x2c) 2018/05/15 10:16:07 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x4c00000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:07 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000000c0), 0x0, 0x1ff}], 0x400, 0x0) [ 356.008273] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 356.030748] MINIX-fs: unable to read superblock [ 356.112465] MINIX-fs: unable to read superblock [ 356.670436] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:08 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0x2c) 2018/05/15 10:16:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x218}, 0x1c) 2018/05/15 10:16:08 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x7a000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:08 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000040)={0x3, 0x400}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000140)={0x7, 0xc0, 0x10001, {}, {0x77359400}, {0x2, 0x6, 0xfffffffffffffffc, 0x2}, 0x1, @canfd={{0x0, 0x803, 0x0, 0xf59}, 0x27, 0x3, 0x0, 0x0, "2a610a160326533b6365df15b003ed03b5e76ed75923d26bc4500bc7adc9aa6267b53027938ff1835292e4d6d67ac920e47a2174f281dea24454ef1ae459025e"}}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x20008840) 2018/05/15 10:16:08 executing program 2: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f00000000c0), 0x0, 0x1ff}], 0x0, 0x0) 2018/05/15 10:16:08 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:08 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') exit(0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000002c0)=@known='user.syz\x00', &(0x7f0000000300)='comm\x00', 0x5, 0x0) 2018/05/15 10:16:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, 0xffffffffffffffff, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:08 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0xfdfdffff, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:08 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x2c) [ 356.881054] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 356.909165] MINIX-fs: unable to read superblock 2018/05/15 10:16:08 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:08 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x3e8}, 0x1c) 2018/05/15 10:16:08 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x2000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:08 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x2c) 2018/05/15 10:16:08 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:08 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 357.059873] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 357.679193] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:09 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x300, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:09 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x2c) 2018/05/15 10:16:09 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x5000}, 0x1c) 2018/05/15 10:16:09 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:09 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x7fffffffe) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000080)={0x80000001, 0x2, 0x7fff, 0x5, 0x100000000}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) mq_notify(r0, &(0x7f0000000100)={0x0, 0x22, 0x1, @tid=r1}) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) 2018/05/15 10:16:09 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') exit(0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000002c0)=@known='user.syz\x00', &(0x7f0000000300)='comm\x00', 0x5, 0x0) 2018/05/15 10:16:09 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:09 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:09 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x2c) [ 357.890776] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:09 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x700000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x500000000000000}, 0x1c) 2018/05/15 10:16:09 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:09 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x2c) 2018/05/15 10:16:09 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:09 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:09 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x2c) 2018/05/15 10:16:09 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 358.046905] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:09 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:09 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 358.691726] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xa00000000000000}, 0x1c) 2018/05/15 10:16:10 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:10 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x2c) 2018/05/15 10:16:10 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x200000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:10 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:10 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000140)=""/131, &(0x7f0000000200)=0x83) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000080)={0x0, 0x40000000001}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x4, 0x100000001, 0x1e59, 0x0, 0x80000000}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000001c0)={r2, 0xfffffffffffffff9}, &(0x7f0000000200)=0x8) 2018/05/15 10:16:10 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:10 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 358.991518] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 359.784227] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:11 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:11 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x2c) 2018/05/15 10:16:11 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x40000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:11 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xa00}, 0x1c) 2018/05/15 10:16:11 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:11 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f0000000640), 0x104b, 0x20000000000) set_tid_address(&(0x7f0000000040)) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000100)={r1, 0x4}, 0x8) renameat2(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x2) 2018/05/15 10:16:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:11 executing program 2: socket(0xa, 0x1, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:11 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x74, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:11 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 359.980810] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:11 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:11 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, 0x2c) 2018/05/15 10:16:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xfec0000000000000}, 0x1c) 2018/05/15 10:16:11 executing program 2: socket(0xa, 0x1, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:11 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x5209000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:11 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:11 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x2c) 2018/05/15 10:16:11 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf6") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 360.128318] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.776306] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:12 executing program 2: socket(0xa, 0x1, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:12 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf6") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:12 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x200000000000000}, 0x1c) 2018/05/15 10:16:12 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x48000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:12 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2c) 2018/05/15 10:16:12 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x5, 0x30, 0xffff, 0x8}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r1, 0x7}, 0x8) exit(0x0) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000180)={0x1000000000000000, 0x4, 0x1000, 0xa, 0x1b}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xe0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[{0x0, 0x7fff}, {0x2}, {0x4, 0x5}, {0xc, 0x9}, {0x0, 0x4}, {0x2, 0x8000}, {0x2, 0x1}], 0x7) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, 0xffffffffffffffff]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:12 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x2c) 2018/05/15 10:16:12 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:12 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 361.079379] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:12 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x4c000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:12 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:12 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x2c) 2018/05/15 10:16:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xffffffff00000000}, 0x1c) 2018/05/15 10:16:12 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:12 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:12 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 361.229936] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 361.880415] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:13 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0xf8fe) fstat(r0, &(0x7f0000000040)) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:13 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x2c) 2018/05/15 10:16:13 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x600000000000000}, 0x1c) 2018/05/15 10:16:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, 0xffffffffffffffff]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:13 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:13 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:13 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x1f00, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 362.060585] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:13 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:13 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:13 executing program 2: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:13 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x2c) 2018/05/15 10:16:13 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x7a, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xfe800000}, 0x1c) [ 362.218429] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 362.878933] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:14 executing program 6: socket(0xa, 0x1, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:14 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:14 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0x2c) 2018/05/15 10:16:14 executing program 2: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:14 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x6, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x91ffffff00000000}, 0x1c) 2018/05/15 10:16:14 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000180)="607474722f8401040000656174b02de4823ebc7a6c42d3cfa2d69ce4a59f23a11d402c185ede9baa987908cb001abac5e865e38e4586b441818efa7c7a0714d674343bf87c30687c3d09f55bba590aa0bd78adfbbef5574eae20234c850ee2016dca5f4a1bb6552214ed923c47e77b1237403e098a378a71fdd68c586b7b97f72df0edd0ffc6897fc2638fa22af712b2ce8c55048858fea492e355e79cf10b761b114e0eada543d7e7688606aa80f7d7") getpeername$unix(r1, &(0x7f0000000100)=@abs, &(0x7f0000000000)=0x6e) exit(0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, 0xffffffffffffffff]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:14 executing program 6: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 363.079652] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:14 executing program 2: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:14 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x2c) 2018/05/15 10:16:14 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:14 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x6c00000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xaaaa0000}, 0x1c) 2018/05/15 10:16:14 executing program 6: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:14 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x2c) [ 363.247424] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 363.869443] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xc0fe}, 0x1c) 2018/05/15 10:16:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @cred={0x20, 0x1, 0x2}], 0xf0, 0x24000000}, 0x80) 2018/05/15 10:16:15 executing program 2: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:15 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x4000000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:15 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0x2c) 2018/05/15 10:16:15 executing program 6: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:15 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000080), 0x4) 2018/05/15 10:16:15 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x4000000004002) mmap(&(0x7f0000359000/0x3000)=nil, 0x3000, 0xfffffffffffffffe, 0x8011, r0, 0x0) [ 364.152010] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:15 executing program 6: r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:15 executing program 2: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:15 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0xd}}, 0xc) r1 = socket(0x80000000000a, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0xd}, @multicast2=0xe0000002}, 0xc) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x0, 0x0) dup3(r3, r2, 0x0) 2018/05/15 10:16:15 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x2c) 2018/05/15 10:16:15 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x600, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xb000000}, 0x1c) [ 364.295528] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 364.951659] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:16 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x2c) 2018/05/15 10:16:16 executing program 6: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:16 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c05, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:16 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0xfffffdfd, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:16 executing program 2: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x6}, 0x1c) 2018/05/15 10:16:16 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) r1 = gettid() ptrace$cont(0x20, r1, 0x2, 0x401) 2018/05/15 10:16:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @cred={0x20, 0x1, 0x2}], 0xf0, 0x24000000}, 0x80) 2018/05/15 10:16:16 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x2c) 2018/05/15 10:16:16 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x1000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 365.263671] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:16 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") lstat(&(0x7f0000003f80)='.