INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.28' (ECDSA) to the list of known hosts. 2018/04/10 11:05:19 fuzzer started 2018/04/10 11:05:20 dialing manager at 10.128.0.26:42067 2018/04/10 11:05:26 kcov=true, comps=false 2018/04/10 11:05:28 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e17, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) pread64(0xffffffffffffffff, &(0x7f0000000640)=""/56, 0x38, 0x0) 2018/04/10 11:05:28 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000d2af88)={0x2, 0x78, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000014000)='ramfs\x00', 0x0, &(0x7f0000000000)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f000001effd)='/', r0, &(0x7f0000d06ff8)='./file0\x00') chroot(&(0x7f0000157000)='./file0\x00') umount2(&(0x7f0000000140)='./file0/file0/file0/file0\x00', 0x0) renameat2(r0, &(0x7f0000000080)='./file0/file0/file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x0) 2018/04/10 11:05:28 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000000)=0x5, 0x4) syz_emit_ethernet(0x1, &(0x7f000010ef70)=ANY=[@ANYBLOB="cd390b081bf2ffffffffffff86dd6002290f00383a0000000000000000000000ffff00000000ff020000000000000000000000000001010090780000000060d5cae200003a0000000000000000000000000000000000ff020000000000000000000000000001f611929f106531aa"], 0x0) 2018/04/10 11:05:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/131) r0 = socket(0x2, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x0, @broadcast=0xffffffff}}, 0x0, 0x3, 0x0, "6164f5a787fb87b7fc664353e67f4f130350aae0d6d72a7a6b89c5930bd12c0058c4d94cafe792921af85a3b478181558f922ffb851e2f82591dfe02718138e0a07140ae09307d2603bc7522b40bb96a"}, 0xd8) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)="580000001400192340834b80040d8c5602062200010400000000000000005800004824ca944f64009400050028825a003b5fbe907902008000f0fffefffffe03edf8fef5dd00000010000100000c0900fcff4d00040e05a5", 0x58}], 0x1) 2018/04/10 11:05:28 executing program 4: 2018/04/10 11:05:28 executing program 3: 2018/04/10 11:05:28 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x4000000000000001) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev={0xac, 0x14, 0x14}, 0x4, 0x2b}, 0x0, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f0000000180)={0xa}, 0x1c) 2018/04/10 11:05:28 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000010aff6)='/dev/ptmx\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000000040)="000000037970652700000004000000070000204500000000", 0x18, 0x0) syzkaller login: [ 44.046095] ip (3743) used greatest stack depth: 54672 bytes left [ 45.113194] ip (3841) used greatest stack depth: 54200 bytes left [ 47.558327] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.870726] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.921191] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.948141] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.961360] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.993850] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.072882] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 48.081969] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 56.611469] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.724668] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.844942] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.869524] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.879795] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.033958] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.142144] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.165688] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 57.313896] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.320177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.333599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.474767] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.481120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.491867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.613195] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.619914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.629766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.651861] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.660775] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.682514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.720731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.752609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.789626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.838874] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.845277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.857273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.026702] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.034563] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 