\x00', &(0x7f0000003fc0)) 2018/05/15 10:16:16 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xf5ffffff00000000}, 0x1c) 2018/05/15 10:16:16 executing program 6: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:16 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) pwrite64(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) 2018/05/15 10:16:16 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x2c) 2018/05/15 10:16:16 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x4000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:16 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 365.460806] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 365.555660] audit: type=1326 audit(1526379377.034:39): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23679 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 [ 366.054846] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:17 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:17 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x2c) 2018/05/15 10:16:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x5000000}, 0x1c) 2018/05/15 10:16:17 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x700, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @cred={0x20, 0x1, 0x2}], 0xf0, 0x24000000}, 0x80) 2018/05/15 10:16:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000005c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000580)={&(0x7f00000002c0)={0x14, 0x20, 0x601}, 0x14}, 0x1}, 0x0) 2018/05/15 10:16:17 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0xca}], 0x1, 0x0) [ 366.277063] audit: type=1326 audit(1526379377.756:40): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23679 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 2018/05/15 10:16:17 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x2c) 2018/05/15 10:16:17 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:17 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x5209, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 366.380449] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_newroute={0x1c, 0x18, 0x23, 0x0, 0x0, {0xa}}, 0x1c}, 0x1}, 0x0) 2018/05/15 10:16:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x54550100}, 0x1c) 2018/05/15 10:16:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 366.552707] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 367.158160] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:18 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x4000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x2c) 2018/05/15 10:16:18 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:18 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r1, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f0000001a40), 0x0, &(0x7f0000001a80)}}, {{&(0x7f0000001e40)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x80, &(0x7f0000004100), 0x0, &(0x7f0000001ec0)=[{0x18, 0x1, 0x1, "c3"}], 0x18}}], 0x2, 0x0) 2018/05/15 10:16:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xff00}, 0x1c) 2018/05/15 10:16:18 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x8001) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) inotify_init() 2018/05/15 10:16:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) 2018/05/15 10:16:18 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:19 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x2, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 367.467563] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, 0x2c) 2018/05/15 10:16:19 executing program 0: clone(0x0, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.advise\x00', &(0x7f00000000c0)=""/116, 0x74) 2018/05/15 10:16:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xa}, 0x1c) 2018/05/15 10:16:19 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:19 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x1000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xd00]}, 0x2c) 2018/05/15 10:16:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 367.629549] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 368.259137] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f0000001a40), 0x0, &(0x7f0000001a80)}}, {{&(0x7f0000001e40)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x80, &(0x7f0000004100), 0x0, &(0x7f0000001ec0)=[{0x10, 0x1, 0x1, "c3"}], 0x10}}], 0x2, 0x0) 2018/05/15 10:16:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x2c) 2018/05/15 10:16:19 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:19 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0xffffffff00000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xfffffff5}, 0x1c) 2018/05/15 10:16:19 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x778) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) 2018/05/15 10:16:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x2c) [ 368.444242] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:19 executing program 0: r0 = timerfd_create(0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x3) 2018/05/15 10:16:19 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x6000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:19 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x2000000}, 0x1c) 2018/05/15 10:16:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 368.620781] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 369.245946] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:20 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/prev\x00') exit(0x0) write$binfmt_elf64(r0, &(0x7f0000000cc0)=ANY=[], 0x0) 2018/05/15 10:16:20 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:20 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x2c) 2018/05/15 10:16:20 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x3, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xfec0}, 0x1c) 2018/05/15 10:16:20 executing program 3: r0 = getpgid(0xffffffffffffffff) setpriority(0x1, r0, 0x4) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/protocols\x00') exit(0x0) preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) 2018/05/15 10:16:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x2c) 2018/05/15 10:16:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 369.510472] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:21 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x4, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:21 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xe8030000}, 0x1c) 2018/05/15 10:16:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x2c) [ 369.656411] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 370.304174] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:21 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:21 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x500000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x2c) 2018/05/15 10:16:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x1f4}, 0x1c) 2018/05/15 10:16:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [0xffffffffffffffff, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:21 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x23, &(0x7f0000000040)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0xd}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/05/15 10:16:21 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)=ANY=[@ANYBLOB="0100bfc2962b394fe725000000000800000000bab6693ba6", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000370000000000000c500000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)) syz_fuse_mount(&(0x7f0000000040)='./file0\x00', 0xf000, r1, r2, 0x8, 0x1000000) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf6") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:22 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 370.554045] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:22 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x2c) 2018/05/15 10:16:22 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x1f000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:22 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) syz_fuseblk_mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2018/05/15 10:16:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf6") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xff00000000000000}, 0x1c) 2018/05/15 10:16:22 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:22 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x2c) 2018/05/15 10:16:22 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x300000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 370.765698] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 371.347125] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000280)='\r', 0x1}, {&(0x7f0000000480)="4a6b94f044a8eb", 0x7}], 0x2) 2018/05/15 10:16:23 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:23 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x2c) 2018/05/15 10:16:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf6") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:23 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0xa000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:23 executing program 3: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x4023, 0x3, &(0x7f0000000200)=[{&(0x7f0000000100)="cb32819148c22543e7dd047e591621fda34a3ffa720bb5c6a408b1815390b4a698a300746d29860b69e9f4861134050ed4262fa280dfffe79eb2ce82ee4a7e4523940439e207fe8f61853143cd0ab77d7a12be5d5bd9abea1ea5f9885be2fd7d1ff41ef58b85f1ffc5bcef61d87779e19d3aa3a5cf7baf25fa4937001676bb337135b380", 0x84, 0x4}, {&(0x7f00000001c0)="a81c9e727b451b0e008071fc730049f1c6e12f68b16b283b44465381ab677c60d601b0ef4db7fef9c43ac36ca036d60dae2755d0feee4232376dcae60f", 0x3d, 0x4}, {&(0x7f0000000380)="0694656968cc4aec710938369e4aaeb2be88e373fd146302b171d8b7e7862539b22c99ecd60bb0c36146498ae9ad251eab1458f20c85177185f192dcc5e62f15d4f855dc49aa0031407ad1df29179ca64b1db051321084608c570e3c6f05a5e2dd9c019df6e4e4f63179af6c9635f0f27f9203ddceb69b1082af91bc6fc88409552c89c1", 0x84, 0x1}], 0x820, &(0x7f0000000440)=ANY=[@ANYBLOB="6f76657272696465726f636b7065726d2c756e686964652c6e6f636fa470726573732c6d61703da8e2bb80266e6f726e2c6d6f64653d78342c757466382c0000000000000000"]) fanotify_init(0x1, 0x41800) 2018/05/15 10:16:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [0xffffffffffffffff, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x900000000000000}, 0x1c) 2018/05/15 10:16:23 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x2c) 2018/05/15 10:16:23 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) setpgid(0x0, 0x0) 2018/05/15 10:16:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 371.641313] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:23 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x7a00, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:23 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xaaaa000000000000}, 0x1c) 2018/05/15 10:16:23 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x2c) [ 371.774679] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 371.815996] audit: type=1326 audit(1526379383.293:41): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23932 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 [ 372.434336] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 372.542248] audit: type=1326 audit(1526379384.022:42): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23932 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 2018/05/15 10:16:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:24 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x10000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:24 