58.040836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.052168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 58.100590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 58.125658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/10 11:05:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x8a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x20000000004e20, @broadcast=0xffffffff}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000340)=""/131) r2 = socket(0x0, 0x0, 0x0) listen(r2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x0, @broadcast=0xffffffff}}, 0x0, 0x3, 0x0, "6164f5a787fb87b7fc664353e67f4f130350aae0d6d72a7a6b89c5930bd12c0058c4d94cafe792921af85a3b478181558f922ffb851e2f82591dfe02718138e0a07140ae09307d2603bc7522b40bb96a"}, 0xd8) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f0000000000), 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$EVIOCSFF(r4, 0x40304580, &(0x7f0000000480)=ANY=[@ANYBLOB]) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 2018/04/10 11:05:45 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e17, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 2018/04/10 11:05:45 executing program 3: 2018/04/10 11:05:45 executing program 7: 2018/04/10 11:05:46 executing program 3: 2018/04/10 11:05:46 executing program 7: 2018/04/10 11:05:46 executing program 4: 2018/04/10 11:05:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/131) r0 = socket(0x2, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x0, @broadcast=0xffffffff}}, 0x0, 0x3, 0x0, "6164f5a787fb87b7fc664353e67f4f130350aae0d6d72a7a6b89c5930bd12c0058c4d94cafe792921af85a3b478181558f922ffb851e2f82591dfe02718138e0a07140ae09307d2603bc7522b40bb96a"}, 0xd8) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)="580000001400192340834b80040d8c5602062200010400000000000000005800004824ca944f64009400050028825a003b5fbe907902008000f0fffefffffe03edf8fef5dd00000010000100000c0900fcff4d00040e05a5", 0x58}], 0x1) 2018/04/10 11:05:46 executing program 0: 2018/04/10 11:05:46 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r1, &(0x7f00000001c0)=ANY=[@ANYRES64, @ANYRES32=r1, @ANYRES16=r1, @ANYRES64=r0, @ANYRES16=r0], 0x18) fsync(r1) 2018/04/10 11:05:46 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x4000000000000001) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev={0xac, 0x14, 0x14}, 0x4, 0x2b}, 0x0, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f0000000180)={0xa}, 0x1c) 2018/04/10 11:05:46 executing program 1: clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mlockall(0x1) 2018/04/10 11:05:46 executing program 2: timer_create(0x3, &(0x7f0000000040)={0x0, 0x21, 0x0, @thr={&(0x7f00007e3ff8), &(0x7f0000c21000)}}, &(0x7f0000aef000)) seccomp(0x1, 0x0, &(0x7f00000004c0)={0x1, &(0x7f0000000000)=[{0x6}]}) memfd_create(&(0x7f0000000100)='securitymime_type*\x00', 0x0) timer_delete(0x0) 2018/04/10 11:05:46 executing program 3: 2018/04/10 11:05:46 executing program 7: 2018/04/10 11:05:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'lo\x00'}, 0x18) 2018/04/10 11:05:46 executing program 7: 2018/04/10 11:05:46 executing program 3: [ 59.676485] audit: type=1326 audit(1523358346.675:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5104 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455259 code=0x0 [ 60.524904] audit: type=1326 audit(1523358347.523:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5104 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455259 code=0x0 2018/04/10 11:05:47 executing program 0: mkdir(&(0x7f0000000000)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f", 0x0) rename(&(0x7f0000000080)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f", &(0x7f0000ab3ff0)='./file0\x00') 2018/04/10 11:05:47 executing program 4: 2018/04/10 11:05:47 executing program 5: 2018/04/10 11:05:47 executing program 6: 2018/04/10 11:05:47 executing program 7: 2018/04/10 11:05:47 executing program 3: 2018/04/10 11:05:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) 2018/04/10 11:05:47 executing program 2: timer_create(0x3, &(0x7f0000000040)={0x0, 0x21, 0x0, @thr={&(0x7f00007e3ff8), &(0x7f0000c21000)}}, &(0x7f0000aef000)) seccomp(0x1, 0x0, &(0x7f00000004c0)={0x1, &(0x7f0000000000)=[{0x6}]}) memfd_create(&(0x7f0000000100)='securitymime_type*\x00', 0x0) timer_delete(0x0) 2018/04/10 11:05:47 executing program 4: syz_mount_image$iso9660(&(0x7f00000009c0)='iso9660\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, &(0x7f0000001cc0), 