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012c") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x2c) 2018/05/15 10:16:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x4000000}, 0x1c) 2018/05/15 10:16:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [0xffffffffffffffff, r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:24 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) r1 = dup3(r0, r0, 0x80000) fstat(r1, &(0x7f0000000200)) 2018/05/15 10:16:24 executing program 0: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x2c) 2018/05/15 10:16:24 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf6") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 372.689883] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0x16, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback={0x0, 0x1}, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}]}, 0x50}, 0x1}, 0x0) 2018/05/15 10:16:24 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0xa, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x2c) 2018/05/15 10:16:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x95b290a8}, 0x1c) 2018/05/15 10:16:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c08, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:24 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf6") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 372.875634] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 373.479303] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:25 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0xbb, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) 2018/05/15 10:16:25 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x5, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:25 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x2c) 2018/05/15 10:16:25 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x4000}, 0x1c) 2018/05/15 10:16:25 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) write(r0, &(0x7f0000000040)="1c69357ab1fea9e4c434e6a6be6ec5c2d8efeeeee4f5a58f3dee1a7ba61955045c13c1fb1cf1cda282f369e33fb63c630426ee25e1d51a4143291af0adb6b84fddf89bc56bf508fd695d11d54a38df30189ee543d9f8bc43dda937d3", 0x5c) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) 2018/05/15 10:16:25 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x2c) [ 373.697373] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:25 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:25 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x7400000000000000, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:25 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0xfc00}, 0x1c) 2018/05/15 10:16:25 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') write$binfmt_elf64(r0, &(0x7f0000001100)=ANY=[], 0x0) 2018/05/15 10:16:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x2c) 2018/05/15 10:16:25 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x74000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 373.841376] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 374.496338] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:26 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) process_vm_writev(r2, &(0x7f0000000300), 0x0, &(0x7f0000001540)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001440)=""/198, 0xc6}], 0x2, 0x0) mlockall(0x3) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x7}, 0x1c) 2018/05/15 10:16:26 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c02, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:26 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x2c) 2018/05/15 10:16:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x17) 2018/05/15 10:16:26 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x4c00, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:26 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000080)=r1) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000100)) 2018/05/15 10:16:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) 2018/05/15 10:16:26 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1=0xe0000001, @dev={0xac, 0x14, 0x14, 0xd}}, 0xc) [ 374.804315] hrtimer: interrupt took 30318 ns 2018/05/15 10:16:26 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x2c) 2018/05/15 10:16:26 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x2000001c) 2018/05/15 10:16:26 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x6c00, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:26 executing program 6: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000380)={0x1}) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6f733205"], &(0x7f0000000080)=""/230, 0xe6) [ 375.583847] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 375.683086] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x2c) 2018/05/15 10:16:27 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0xa, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xbb}, r2}, 0x14) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8911, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:27 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:27 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) write$binfmt_aout(r0, &(0x7f0000000540)={{0x10f}}, 0x20) 2018/05/15 10:16:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) 2018/05/15 10:16:27 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/05/15 10:16:27 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x202, 0x400000) bind$bt_rfcomm(r0, &(0x7f0000000100)={0x1f, {0x38, 0x3, 0x2, 0xb85b, 0x7, 0xfffffffffffffa1f}, 0x3}, 0xa) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200000, 0x0) 2018/05/15 10:16:27 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:27 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x2c) [ 375.861611] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:27 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0xffffffff00000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:27 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/05/15 10:16:27 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) r1 = getpgrp(0x0) sched_rr_get_interval(r1, &(0x7f0000000200)) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x4, 0x6, 0x2000}, 0x4) write$cgroup_subtree(r0, &(0x7f0000000100)={[{0x0, 'cpu', 0x20}, {0x0, 'pids', 0x20}, {0x2d, 'io', 0x20}, {0x2b, 'rdma', 0x20}, {0x2d, 'pids', 0x20}]}, 0x1b) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e21, 0x5, @loopback={0x0, 0x1}, 0x7fff}, 0x1c) r4 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x402, &(0x7f0000000080)="c626262c8523bf012cf66f") getsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000240)) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x2c) 2018/05/15 10:16:27 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:27 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:27 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) [ 375.991653] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 376.666230] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:28 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x300000000000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:28 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:28 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000580)='numa_maps\x00') exit(0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000100)=""/137, &(0x7f0000000040)=0x89) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) sendmsg$nfc_llcp(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x27, 0x0, 0x2, 0x6, 0x100000000, 0x0, "749063f9b79e856399157f5b7627d0c347ef8472393368f331e1518f1af51b007530335df583534d5d71da2a5f23b3dcb8a0b30fd24ade90eee10584a5dabc", 0x1f}, 0x60, &(0x7f0000000080)=[{&(0x7f0000000380)="ab25f1078b613a389f6575fba4af1d5d028d14dae2036827fec6602d73dd98b54167440ee9b2a49369023aee8ce63165c97babaccd547577d93eff6cc46a345dbe7a111afb6d824b1e7ad045eab12cb10b61481d06c03c8f8b8a59be3884f444507f67dbaa440009af3a256ea35bda1ec1e698562463f58cffa202032f0c08f87112f02068f418fca07a6c900789a254b0208fd1e01c6ae97acad428cee3afa1dcc0207e164c49dd59069bc7bbc4dffe078c216e6d28667f092890a8d080c89c945062c01467a5b6bade3b07ef", 0xcd}], 0x1, &(0x7f0000000480)={0x90, 0x103, 0x4, "edf3af67f0fc82ed12d00dfcb1aad88c922d9aabb12260c664dc22a2828c0a160a385e53ad3f9fb99b41d9ed7657e78bda0c3dbb0f12423078a1789a7b95bccfaa7555aec741c6c1fb81a1712dead6b54e1c57d23e457f555e8a8fccfa98c615fce9a8d7ff084b6f148f0d0bb2dade64ee92a53f4e9f01a42b0ba9"}, 0x90, 0x800}, 0x4000000) 2018/05/15 10:16:28 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000180)=""/4096) listen(r0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140)={0x8, 0x0, 0xffffffffffffffff}, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:28 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/05/15 10:16:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x2c) 2018/05/15 10:16:28 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:28 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) [ 376.823313] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x2c) 2018/05/15 10:16:28 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:28 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x6000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:28 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0x2c) [ 377.621728] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:29 executing program 0: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/05/15 10:16:29 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x2c) 2018/05/15 10:16:29 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x2000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:29 executing program 2: socket(0xa, 0x2, 0x0) timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0xffffffffffffff9c, 0x3, 0x1, 0x1, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f00000000c0)={{0xffffffffffffffc0, 0x7}, 0x48}, 0x10) r3 = socket(0xa, 0x1, 0x0) listen(r3, 0x400) ioctl(r3, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) 2018/05/15 10:16:29 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2000, 0x0) setsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000080)=0xffffffffffff0000, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x3) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:29 executing program 2: socket(0xa, 0x2, 0x0) timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x2c) 2018/05/15 10:16:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) socketpair$inet6(0xa, 0x0, 0x195b41c3, &(0x7f0000000040)) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:29 executing program 6: socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, 0x0, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:29 executing program 0: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/05/15 10:16:29 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x2000000000000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:29 executing program 2: socket(0xa, 0x2, 0x0) timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:29 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x28400) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f00000000c0)={0x3, 0xffffffff}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 378.656719] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x2c) 2018/05/15 10:16:30 executing program 0: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/05/15 10:16:30 executing program 6: socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, 0x0, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400000, 0x0) setns(r2, 0x2000000) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:30 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x5209, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:30 executing program 3: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='oom_adj\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000040)="f070da5a6c445be20f77d516628f2f11181c8bf411cd1299bf34a312dd65886106bae1427992a15424929ea69f723ce26a192f08dede49dfa89256dcf09ca2e65d1d", &(0x7f0000000100)="d26fa530b01fa9b5823e6b849a4cd5e846c839c6e00dd014ef4c03aa76631d3d0a5173ea7491092f8c45e2c2a00ff7171b28b2a8c2c34ea15d5b77f7e220d29c1c9ac7be19cc3d115254f2edece0e407d4211cbcc0f0baf5e933d7a76be6f74d3a6b4e921a36afd85076929ad7ad37cf3be48cd1ad4adcaa5fb842c5b719ede6b18897394cfbe6a5517290e2d876d6385e5b0ff7dc3e02612229dd1e1647926c78c695b28fb3894e2c95"}, 0x20) exit(0x0) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r2, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:30 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:30 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/05/15 10:16:30 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) [ 378.931061] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x2c) 2018/05/15 10:16:30 executing program 6: socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, 0x0, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:30 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r2 = gettid() r3 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x8, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000001c0)={r3, r0, 0x100}) listen(r0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket(0xa, 0x1, 0x0) ioctl(r5, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$llc(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x10) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x2c) [ 