0x0, &(0x7f0000001d40)={[{@map_off='map=off', 0x2c}]}) 2018/04/10 11:05:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) sendto$inet6(r0, &(0x7f0000eb9fff), 0xfffffd65, 0x20000004, &(0x7f000031e000)={0xa}, 0x1c) [ 60.866939] audit: type=1326 audit(1523358347.865:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5132 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455259 code=0x0 2018/04/10 11:05:47 executing program 7: 2018/04/10 11:05:47 executing program 3: 2018/04/10 11:05:47 executing program 5: 2018/04/10 11:05:48 executing program 0: 2018/04/10 11:05:48 executing program 7: 2018/04/10 11:05:48 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000480)='\\,!\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') sendfile(r0, r1, &(0x7f0000000000), 0x401) 2018/04/10 11:05:48 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x8a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000440)=0xffffffffffffffb6) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000340)=""/131) r2 = userfaultfd(0x80800) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000540)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}}) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)}], 0x1) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000480)=ANY=[]) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 2018/04/10 11:05:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000ea5000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000040)={0x0, 0x3, 0x400}) 2018/04/10 11:05:48 executing program 4: syz_mount_image$iso9660(&(0x7f00000009c0)='iso9660\x00', &(0x7f0000000a00)='./file0\x00', 0x0, 0x0, &(0x7f0000001cc0), 0x0, &(0x7f0000001d40)={[{@map_off='map=off', 0x2c}]}) 2018/04/10 11:05:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e17, 0x1, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) sendto$ax25(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000000)={0x3, {"21ed68dffba63f"}}, 0x10) 2018/04/10 11:05:48 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:48 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f000041bff4)) close(r1) [ 61.429875] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:05:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) 2018/04/10 11:05:48 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x2) r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000200)=0x54) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @rand_addr}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_pwait(r0, &(0x7f0000643fb8)=[{}], 0x1, 0xfffffffffffffffb, &(0x7f000006bff8), 0x8) setsockopt$inet_int(r1, 0x0, 0x8000000000007, &(0x7f0000000080)=0x9d9, 0x4) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000280)=ANY=[@ANYRES32=r0], 0x1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x800) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000100)) shutdown(r1, 0x0) 2018/04/10 11:05:48 executing program 0: unshare(0x400) r0 = socket$inet6(0xa, 0x80002, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x140000000000b, &(0x7f0000000080), 0x37aa) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000040)={0x1, @random="19368c883344"}) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000200)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) socketpair$inet(0x2, 0x7, 0x7, &(0x7f00000001c0)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000180)=ANY=[@ANYRES32=r0, @ANYBLOB="02cc0000d4093075352aff863cf75b35d9f6537077ec6fa9213a0279a16fec0800d086476b05e0fe0d16d9ae8e088d6b73694277edccd29758a66f73"]) 2018/04/10 11:05:48 executing program 4: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x102) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f00001d9000/0x4000)=nil, 0x4000}) madvise(&(0x7f0000409000/0x3000)=nil, 0x3000, 0xe) 2018/04/10 11:05:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00009f2000)={&(0x7f000007cff4)={0x10}, 0xc, &(0x7f00000012c0)={&(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="5a3fc71dcb23e0bd4c7e15a75e3aac8c101ae67df065b5509f321dde008456dbb18e0cc8536406951fc5c5080b0e8b7809d6892ddf0f4573"]], 0x1}, 0x1}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x8, 0x10000) getsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000180)=""/211) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040)={0x8000, 0x10000, 0x6, 0x8}, 0x8) 2018/04/10 11:05:48 executing program 6: perf_event_open(&(0x7f000001d000)={0x2, 0x8a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000440)=0xffffffffffffffb6) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000340)=""/131) r2 = userfaultfd(0x80800) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000540)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}}) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)}], 0x1) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000480)=ANY=[]) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 2018/04/10 11:05:48 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:48 executing program 2: r0 = socket$inet(0x2, 0x803, 0x81) setsockopt$IPT_SO_SET_REPLACE(r0, 0x100000000000001, 0x25, &(0x7f0000000600)=ANY=[@ANYBLOB="3b834ae9d832e75eedb03810137b45deba78654157cf5f9db93ca6db21d6ee627f96654e9b007df8669568736db03f0b882535b64d84e5a7f10f0e570c25a347347896880270adee0d9107b243a3946f66d4bef599c96c0f59ca18ce7cc5dc562e720789b08884f582697c8065452868e1cb5c836302aa0d95c393b7b5d4c91e5c4cc4984db26978f30501eec8b95bb4123dfba27707c94421f8c41b18ac4be3cfe7c352ab8b89acc39685acffaa974ee4c6f3c55488648b29500903b23abab00b8681810c5de821e7cd69cc0a23145eab16", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES32, @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES32=r0, @ANYPTR64, @ANYRES16=r0, @ANYPTR64], @ANYRES16=r0, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYPTR, @ANYRES16=r0, @ANYPTR64, @ANYRES16=r0], @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES16=r0, @ANYPTR]], @ANYRES32, @ANYRES32], 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f00000005c0)=0xc857, 0x4) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10, &(0x7f00000000c0), 0x0, &(0x7f0000002f00)}, 0x0) recvmsg(r0, &(0x7f0000000580)={&(0x7f0000000040)=@generic, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=""/174, 0xae}, 0x2102) [ 61.826957] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:05:48 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) tgkill(r0, r1, 0x20) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x801, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0x40085112, &(0x7f0000b18000)={{0xffffff93, 0xfffffffffffffffc}, {0xffffff90}}) 2018/04/10 11:05:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000c87ff6)='numa_maps\x00') accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000140)=0x5) sendfile(r2, r1, &(0x7f000013bffc), 0x100) 2018/04/10 11:05:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x20000, 0x1a8) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/prouocols\x00') connect$rds(r1, &(0x7f00000000c0)={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) fcntl$setown(r1, 0x8, r2) readv(r1, &(0x7f0000001740)=[{&(0x7f00000002c0)=""/175, 0xfffffffffffffe82}, {&(0x7f0000000000)=""/133, 0x85}, {&(0x7f0000000540)=""/4096, 0x1000}], 0x3) 2018/04/10 11:05:48 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000006600)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) accept$packet(r1, &(0x7f0000006640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000006680)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={"73797a6c82756e00"}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000000)={0xfffffffffffff540, 0x0, 0x10001, 0x7fffffff}) linkat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x1000) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000040)={0x7fffffff, r2}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000140)=0x0) capget(&(0x7f0000000180)={0x200f1526, r3}, &(0x7f00000001c0)={0x78, 0x1000, 0x3, 0xf79, 0x7, 0x200}) 2018/04/10 11:05:48 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f000042cff4)='io\x00') lseek(r0, 0x0, 0x1) open$dir(&(0x7f0000e8b000)='./file0\x00', 0x80, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) 2018/04/10 11:05:49 executing program 0: setrlimit(0x7, &(0x7f0000000000)={0x14, 0x88}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000740), &(0x7f0000000780)=0x4) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000800)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e0000000400000090040000ffffffff180100001002000018010000fffffffffffffffff8030000f8030000f8030000ffffffff04000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b80018010000000000000000000000000000000000000000000000002000736f636b6574000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000006000000b900000001000000010000800400000000100000020000000066070001000000f9aafe3e0300000001000000200000000700000000040000c1a30500ac141416000000000000000000000000726f736530000000000000000000000065727370616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002d00000100000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000534554000000000000000000000000000000000000000000000000000000060000000200000002000000faffffff05000000070000000900000006000500060000000500000000100000ba0000007beb000000000100ffff00000301ffffac1414aaac141411000000ffffffffff6c6f0000000000000000000000000000726f736530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0003200000000000000000000000000000c000e80100000000000000000000000000000000000000000000000028007463706d7373000000000000000000000000000000000000000000000000080080090000000028015345434d41524b000000000000000000000000000000000000000000000001000000ff0f000073797374656d5f753a6f626a6563745f723a68616c645f6463636d5f657865635f743a7330000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x4f0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000080)=0x6f5) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000007c0)={0x1, 