379.069311] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 379.720170] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:31 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:31 executing program 6: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r0, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:31 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x4000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:31 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/05/15 10:16:31 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x2c) 2018/05/15 10:16:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000600)={0xa, 0x0, 0x3000}, 0xfffffffffffffcd2) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) fcntl$getflags(r3, 0x40b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000500)={0x0, @in6={{0xa, 0x4e24, 0x101, @local={0xfe, 0x80, [], 0xaa}, 0x7}}, 0x3, 0x20, 0x6, 0x1, 0x5}, &(0x7f0000000440)=0x98) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000005c0)={r5, 0x5}, 0x8) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x5, &(0x7f0000000480)=[{&(0x7f0000000180)="533cb0755baa12acc10a600b51019b5b367822caef07e86330eefc9d170601541a8e37c21c2f20933fb7547552e7f6687a4f675e75b2c510d0ab70ac011ff6f9961b9592856b4215a158fe3771229d03e6edc47c42dd1106afcf26d419a86eaa25b65a044e2411833cf0e0845a18b5e35f1ff0c6782d580ed0a823686d08b80b1f17e9b79a16ab896f3f33a0476725b5072e393e1ec0bab9ccb2c12650", 0x9d, 0x3}, {&(0x7f0000000240)="521a962545a6502862c4aaf2c17452ca4884dc39dc29b23eab474ed8baaadf3cdc529e285f46a1530703796fad317026ed592b5fddf2c07a41c6a93090a92ece5cb770d23b3c78f8c8c582b708fa28f8c7c12b4cfc9d8abcd12aadd24d11c32da9b458884d69466554adbbb6c00b7e9ecf1fd368d0119982fec942c2dabc5c1ef9ec3ddd4b337c8dc3ae7173e2df8a5af2fe6a16c145437c358ba7f3c09eb1", 0x9f, 0x1}, {&(0x7f0000000300)="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", 0xfe, 0x6}, {&(0x7f0000000400)="215550d69084eba40816d8ec3cdc953c10feccd568cd015061c1fa29880cd7", 0x1f, 0xd3e}, {&(0x7f0000000440), 0x0, 0xfff}], 0x80000, 0x0) 2018/05/15 10:16:31 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000040)=0x2) 2018/05/15 10:16:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) 2018/05/15 10:16:31 executing program 2: r0 = socket(0x0, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) [ 380.031779] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:31 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x2c) 2018/05/15 10:16:31 executing program 6: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r0, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:31 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/05/15 10:16:31 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0xa00, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:31 executing program 2: r0 = socket(0x0, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:31 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x2c) [ 380.816329] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:32 executing program 6: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r0, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) recvfrom$inet(r1, &(0x7f0000000180)=""/178, 0xb2, 0x40000000, 0x0, 0x0) listen(r0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:32 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x10000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:32 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/05/15 10:16:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x2c) 2018/05/15 10:16:32 executing program 2: r0 = socket(0x0, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:32 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ooJ_adj\x00') exit(0x9) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) 2018/05/15 10:16:32 executing program 2: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) [ 381.049650] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:32 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/05/15 10:16:32 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 2018/05/15 10:16:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x2c) 2018/05/15 10:16:32 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x1000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:32 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1}, 0x10) 2018/05/15 10:16:32 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x2c) [ 381.192117] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:32 executing program 2: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:32 executing program 6: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:32 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x3000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x2c) 2018/05/15 10:16:32 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0x10) [ 381.845069] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) open$dir(&(0x7f0000000040)='./file0\x00', 0x200000, 0x13a) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xfff, 0x20002) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000180)=""/83) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:33 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:33 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0x10) 2018/05/15 10:16:33 executing program 2: r0 = socket(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:33 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f00000000c0)=0x40) exit(0x80) preadv(r0, &(0x7f0000000080), 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000180)=0x54) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x2, 0x0, 0xd18, &(0x7f0000000040)=[0x0, 0x0], 0x2}, 0x20) 2018/05/15 10:16:33 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x2c) 2018/05/15 10:16:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) 2018/05/15 10:16:33 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0xa000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:33 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:33 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x500, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 382.148520] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:33 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0x10) [ 382.942640] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:34 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x2c) 2018/05/15 10:16:34 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:34 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x1e8, [0x0, 0x20000280, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000180), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'lo\x00', 'team_slave_1\x00', '\x00', 'veth1_to_team\x00', @random="ecdefc2c673b", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'bcsh0\x00', 'bcsh0\x00', 'bcsf0\x00', "006d82849500", @random="80474986ab4f", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x260) 2018/05/15 10:16:34 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfb, 0x2000}, 0xc) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f0000000100)={0x7fff}) 2018/05/15 10:16:34 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x4c, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x280000, 0x200100) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f00000004c0), 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}, {r2, 0x8020}, {r0, 0x200}], 0x3, &(0x7f0000000100)={r3, r4+10000000}, &(0x7f0000000140)={0x6}, 0x8) exit(0x0) preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) io_setup(0xa19, &(0x7f00000001c0)=0x0) io_cancel(r5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r2, &(0x7f0000000380)="5c4c66bb476b967d96a9f2fdcd25307003ae131c1563ce55482c1ba3b7ff25f773498edc7d8b5a765535759a5ddd8eba875542e80fabf01a935d3c54c7771483f8b6572d0fcf5a72dbb549556b609fe7974998738dc93340b079daf677f66418c94f16fbcc1a4a339386303ebd9a441da6a160313f658de6150836d9141aa668db593335ac09ac8776773ec9167343b7bb1c1a8518cb4ba91de4092b91ae78994bb7aa9786c561af6ce4b5e77f0242415e991f892ce624ad060ca3e9d789eb2395e9730132d844f596", 0xc9, 0x0, 0x0, 0x1, r2}, &(0x7f0000000240)) 2018/05/15 10:16:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:34 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x2c) 2018/05/15 10:16:34 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:34 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x1e8, [0x0, 0x20000280, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000180), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'lo\x00', 'team_slave_1\x00', '\x00', 'veth1_to_team\x00', @random="ecdefc2c673b", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'bcsh0\x00', 'bcsh0\x00', 'bcsf0\x00', "006d82849500", @random="80474986ab4f", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x260) [ 383.173644] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:34 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:34 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x952, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xd, 0x807, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}}, &(0x7f0000000040)=0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000000c0)={r3, 0x453}, 0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100), &(0x7f0000000240)=0x4) 2018/05/15 10:16:34 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x2c) 2018/05/15 10:16:34 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x0, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) [ 383.341469] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 383.959964] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:35 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x1e8, [0x0, 0x20000280, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000180), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'lo\x00', 'team_slave_1\x00', '\x00', 'veth1_to_team\x00', @random="ecdefc2c673b", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'bcsh0\x00', 'bcsh0\x00', 'bcsf0\x00', "006d82849500", @random="80474986ab4f", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x260) 2018/05/15 10:16:35 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:35 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x10, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:35 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x0, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x2c) 2018/05/15 10:16:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x3ff, @remote={0xfe, 0x80, [], 0xbb}}, 0x1e0) 2018/05/15 10:16:35 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000200)='teql0\x00') exit(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) wait4(r1, &(0x7f0000000080), 0x40000000, &(0x7f0000000100)) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000001c0)=r1) 2018/05/15 10:16:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x2c) 2018/05/15 10:16:35 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x1e8, [0x0, 0x20000280, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000180), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'lo\x00', 'team_slave_1\x00', '\x00', 'veth1_to_team\x00', @random="ecdefc2c673b", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'bcsh0\x00', 'bcsh0\x00', 'bcsf0\x00', "006d82849500", @random="80474986ab4f", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x260) 2018/05/15 10:16:35 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x0, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:35 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:35 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x400000000000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) connect$netlink(r2, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x800}, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000002940)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000002a40)=0xe8) recvfrom$packet(r1, &(0x7f0000000180)=""/231, 0xe7, 0x2, &(0x7f0000002a80)={0x11, 0x19, r4, 0x1, 0x6, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x14) 2018/05/15 10:16:35 executing program 0: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x1e8, [0x0, 0x20000280, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000180), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'lo\x00', 'team_slave_1\x00', '\x00', 'veth1_to_team\x00', @random="ecdefc2c673b", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'bcsh0\x00', 'bcsh0\x00', 'bcsf0\x00', "006d82849500", @random="80474986ab4f", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x260) 2018/05/15 10:16:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x2c) [ 384.459488] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 385.132175] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:36 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, 0x0, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:36 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:36 executing program 0: r0 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x1e8, [0x0, 0x20000280, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000180), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'lo\x00', 'team_slave_1\x00', '\x00', 'veth1_to_team\x00', @random="ecdefc2c673b", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'bcsh0\x00', 'bcsh0\x00', 'bcsf0\x00', "006d82849500", @random="80474986ab4f", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x260) 2018/05/15 10:16:36 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x2c) 2018/05/15 10:16:36 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x6c000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getpeername$inet(r2, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f00000000c0)=0x10) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:36 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000100)=""/171) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, r0, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:37 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0x2c) [ 385.470535] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:37 executing program 0: r0 = socket(0x2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x1e8, [0x0, 0x20000280, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000180), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'lo\x00', 'team_slave_1\x00', '\x00', 'veth1_to_team\x00', @random="ecdefc2c673b", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'bcsh0\x00', 'bcsh0\x00', 'bcsf0\x00', "006d82849500", @random="80474986ab4f", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x260) 2018/05/15 10:16:37 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, 0x0, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:37 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x600, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x2c) 2018/05/15 10:16:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r3, &(0x7f0000000440)="c281", 0x2, 0xa00, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000200)={@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}, {&(0x7f0000000180)=""/99, 0x63}, &(0x7f0000000100), 0x60}, 0xa0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) listen(r0, 0x81) remap_file_pages(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x4, 0x7, 0x140) getpeername$netrom(r2, &(0x7f0000000040), &(0x7f00000000c0)=0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:37 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:37 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, 0x0, {}, {0x0, 0x10}}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:37 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x700, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 386.263456] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:37 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x1e8, [0x0, 0x20000280, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000180), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'lo\x00', 'team_slave_1\x00', '\x00', 'veth1_to_team\x00', @random="ecdefc2c673b", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'bcsh0\x00', 'bcsh0\x00', 'bcsf0\x00', "006d82849500", @random="80474986ab4f", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x260) 2018/05/15 10:16:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x2c) 2018/05/15 10:16:37 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000080)) r3 = socket(0xa, 0x1, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x18000, 0x0) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f00000000c0)) ioctl(r3, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) ioctl$PIO_SCRNMAP(r4, 0x4b41, &(0x7f0000000180)="099ec547cbf455d11af8339fe5feb4009cf0003153197c5082b3e1e9c6062b0e5ff75d8737c230ab11f531ebc8b1615501c8f837430445f9c7d1dfcef8c2ceb7fa7c7f44ee9684abfe1ae2d2f6e0ae824c360e38e98e276dfc9a308f903ae65d53884f347c6e22362e5e7f783e7a369220a325f60abbe7b6c65321b374d38b72e03434edafc5fa584d8de3300632d93918573397f91f6d37c96fff2c31b4a1ac34d862e32f3fc8bc795198bbe9769fda8c13f895dfff0b6dc97163fe3b38303fc91a699a9e5aa0f21b14d9991e9d0d75ef41672767caeb085942294e74a54cf47194eefd236f9b075f40249976aff7e03b139c2ba1d4080c671678784e16fe25336fcd912af6ca39fdc94cd35e02de11ff5f1741534ffc07fcab0d87578825770ea9569234235a0770d99ad5cd5bc79b74ea809a8a38890dafe629b26765ef44c9a7198c13de6dc96f2b93ec1b9858284d610608f1f7fef7cd6ba4f60ec19152ceda5d099533e886e9d6fb64919fa77d88e083e2c94d04420ad50572db84768ef7774ba8afa8d7ffe0ad44168d886b6d33f682cee0f582e199ee40cb18c9a6bc41b4209ef5d40f445d4e5f16aec817b4279c217a42f444db86d45022e4b05775d40ce0a79263f34ab9c427ef7e7d88027dca994b9af3e3102a74576465b8e89e8f8c2191e7001b43d2a5c9aef45e432159dc231e813ee77f968b4a18a528417ecda9df34c81c26f784ff805487bd53e91d9fbd726cd0266eff58c2508adf99a8f7ac4e5d20369c1001bdbaf987ba288fb33017f2c44f5089b06b84655648aed210e0614b79bc408d7c047982030c3d21606d36cdfe2352e6f73ef3a7a2a68c61c612a8d2fd47c818f0000b8af4c2c12e42cf0cb02312846a3acbbfc26abcae0674e568bba5faf915373bc0ce243dda7856efae8facf4a19ed1bf7c3cd85c3f66eab23b716564a081fb7bc136abc74cf2f350ed092c1c410bde8eddef5094266a3d76d19de8652a733a064c8f9d1b427718fa03eb637919ba9edb789cc209ef6936b2b84810944b319d0ea55e973ef101f6c3241bb05537e4b2d1d1fb62950b77f9bcc0525d4afb60d12f46348e4403ce92c63ebe33d38af069e8fdbb8db8fc1d03873a5bcc0dc34183d8f2e0ed985589ea5fd3b5270c3ef5522a0b2f9ed4af9924a12d3a616057afcad405fb154d28eae6ad0c032082c8a8a4f57dc899013270902efe61c4c85c4fb0441251a981b78cc1de54fb21fa4ec4c3fe8863131939d0d7986140d47d1af444d4a18c1d315822f0f480f2f32e08a9fb61ee28331481a420707cc16d1abe10c965ac97d530848cc7f1bb2d68635c6eeca071cff83d191acd5159833d14a22ae2daf26e8ff711ae4bc0599bebeda735484078281313a93aee64a2b2933a79fa68e2f105242d772260b981983e9375e520dddabd273dfb32b6166119efc099953211e77fc4794a32141b360247a226813422512be4e6b9d8db726dd122271e44b590d87c3815ba7ae79cd2d44eaf1dedb6da3d5798d636e4150cf0bbb5424f119a1cd9008ee2f5087648c0af7949e0ed3b14ecaa2357ccf693c5e1d52047794da7244a0585edea50104da06b31ea365ba872949d30432aaf380f3b7532be0a50817ef7101e3ba9ed00ee8a26902407ca60c83af7d5cc0469035240f9ae33bc85ad75e3f1347035e211563d7ae5bf00b54fbc0c4e3e62924b9f70c3b874317c4d6ef82a6692ba6b5be9d9027c95c17fdcf6a19d5d2b3dfd8693b37bfe95e502de71090e9c65ee8c002a9df34fa635d84bb9e41fca61649462d49b2ae6fddf147060e11486857430ef83a3208e3530cc78230f013813eae487a9e5b81f677216608781b1ee47275dd2d3de5dd04b3ce1bc1f2d2d9a86277ef12d9fe5e2699ae0bbfc5b38d4968ad72da83927a110ec2702e36c183b969a5aeec4369b1ef974aab11c82487aee27255ebcd28315a9ab38e235a5dfd7bd820aedd74ba96c78f42cb9349a53823585cc140e0cc5628271b35d7b8dad96e4cdd5cd8f2e28ec86e7d4d19f65c44f45fdb6ea161055617c77dc607a2b3e7cf267e1c5110fb80142410fb1fa620db6cff5ee5329f46ce5b3c2f5404bf75b3e7fcc8a43f44b1ad6fab0b6c4b1972ebb8f8360ee7a13a56e2c9e8efe3f603142b1e792ac70a65f60696545a2b0667cf4fbe5f15c5390c8934a5a4d0110d2b10dc49e8efe41dc265ea3d85aae53167e902f25982f480280a40c0fa85fa000a9c502f0624c367690f10bc436499f113351c8fe4adfaaae382376de7f0099d719601292bd8e440a521661aa825914cbebddb5e0cc6e0afb39e2c11ff6dfd36ead2d60a8ff01d12aa3a63cc7efed730d2118ed78fdf28aa920f71c96e2e39471f2eb586c6ae220fec77aa5d1824e7a548d3b78dad64b154fdea23667d50fe68b0fe8a611f44ab0f8e575a8f5c48384c431c369ddb7f112b17be9ec799db8238eff3ef9f9a42763646a9ea3bd1377be4307797929b98b327f72aafa017b168dec8e038793ed6341bb0d54a2e8233c74235166b3e6c9a303ae2144206a1b955ebcb4ba568e3191cc17493dc4c7a7bcf93b3843c730f978d74359bc1f23b5504ff074aace2dab2ce3c30016890eed1968af9d0eb38ef18cea2ac53726e310f02ebedc95b65c601f7ad59536038a4fe0e2ae5e9ed443824031649988462d22a5691603fec79a687654c31aa154d7807e60845cf455be7ad2df2ffbeee21e840f1aa0a8a8406c692a916f8c8992fd52df3fcd468976309a121b47a0d867ccd466ba929023d5d2c99a81b06ed716e018f1922f06fe0fcc70b11c340e8f20e0d8fa29649cee4573cb8e3dbb1ef4de1933d152761035c3c50eb33328c6ec10571b8e056cdaec474ef648ba5b6bf992cfd21a7b513bd3013e7e0374961c89cb7e489d68b29f44ce94abdab3bbb06485301b15f86c7384b045e25a8638fdfcffba07f3b45579b8105173eec4f219546cd5e766e87dab032e2e1c254089322cb4180c2d799af14ef5463a6233498a2f9c6c85c056aab3d77ba8b8b4af4369e091508b60b294bb223d6341c31d57c23c60a1db75bce8a7332360cab078d56726b0fd36207e094a5fe5b70bb148702007b3186823204ef271a68a4b13d9ca93026711feecb7582d591c33bede1d6e5d0182e926e931a66f4504a241d395ba932ff70dc0ec5f405c67a60fcd41dcc0da4a5710cd4c084b7d8967426555385db33b8ac1fcc742456269a22ea72eb1fba36bbe93a695e292a752c71d9a0c9898fda26067dfb8a68b39e2e5f5882efc5a0cc47f8f02cd62997508228586be8c2ea49ddd22e83fa4f8aa6c7d556c45bef0d7a0ba1232c637bccff3e1c9dda56d369c1456e8ec7552768133961b925de14eddd414d7548150cb01a534bfe93d10548eab9ab702e47d0b640a65ac3985ccf8802ea7380d859cebd8825237dc19067713e26015f22b6630927560ce8dad7479ebf1359d169fd01b18fdedd643f6db0ea747eac30996e2fce3a9cd07aac5e96f01968cb7f2e09b15f7029c9e74ef42b6f7a42ea58f90ff34a537e06c189696b05be807778b2071bc34b22621e1ad70d8aebc69db1fe8edb0f3bdf5d06df7c5c4e64538dda13b9489cfd8993c41c37651d40a3892f9612872b67d2591b81bbc066f1382785971e7ac8949ae55a7a5620ae92da5588a2b32fe88bb7ced14c37aab2383b610f43bb5b42d6d318c08a06e85dce7f7d5a1373211a91642d8129700d9302fe4280268c68e4a8271151f06f3fdd7a9535d75bd33f010cf39df9a9df8c1b814dbb5ccfa50f08f144f4706bfbdc9f580e8af2cc1da15a3e8d4c625a10b20cb80b8487cdaa91133c1a47cf4cd36a6a5a00942cb9039c26a0d4328387640663d44b470845f4195d45e5186bc5a08524f92e61817a47456383465de62914705f358450a1a4c78a767c898aa1d916bfed70ce53e98092abb1b1a6a31d32a1d91df62d5d1ff4036df219a4840e447c258c74e5736c95894c2e2ec0c571a5e32d45356f45e7c2a0798b8ba2067644ed64f3667204265b9b1441430587c9783653c55403e72a59276af88effee2434c212de6ad45b2d83780181dd09cd9baba9c11f19a7a9e6b83cada647034dce4aa2ffd7b9097c3e1a9f300702f78fa431b6000c25739552ad856a8f93255c09d26cc9d5e9537c3f570f2fa5c0d6abc8dc4af9569af921a75637ea90985b2b16c93d8a8342168a4bdcf512a45cadc37d9d61b147aba785ec31c5c3b679ecc2d6649cbce12d7fbb654016aa59f390a8a0c88528880f7cbf49db3904cd98a6b42f768095be8536d3735807c0b1dc8972557910a57ef0ca9fbdd682542b909f1ae28af38c4d9c925de68e23c1988efa1f206cdb6c3ee54054917656d8cc47e8b80475d15297882fc83ee7c5faccf982739fdfbfe32373ddeab63d676e6f73a513a29075b14f8bf1c5d5b92426a6c7dbf6bd9091107731f8ae6ed6cc050f1b70cdd9d300c701c292d74ff93f680588901ecf7a0b19f11fe08f135c9567d491f851fa0a526492e67b0c3815dd6de64751f698317d2ef2115a62bfeaa2520688e99725dfc498c7c61853452a87427c04b5dc4496c6c08d8184a6b0c835e9cacb6e0fb3dcdd3f3bdce17ed1bf60c6c0ba07e66ca5e0b83e2ed8dc8b1a5f1fabaef81114ac951480869a7f7b678c93435ae5191e30288d4dca09bea12de92b0ccc2458cf28e37b0f8f94f758c172a8f4ffc312a25681576088d3aaa3da9771178d9765d4c0f200655d56c1cee8cbca6c12a5ded128e630881be8c16cf6723c775674245cb69f9d53e1c7b76b58d919101616c246447993a76cd901b9e91716404b4bea4b39b61d855cb55543e812fa23cfd0e273ccf055fc71188a99e062bae3b78f1663acef0e70632416eaae70e6aada29b1ca205e27c8a6cda5555f70c5ece625763b6a445b89c66c77e627fc343f00468542cf90d3a26f700f0b71c82d897f427426f786ae8986fdc2c140084cecc25b123179ece964bf72342c6729f069e60601b8d96fc6a1919b18239a49f4e0724ab0fd5fa5fbbf79b841c5a3422d2b9e760bd24bbabbdf6454558ba6309d77ba8f91f620da2b26a70581392e852922d1c299773f036274e04448eaba84f174a836482e69f97a1fe20ca09cf7ed995302d6d54551be94b5beff6c1974c72408f0d8d9ad6d5c0e9e2e81859dfdad04a9af20f94d39c0c73049cabf9fddbabfa54a6a7c471695f502c5b156db9ac0df421c77e558551f87ee1c3957725fdb3fb4763b1ee6238002825e5dea54421ce05a5fedcc524fd19db3ba6ca35e7986278dc8ece316cc7acb9d8274db5eb22d0b4fafde20585386a2a64536bff83ae9cda6299e01fe320187ce7a16112f66b7ecdee514451c93ee8fcfdfbbaa59f9c50047bbec9e4335f851e7fbf44af2d5fc408dda196080b1f86dc1d7dd0d6c4cf5be21e17aba92991c383d641b052dc1800b68e5ba437ec36016080825e74099e555d32ab82f4f67f731915dbcdf6339da20907cc94ae4c37e7a00aa518808199b30e4481be5057def0c5ebf7da08a02afd3e02d5997f280e85b8e3325da5700a692047cc1c34fce91315013e46e9a275ec23d4cb04f3d3926fb426997704fa7552cf1f7eb590e4e8597a3c6dda65de49c428628aa87c585b0e3e45a15c9333d6b2cf671123400dbe3890a9ccc168c659fd662d9a3281cdce9f02842e7c8b371ac50db109241ed48a97323cecfd0a05af5dd85253001bedd3081fae280f0cf904d52b6f8a6ee757ac") r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:37 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:37 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x7a00, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:37 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x14) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x3, 0x8, 0x1, 0xc48c7ff, 0xf3b0, 0xfffffffffffffbff, 0xffffffff80000000, 0x1, 0x3, 0x100, 0xfffffffffffffc00, 0x7}) 2018/05/15 10:16:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r2, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) 2018/05/15 10:16:37 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)) timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:37 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x1e8, [0x0, 0x20000280, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000180), &(0x7f0000000280)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'lo\x00', 'team_slave_1\x00', '\x00', 'veth1_to_team\x00', @random="ecdefc2c673b", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'bcsh0\x00', 'bcsh0\x00', 'bcsf0\x00', "006d82849500", @random="80474986ab4f", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x260) 2018/05/15 10:16:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x2c) [ 386.454422] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:38 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x74, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:38 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:38 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x80, 0x20400) r1 = accept4$ipx(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x800) sendfile(r0, r1, &(0x7f0000000180), 0xffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x800000004e22}, 0x170) listen(r2, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket(0xa, 0x1, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 386.552539] kernel msg: ebtables bug: please report to author: bad policy [ 387.253847] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:38 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:38 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x1e8, [0x0, 0x20000280, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000180), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x9, 0x0, 0x0, 'lo\x00', 'team_slave_1\x00', '\x00', 'veth1_to_team\x00', @random="ecdefc2c673b", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'bcsh0\x00', 'bcsh0\x00', 'bcsf0\x00', "006d82849500", @random="80474986ab4f", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x260) 2018/05/15 10:16:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x2c) 2018/05/15 10:16:38 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@delqdisc={0x24, 0x25, 0x5, 0x0, 0x0, {0x0, r1}}, 0x24}, 0x1}, 0x0) 2018/05/15 10:16:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:38 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x4000000000000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:38 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r2, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) 2018/05/15 10:16:39 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) [ 387.555787] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 387.566977] kernel msg: ebtables bug: please report to author: bad policy 2018/05/15 10:16:39 executing program 6: unshare(0x24020400) r0 = epoll_create1(0x0) vmsplice(r0, &(0x7f0000000280)=[{&(0x7f0000000340)}], 0x1, 0x0) 2018/05/15 10:16:39 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x2c) 2018/05/15 10:16:39 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x148, [0x0, 0x20000280, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000180), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bcsh0\x00', 'bcsh0\x00', 'bcsf0\x00', "006d82849500", @random="80474986ab4f", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x260) 2018/05/15 10:16:39 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x5209000000000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x890f, &(0x7f0000000080)="c626262c8523bf012cf66f") r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x400, 0x0) ioctl$SG_EMULATED_HOST(r3, 0x2203, &(0x7f00000000c0)) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:39 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) [ 387.686440] kernel msg: ebtables bug: please report to author: Wrong len argument [ 387.725350] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 388.357233] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:40 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x2c) 2018/05/15 10:16:40 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg$netrom(r0, &(0x7f00000018c0)={&(0x7f0000000340)=@ax25={0x3, {"90ffd1c305a308"}}, 0x10, &(0x7f0000000000), 0x0, &(0x7f00000007c0)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYRES32=r0], @ANYBLOB="3b0f16ee", @ANYPTR=&(0x7f0000000800)=ANY=[@ANYBLOB="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"]], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYPTR64], @ANYRES64=r0], 0x18, 0x8000}, 0x0) 2018/05/15 10:16:40 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012c") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:40 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x7, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:40 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x1e8, [0x0, 0x20000280, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000180), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x0, 0x0, 0x0, 'lo\x00', 'team_slave_1\x00', '\x00', 'veth1_to_team\x00', @random="ecdefc2c673b", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x11, 0x0, 0x0, 'bcsh0\x00', 'bcsh0\x00', 'bcsf0\x00', "006d82849500", @random="80474986ab4f", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x260) 2018/05/15 10:16:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0x1f, 0x8000000001, 0x4) r3 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xa59, 0x0) sendto(r3, &(0x7f0000000180)="1161fd54c56330d02ed61d1f9148fabeb7c947124a65c137ad20b28878fb6f1011694c78768c655edcc94cc5bbe6892f87105c0c66864211868984", 0x3b, 0x14, &(0x7f00000001c0)=@ethernet={0x306, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f0000000100)={0x7d7659c2, 0x2, 0x3, 0x3, 0x5}) mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8003, &(0x7f0000000040)=0x1, 0x5, 0x3) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:40 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3, 0x39de, 0x8, 0x9, 0xa72}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000140)={r1}, &(0x7f0000000180)=0x8) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x480000000) preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r2, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) 2018/05/15 10:16:40 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012c") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) [ 388.621780] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 2018/05/15 10:16:40 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x130, [0x0, 0x20000280, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000180), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'lo\x00', 'team_slave_1\x00', '\x00', 'veth1_to_team\x00', @random="ecdefc2c673b", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x260) 2018/05/15 10:16:40 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2c) 2018/05/15 10:16:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x80, r1}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:40 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x4800000000000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:40 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012c") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:40 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x2c) [ 388.733782] kernel msg: ebtables bug: please report to author: Wrong len argument [ 388.749386] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:40 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x52090000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:40 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x130, [0x0, 0x20000280, 0x200002b0, 0x20000438], 0x0, &(0x7f0000000180), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'lo\x00', 'team_slave_1\x00', '\x00', 'veth1_to_team\x00', @random="ecdefc2c673b", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x2}]}, 0x260) [ 388.855379] kernel msg: ebtables bug: please report to author: Wrong len argument [ 389.420845] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:41 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x2c) 2018/05/15 10:16:41 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x1000000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:41 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000080)='#! ', 0x3, 0x0) 2018/05/15 10:16:41 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 2018/05/15 10:16:41 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0xffffffe3) vmsplice(r2, &(0x7f0000000540)=[{&(0x7f0000000440)}], 0x1, 0x2) exit(0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000040)={0x1, 0x0, [{0x106000, 0xb5, &(0x7f0000000100)=""/181}]}) 2018/05/15 10:16:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, 0xffffffffffffffff, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:41 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf6") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:41 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x2c) 2018/05/15 10:16:41 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 2018/05/15 10:16:41 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf6") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:41 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x7000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 389.643317] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:41 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000002f40)=[{{&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000380), 0x0, &(0x7f0000000280)}}, {{&(0x7f0000000840)=@in6={0xa}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="48000000000000000401000001040000c8bcff7dcbb553c755125bda491e5f096d542fba1af840cf4291626c5be3ba7a75c3f298e838f81958d0c319b04b666a6a107e877cee563737705be226e00000000000000001010000080000000000000000000000000000f201c9c5cbcfcd6d9c8a00ab79eefda3c8f297c45ad2585db3cb830a709c67caaf76da84253f1fae5759e48c773146318b556d72480c9595174e1577898559d40fbc4601b44dac9a85416f0f454679d35871664686b4af8b"], 0xc0, 0x4}}], 0x2, 0x0) [ 390.428306] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:42 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf6") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:42 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x2c) 2018/05/15 10:16:42 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 2018/05/15 10:16:42 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x1f00, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000040)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:42 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x7fe, 0x1000000ff) sendto$inet6(r1, &(0x7f00000018c0)="6a725a5f62d02a6be55afd02d999", 0xe, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x3, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/05/15 10:16:42 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000180)="6f056d5f6164d94a1e928029e05073fa3482451cefa275f9cdf098744054b1c57ba456da14c548194e6fcc") exit(0x1954) preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, 0xffffffffffffffff, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:42 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 2018/05/15 10:16:42 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x2c) 2018/05/15 10:16:42 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0xa00000000000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:42 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='^vmnet1posix_acl_access+vboxnet1\x00', 0x0) fsetxattr(r1, &(0x7f0000000080)=@known='security.selinux\x00', &(0x7f0000000180)='\x00', 0x1, 0x0) fsetxattr(r1, &(0x7f0000000000)=@known='trusted.syz\x00', &(0x7f0000000040)='\x00', 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x9, &(0x7f0000000240)="010036081723be0103006f") setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000180)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) r5 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x1, 0x200) symlinkat(&(0x7f0000000040)='./file0\x00', r5, &(0x7f0000000100)='./file0\x00') socket$inet6(0xa, 0x7, 0x5) 2018/05/15 10:16:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000200)=ANY=[@ANYBLOB="14f0"]) 2018/05/15 10:16:42 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 2018/05/15 10:16:42 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x48000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 390.954804] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 391.613083] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:43 executing program 0: clone(0x0, &(0x7f0000000000), &(0x7f0000001080), &(0x7f00000022c0), &(0x7f0000002300)) setpriority(0x1, 0x0, 0x0) 2018/05/15 10:16:43 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x2c) 2018/05/15 10:16:43 executing program 6: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 2018/05/15 10:16:43 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:43 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x20000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 2018/05/15 10:16:43 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') exit(0x0) getsockname$ipx(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/202, 0x14}], 0x1, 0x0) 2018/05/15 10:16:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, 0xffffffffffffffff, r3, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:43 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x2c) [ 391.816260] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:43 executing program 6: r0 = socket$inet6(0xa, 0x0, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 2018/05/15 10:16:43 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:43 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x6800, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000040)={0x7a, 0xc, [0x8, 0x100000001, 0xd5d]}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:43 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) getdents(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000) 2018/05/15 10:16:43 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x2c) 2018/05/15 10:16:43 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000), &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:43 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) [ 391.971456] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:43 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x4000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:43 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x2c) 2018/05/15 10:16:43 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 2018/05/15 10:16:43 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x6c, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 392.160612] audit: type=1326 audit(1526379403.640:43): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24774 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 [ 392.198917] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 392.633336] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:44 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0), 0x8) 2018/05/15 10:16:44 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000), &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:44 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 2018/05/15 10:16:44 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, 0x2c) 2018/05/15 10:16:44 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x48, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:44 executing program 4: ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffff9c, 0xc0184908, &(0x7f00000000c0)={0x3ff, 0x12, 0x1, 0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0xa8, 0x200000) r1 = dup(r0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000040)={0x1}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket(0xa, 0x1, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) setsockopt$inet6_dccp_buf(r4, 0x21, 0x80, &(0x7f0000000180)="d6f15248784866d05ac2663d626afb5b9f6ac8b636081c2169b80f10ba39956d12c67eb0771643e893f62117fd5462d4b30354539eca9d8e044b2d59e831456a76815a2f86889adf46e6f77227d283a2ff7db39552bafd96795177e18706807dec0d0d95510f2052db4a38a379a1f028400c725f4c57608e86728027ebb01eeb5a7caa4a53add0cae63694034afa634f37a7797d69adb3e9a422a6c6d959bc842a44a2dc9b4bbbcae9eff69216341bf8ac0e4f29ceecfab1a6bd6b575a639a41c752c82296309d6dcda7548967db05", 0xcf) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r2, r0, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) [ 392.827951] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 392.852335] audit: type=1326 audit(1526379404.332:44): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24774 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 2018/05/15 10:16:45 executing program 0: unshare(0x24020400) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) 2018/05/15 10:16:45 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)=[{0x10, 0x1}], 0x10}}], 0x1, 0x0) 2018/05/15 10:16:45 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000), &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:45 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x7a00000000000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:45 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x3a, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xfffffffffffffe31) 2018/05/15 10:16:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r2, r0, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) 2018/05/15 10:16:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") getsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:45 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x2c) [ 393.627151] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:45 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}], 0x1, 0x0) [ 393.688635] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:45 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) io_setup(0x9, &(0x7f0000000040)=0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000640)=0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000680)='net/stat\x00') perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x1, 0x4, 0x81, 0x0, 0x0, 0x0, 0x1200, 0x1, 0x0, 0x0, 0x7, 0xfffffffffffffffe, 0x1ff, 0x1000, 0x8, 0x6, 0xffff, 0xff, 0x0, 0x5, 0x8, 0x8, 0xffffffffffffb578, 0x1, 0xa7e0, 0x7eb2, 0x1f, 0x9, 0x8001, 0xffffffff80000001, 0x800, 0x7, 0x324, 0x2, 0x4, 0x9, 0x0, 0x31, 0x7, @perf_bp={&(0x7f0000000580), 0x3}, 0x220, 0x0, 0x8, 0x3, 0x401, 0xd9, 0x7fffffff}, r5, 0x4, r6, 0xb) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x9, 0x3, 0x260, 0x0, 0xffffffff, 0xffffffff, 0x110, 0xffffffff, 0x1c8, 0xffffffff, 0xffffffff, 0x1c8, 0xffffffff, 0x3, &(0x7f0000000180), {[{{@ip={@multicast1=0xe0000001, @loopback=0x7f000001, 0xff000000, 0xffffff00, 'veth0_to_bridge\x00', 'ipddp0\x00', {}, {}, 0x13, 0x0, 0x11}, 0x0, 0xf0, 0x110, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x4, 0x101, 0x6, 0x1}}, @common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x1, 0x108, 0x0, 0x1}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ip={@empty, @rand_addr, 0xffffff00, 0x0, 'irlan0\x00', 'lo\x00', {}, {0xff}, 0x84, 0x3, 0x20}, 0x0, 0x98, 0xb8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x2c0) io_cancel(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x8, r2, &(0x7f00000000c0)="0ba6e52bf4b3e6e09623834ae66ca1f0ac852c79d8a236e46628b4483893d4255aa5b4d5a2c5f0cf0fdc0f1483ef06bafde0c2186af050aa228d7fdd6b484b13463352f46787518c1ebd576887fa3cae8b6c4d42c06d588a6e1de40c75770d6e095cad6d26ee8162704d8807e202ccc0366f5f9744c7e1f679b1794d9de7", 0x7e, 0x1, 0x0, 0x0, r7}, &(0x7f0000000200)) r9 = getpid() r10 = getpgid(0xffffffffffffffff) fcntl$setownex(r8, 0xf, &(0x7f0000000240)={0x2, r10}) tgkill(r9, r10, 0x3d) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:45 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x2c) 2018/05/15 10:16:45 executing program 3: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) timer_create(0x0, &(0x7f0000000000)={0x0, 0x2e}, &(0x7f0000000040)) timer_delete(0x0) [ 393.815575] audit: type=1326 audit(1526379405.295:45): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24843 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 [ 393.838629] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 394.529350] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 394.716048] audit: type=1326 audit(1526379406.195:46): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24843 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 2018/05/15 10:16:46 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f00000000c0)="666339379bd9685dc5401d57987bbe", 0xf, 0x0, &(0x7f0000000000)=@nl=@unspec, 0x80) 2018/05/15 10:16:46 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x700000000000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:46 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}], 0x1, 0x0) 2018/05/15 10:16:46 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:46 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0x2c) 2018/05/15 10:16:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) socket(0xa, 0x6, 0x1) ioctl(r3, 0x7fffffff, &(0x7f0000000040)="0027452ab7a146f2d1000000000000") setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x0, 0xfffffbffffffffff}, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24, 0xe0, @mcast2={0xff, 0x2, [], 0x1}, 0x4}, 0xfffffffffffffccb) 2018/05/15 10:16:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f00000018c0)}}], 0x1, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 2018/05/15 10:16:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r2, r0, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) 2018/05/15 10:16:46 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}], 0x1, 0x0) 2018/05/15 10:16:46 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x2c) 2018/05/15 10:16:47 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c606262c8523bf012cf66f") timer_create(0xfffffffffffffffc, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000044000)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) 2018/05/15 10:16:47 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x6c00000000000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:47 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)) fcntl$lock(r0, 0x7, &(0x7f0000001740)={0x2, 0x0, 0x6, 0xffffffffffff}) 2018/05/15 10:16:47 executing program 0: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) 2018/05/15 10:16:47 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)}}], 0x2, 0x0) 2018/05/15 10:16:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, 0x2c) 2018/05/15 10:16:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, 0xffffffffffffffff, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) tee(r0, r0, 0x401, 0x4) listen(r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8000000000004000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000000c0)={0x1, 'veth0\x00', 0x2}, 0x18) sendmsg$kcm(r1, &(0x7f00000026c0)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x0, 0x4, 0x1, 0x3}}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000000100)="ed39cec5a812cd7c8006cb314d795b109dbdad2a572890902438fd37e8283f91f160ea7586ec85cca9", 0x29}, {&(0x7f00000002c0)="8f51828eecfd6df7488bbc7c43de581e2019e6a3f914d8366e6083beb6e84a7d8f8d262735b2c0352bd00b3251877e5e0ed8120b819a6e791c63b9f9f0d25f7fc001c962556817fd139e122195", 0x4d}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="2f2b6314da3044d39ab11119017827cd5763054e0c90892a2a18c68df545b48a879621b4d4edeb486ea060c41235ef687bc20b86cc7152f45d95256c30e92937fcb7564a8a9071e0758be08838e360a7f668230ef9eed2c8e89ce36f8cd30df2b102e8634f875659434f973dca3827cccb4ec6aa35fc3da4484ec21723a69d84130e161a992ba511cb86c4d47b549705231dae45f65c9bb9a6b9121960b87be5f9d50ec7d8890e15d1594598a26bba332bccb20b5b5cd93984fe79c545d53fab7e58cfa7d9a7448ddf5e46f45c", 0xcd}, {&(0x7f0000000180)="7e6771ff", 0x4}, {&(0x7f0000001440)="12d53ec53d687947f98d96687e8976a8ab224add8a32cf842a3afc6fb44a0ecd42de89b6f176d0408601e3126cd4f9cf8d524f008c97b6ff744a1e4515b51374d1da69a39a5b14732baf", 0x4a}], 0x6, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], 0x1150, 0x4}, 0x80) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000002700)=0x1000) rmdir(&(0x7f0000002900)='./file0\x00') ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000002800)={r0, r0, 0x0, 0x9, &(0x7f0000002740)="96a6ffe13c441c70cfc151bda5bda63bc092a47bb84d0000631b04e62f2580d7f8eaaead2ee7564457005fdeb567f1ed714605a9a76eb88b4823432662c248d057aa10c5b9a8d42ccd576e620f6a5367c230f1e6aad1122d72f0b44310bb73a149ef81a0ba7a459d0842647a3b0d86c408f2c3136245a1543182c1ff0baa97b2afee445fb97feacc87405dbafc75f881df", 0x2, 0x0, 0x101, 0x9, 0x1f, 0x3, 0xe80, "e1237cb29e395a5799148e363eaa134409a684d5283ba710423016fae76cc18fe4ac4ee9e7d3f11104e1a467191829d88cbc34119b21caf64089dcc64448913261ea59338825bec450fe66b9922a177ecf59f81133a4014fefa6f6eff67b4e3c1a0b4164f31e5724ea11c65cd45274cb97ed3bb745230c45b6ebdbcb05cdcd03c2912b5044863136cbab4520559ec4ff4fad77d9335de35155c35f17874495c130243219edf5552f75bc5b1a94ff4f"}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x318) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000001c0)={0xb9, 0x6, 0x300000, 0x6f}, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000200)='yam0\x00') connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 395.692792] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:47 executing program 2: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/83, 0x53) 2018/05/15 10:16:47 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)}}], 0x2, 0x0) [ 395.752249] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 395.764762] audit: type=1326 audit(1526379407.244:47): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24889 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 2018/05/15 10:16:47 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0xd}}, 0xc) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0xd}, @multicast2=0xe0000002}, 0xc) 2018/05/15 10:16:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x2c) 2018/05/15 10:16:47 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0xfdfdffff00000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x2c) 2018/05/15 10:16:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x2}, 0x1c) [ 395.866354] audit: type=1326 audit(1526379407.346:48): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24903 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 [ 396.548362] audit: type=1326 audit(1526379408.028:49): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24889 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 [ 396.618284] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:48 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)}}], 0x2, 0x0) 2018/05/15 10:16:48 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}], 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000040), 0x20) 2018/05/15 10:16:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x2c) 2018/05/15 10:16:48 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x7a000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fsync(r1) 2018/05/15 10:16:48 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0xd}}, 0xc) r1 = socket(0x2, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") dup2(r1, r0) 2018/05/15 10:16:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, 0xffffffffffffffff, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) [ 396.666767] audit: type=1326 audit(1526379408.146:50): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24903 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a09 code=0xffff0000 2018/05/15 10:16:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x2c) 2018/05/15 10:16:48 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)=[{0x10}], 0x10}}], 0x2, 0x0) [ 396.743574] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:48 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x4000000004002) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f00000000c0)) 2018/05/15 10:16:48 executing program 3: syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @rand_addr=0x80000000, {[@timestamp={0xc0, 0x4}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) 2018/05/15 10:16:48 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x3, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 2018/05/15 10:16:48 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000380), 0x0) 2018/05/15 10:16:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x2c) 2018/05/15 10:16:48 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000040)={0x7777, 0x80, 0x3f, 0x0, 0x9}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0), 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:48 executing program 3: syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @rand_addr=0x80000000, {[@timestamp={0xc0, 0x4}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) 2018/05/15 10:16:48 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)=[{0x10}], 0x10}}], 0x2, 0x0) 2018/05/15 10:16:48 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0xfffffdfd, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 396.943569] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:49 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x4000000004002) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f00000000c0)) 2018/05/15 10:16:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x2c) 2018/05/15 10:16:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080)={0x1}, 0x8) close(r0) 2018/05/15 10:16:49 executing program 3: syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @rand_addr=0x80000000, {[@timestamp={0xc0, 0x4}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) 2018/05/15 10:16:49 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x100000001) connect$inet6(r0, &(0x7f0000000040)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000008340)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001340)}}, {{0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000003900)=[{0x10}], 0x10}}], 0x2, 0x0) 2018/05/15 10:16:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_settime(0x4, &(0x7f0000000040)={0x77359400}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/15 10:16:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r2, r0, 0xffffffffffffffff, r0, r3]}, @cred={0x20, 0x1, 0x2}], 0x120, 0x24000000}, 0x80) 2018/05/15 10:16:49 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x600000000000000, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 397.541130] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x340, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="6a725a5f62d02a6be55afd02d999", 0xe, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x8, @dev={0xfe, 0x80}}, 0x1c) recvmsg(r0, &(0x7f0000000300)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f00000002c0)}, 0x2000) [ 397.596859] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/05/15 10:16:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8001, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x2c) 2018/05/15 10:16:49 executing program 3: syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @rand_addr=0x80000000, {[@timestamp={0xc0, 0x4}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) 2018/05/15 10:16:49 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x4000000004002) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f00000000c0)) 2018/05/15 10:16:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="c626262c8523bf012cf66f") setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 397.683656] ================================================================== [ 397.691315] BUG: KASAN: use-after-free in sock_recv_errqueue+0x468/0x4a0 [ 397.698167] Read of size 8 at addr ffff8801d866a850 by task syz-executor2/24992 [ 397.705787] [ 397.707431] CPU: 1 PID: 24992 Comm: syz-executor2 Not tainted 4.17.0-rc5+ #51 [ 397.714707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.724062] Call Trace: [ 397.726662] dump_stack+0x1b9/0x294 [ 397.730308] ? dump_stack_print_info.cold.2+0x52/0x52 [ 397.735503] ? printk+0x9e/0xba [ 397.738796] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 397.743560] ? kasan_check_write+0x14/0x20 [ 397.747801] print_address_description+0x6c/0x20b [ 397.752647] ? sock_recv_errqueue+0x468/0x4a0 [ 397.757146] kasan_report.cold.7+0x242/0x2fe [ 397.761562] __asan_report_load8_noabort+0x14/0x20 [ 397.766493] sock_recv_errqueue+0x468/0x4a0 [ 397.770824] packet_recvmsg+0xc27/0x1770 [ 397.774886] ? import_iovec+0x24b/0x420 [ 397.778864] ? packet_mmap+0x630/0x630 [ 397.782754] ? _copy_from_user+0xdf/0x150 [ 397.786907] ? copy_msghdr_from_user+0x3bc/0x560 [ 397.791679] ? move_addr_to_kernel.part.18+0x100/0x100 [ 397.796964] ? security_socket_recvmsg+0x9b/0xc0 [ 397.801725] ? packet_mmap+0x630/0x630 [ 397.805617] sock_recvmsg+0xd0/0x110 [ 397.809332] ? __sock_recv_ts_and_drops+0x420/0x420 [ 397.814354] ___sys_recvmsg+0x2b6/0x680 [ 397.818340] ? ___sys_sendmsg+0x940/0x940 [ 397.822495] ? __sched_text_start+0x8/0x8 [ 397.826649] ? __fget_light+0x2ef/0x430 [ 397.830631] ? fget_raw+0x20/0x20 [ 397.834104] ? __sys_sendto+0x475/0x670 [ 397.838089] ? __ia32_sys_getpeername+0xb0/0xb0 [ 397.842762] ? fget_raw+0x20/0x20 [ 397.846240] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 397.851788] ? sockfd_lookup_light+0xc5/0x160 [ 397.856287] __sys_recvmsg+0x112/0x260 [ 397.860163] ? __ia32_sys_sendmmsg+0x100/0x100 [ 397.864733] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 397.870257] ? fput+0x130/0x1a0 [ 397.873527] ? exit_to_usermode_loop+0x87/0x310 [ 397.878191] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 397.883031] __x64_sys_recvmsg+0x78/0xb0 [ 397.887081] do_syscall_64+0x1b1/0x800 [ 397.890956] ? finish_task_switch+0x1ca/0x840 [ 397.895448] ? syscall_return_slowpath+0x5c0/0x5c0 [ 397.900460] ? syscall_return_slowpath+0x30f/0x5c0 [ 397.905386] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 397.910740] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 397.915591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.921114] RIP: 0033:0x455a09 [ 397.924290] RSP: 002b:00007fc19b576c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 397.931994] RAX: ffffffffffffffda RBX: 00007fc19b5776d4 RCX: 0000000000455a09 [ 397.939261] RDX: 0000000000002000 RSI: 0000000020000300 RDI: 0000000000000013 [ 397.946526] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 397.953789] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 397.961048] R13: 0000000000000549 R14: 00000000006fbf78 R15: 0000000000000000 [ 397.968308] [ 397.969931] Allocated by task 24992: [ 397.973818] save_stack+0x43/0xd0 [ 397.977258] kasan_kmalloc+0xc4/0xe0 [ 397.980957] __kmalloc_node_track_caller+0x47/0x70 [ 397.985870] __kmalloc_reserve.isra.38+0x3a/0xe0 [ 397.990610] __alloc_skb+0x14d/0x780 [ 397.994312] alloc_skb_with_frags+0x137/0x760 [ 397.998801] sock_alloc_send_pskb+0x87a/0xae0 [ 398.003279] packet_sendmsg+0x1b98/0x6070 [ 398.007422] sock_sendmsg+0xd5/0x120 [ 398.011122] __sys_sendto+0x3d7/0x670 [ 398.014906] __x64_sys_sendto+0xe1/0x1a0 [ 398.018952] do_syscall_64+0x1b1/0x800 [ 398.022823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.027996] [ 398.029612] Freed by task 24992: [ 398.032962] save_stack+0x43/0xd0 [ 398.036403] __kasan_slab_free+0x11a/0x170 [ 398.040625] kasan_slab_free+0xe/0x10 [ 398.044407] kfree+0xd9/0x260 [ 398.047498] skb_free_head+0x99/0xc0 [ 398.051194] skb_release_data+0x690/0x860 [ 398.055428] skb_release_all+0x4a/0x60 [ 398.059312] kfree_skb+0x195/0x560 [ 398.062848] sit_tunnel_xmit+0x16b/0x30b0 [ 398.066996] dev_hard_start_xmit+0x264/0xc10 [ 398.071390] __dev_queue_xmit+0x2724/0x34c0 [ 398.075696] dev_queue_xmit+0x17/0x20 [ 398.079479] packet_sendmsg+0x40f8/0x6070 [ 398.083612] sock_sendmsg+0xd5/0x120 [ 398.087311] __sys_sendto+0x3d7/0x670 [ 398.091094] __x64_sys_sendto+0xe1/0x1a0 [ 398.095137] do_syscall_64+0x1b1/0x800 [ 398.099015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.104197] [ 398.105811] The buggy address belongs to the object at ffff8801d866a780 [ 398.105811] which belongs to the cache kmalloc-512 of size 512 [ 398.118462] The buggy address is located 208 bytes inside of [ 398.118462] 512-byte region [ffff8801d866a780, ffff8801d866a980) [ 398.130319] The buggy address belongs to the page: [ 398.135231] page:ffffea0007619a80 count:1 mapcount:0 mapping:ffff8801d866a000 index:0xffff8801d866a280 [ 398.144660] flags: 0x2fffc0000000100(slab) [ 398.148882] raw: 02fffc0000000100 ffff8801d866a000 ffff8801d866a280 0000000100000004 [ 398.156760] raw: ffffea00074f1f20 ffffea000741d120 ffff8801da800940 0000000000000000 [ 398.164621] page dumped because: kasan: bad access detected [ 398.170311] [ 398.171928] Memory state around the buggy address: [ 398.176850] ffff8801d866a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 398.184190] ffff8801d866a780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 398.191545] >ffff8801d866a800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 398.198883] ^ [ 398.204835] ffff8801d866a880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 398.212186] ffff8801d866a900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 398.219533] ================================================================== [ 398.226878] Disabling lock debugging due to kernel taint [ 398.232537] Kernel panic - not syncing: panic_on_warn set ... [ 398.232537] [ 398.239922] CPU: 1 PID: 24992 Comm: syz-executor2 Tainted: G B 4.17.0-rc5+ #51 [ 398.248587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.257945] Call Trace: [ 398.260546] dump_stack+0x1b9/0x294 [ 398.264183] ? dump_stack_print_info.cold.2+0x52/0x52 [ 398.269377] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 398.274223] ? sock_recv_errqueue+0x450/0x4a0 [ 398.278725] panic+0x22f/0x4de [ 398.281915] ? add_taint.cold.5+0x16/0x16 [ 398.286066] ? do_raw_spin_unlock+0x9e/0x2e0 [ 398.290472] ? do_raw_spin_unlock+0x9e/0x2e0 [ 398.294883] ? sock_recv_errqueue+0x468/0x4a0 [ 398.299378] kasan_end_report+0x47/0x4f [ 398.303355] kasan_report.cold.7+0x76/0x2fe [ 398.307681] __asan_report_load8_noabort+0x14/0x20 [ 398.312611] sock_recv_errqueue+0x468/0x4a0 [ 398.316938] packet_recvmsg+0xc27/0x1770 [ 398.321003] ? import_iovec+0x24b/0x420 [ 398.324995] ? packet_mmap+0x630/0x630 [ 398.328883] ? _copy_from_user+0xdf/0x150 [ 398.333031] ? copy_msghdr_from_user+0x3bc/0x560 [ 398.337787] ? move_addr_to_kernel.part.18+0x100/0x100 [ 398.343066] ? security_socket_recvmsg+0x9b/0xc0 [ 398.347819] ? packet_mmap+0x630/0x630 [ 398.351715] sock_recvmsg+0xd0/0x110 [ 398.355429] ? __sock_recv_ts_and_drops+0x420/0x420 [ 398.360446] ___sys_recvmsg+0x2b6/0x680 [ 398.364434] ? ___sys_sendmsg+0x940/0x940 [ 398.368591] ? __sched_text_start+0x8/0x8 [ 398.372746] ? __fget_light+0x2ef/0x430 [ 398.376724] ? fget_raw+0x20/0x20 [ 398.380178] ? __sys_sendto+0x475/0x670 2018/05/15 10:16:49 executing program 3: syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @rand_addr, {[@timestamp={0xc0, 0x4}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) 2018/05/15 10:16:49 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) r2 = socket(0x2, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x8, r1, r3, 0x0) [ 398.384154] ? __ia32_sys_getpeername+0xb0/0xb0 [ 398.388819] ? fget_raw+0x20/0x20 [ 398.392282] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 398.397820] ? sockfd_lookup_light+0xc5/0x160 [ 398.402314] __sys_recvmsg+0x112/0x260 [ 398.406199] ? __ia32_sys_sendmmsg+0x100/0x100 [ 398.410780] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 398.416315] ? fput+0x130/0x1a0 [ 398.419600] ? exit_to_usermode_loop+0x87/0x310 [ 398.424270] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 398.429115] __x64_sys_recvmsg+0x78/0xb0 [ 398.433179] do_syscall_64+0x1b1/0x800 2018/05/15 10:16:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r2 = accept(r0, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000140)="a3", 0x1, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) sendmsg$nl_generic(r2, &(0x7f0000003800)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000037c0)={&(0x7f00000007c0)={0x14}, 0x14}, 0x1}, 0x0) sendmsg$netlink(r2, &(0x7f0000003700)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000003100)=[{&(0x7f0000000d00)={0x10}, 0x10}, {&(0x7f0000000380)={0x10, 0x3f, 0x104, 0x70bd2d, 0x25dfdbfb}, 0x10}], 0x2, &(0x7f0000004e80)=[@cred={0x20, 0x1, 0x2}, @rights={0x20, 0x1, 0x1, [r0, r3, r3]}, @cred={0x20, 0x1, 0x2}, @cred={0x20, 0x1, 0x2}, @rights={0x18, 0x1, 0x1, [r0, r3]}, @rights={0x38, 0x1, 0x1, [r3, r0, r2, r3, r0, r0, r3, r3, r3, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r2, r0, r3, r3]}, @cred={0x20, 0x1, 0x2}], 0x118, 0x24000000}, 0x80) [ 398.434889] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 398.437066] ? finish_task_switch+0x1ca/0x840 [ 398.437082] ? syscall_return_slowpath+0x5c0/0x5c0 [ 398.437098] ? syscall_return_slowpath+0x30f/0x5c0 [ 398.461552] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 398.466930] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 398.471796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.476983] RIP: 0033:0x455a09 [ 398.480171] RSP: 002b:00007fc19b576c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 398.487886] RAX: ffffffffffffffda RBX: 00007fc19b5776d4 RCX: 0000000000455a09 [ 398.495155] RDX: 0000000000002000 RSI: 0000000020000300 RDI: 0000000000000013 [ 398.502412] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 398.510276] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 398.517528] R13: 0000000000000549 R14: 00000000006fbf78 R15: 0000000000000000 [ 398.525270] Dumping ftrace buffer: [ 398.528789] (ftrace buffer empty) [ 398.532474] Kernel Offset: disabled [ 398.536078] Rebooting in 86400 seconds..