'ifb0\x00', 0x1}, 0x18) select(0x40, &(0x7f0000000640)={0x8, 0x100000000, 0x0, 0x4, 0x3, 0x8, 0x6, 0x3}, &(0x7f0000000680)={0x800, 0x101, 0xffffffff, 0x3, 0x4, 0x8, 0x59d, 0xfffffffffffffffb}, &(0x7f00000006c0)={0x40, 0x1c66, 0x7, 0x1, 0x400, 0x6, 0xb6a, 0x5}, &(0x7f0000000700)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x2, 0x6, 0x2, 0xff, 0xfffffffffffffff9, 0x2000004, 0x6, 0x0, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r2, 0x0, 0x6, 0x5, 0x424, 0x3ff}, &(0x7f0000000180)=0x14) [ 62.089421] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:05:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f00003c0fdc)=ANY=[@ANYBLOB="240000000001010000000000ffffffff2200000010000200f0ff00000500e4d7e0060000"], 0x24}, 0x1}, 0x0) [ 62.287858] netlink: 12 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/10 11:05:49 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/igmp6\x00') lseek(r1, 0x17, 0x0) 2018/04/10 11:05:49 executing program 6: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000000)="f929e60db8967c88361d6ae29ad4af72addc206fe9fd241b8d1493a759b420b128ffd02be30dc87ec7a1e98c4eb995f33ae7bd4bb4cb891a2eedbe6daa") r1 = memfd_create(&(0x7f0000000080)="1f84", 0x0) write(r1, &(0x7f0000002000)='\t', 0x1) execveat(r1, &(0x7f0000006000)='./file0\x00', &(0x7f00000f9000), &(0x7f0000006000)=[&(0x7f0000001000)='-@cpuset[md5sum[\x00'], 0x1000) socket$inet(0x2, 0x1, 0xffffffff) connect$netrom(r1, &(0x7f00000000c0)=@full={{0x3, {"f8e6e3e42babc7"}, 0x8000}, [{"e426e0c787fdfd"}, {'_^?}Tk>'}, {"9b23375de0a4ee"}, {"57dd608269a0e1"}, {"409247b8799e79"}, {"54cd0ae1263a08"}, {"8cf64c10990d06"}, {"a4c16a284fdddf"}]}, 0x48) 2018/04/10 11:05:49 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000c87ff6)='numa_maps\x00') accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x60) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000140)=0x5) sendfile(r2, r1, &(0x7f000013bffc), 0x100) 2018/04/10 11:05:49 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x20) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000000c0)=0x1, &(0x7f0000000100)=0x4) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x4001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080)) dup2(r0, r1) 2018/04/10 11:05:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="200001e811e20300010094eb66286799b9000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}, 0x1}, 0x0) 2018/04/10 11:05:49 executing program 2: r0 = socket$inet6(0xa, 0x80803, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x4}, {0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x1}, 0x0, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x2f) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) 2018/04/10 11:05:49 executing program 5: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) setns(r0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000d97000)={0x0, 0x1000080200005d, 0x80}) 2018/04/10 11:05:50 executing program 3: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000000)}, 0x0) close(r1) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000180)) recvmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000240)=@ipx, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)=""/107, 0x6b}], 0x1, &(0x7f0000000100)=""/89, 0x59}, 0x0) [ 62.957072] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:05:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x1, 0x7f, 0xc, 0x10}, 0x2c) unshare(0x28060400) r1 = dup2(r0, r0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000000c0)={@rc={0x1f, {0x7fff, 0x20, 0x2, 0xfff, 0x8001, 0xfff}, 0x7}, {&(0x7f0000000000)=""/1, 0x1}, &(0x7f0000000080), 0x1c}, 0xa0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000394000)={r0, &(0x7f00002d0000), &(0x7f00000a8fe5)=""/27}, 0x18) 2018/04/10 11:05:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/protocols\x00') ioctl$TIOCSCTTY(r0, 0x540e, 0x9) r1 = accept4$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @reserved=0x1}, 0x10, 0x800) rename(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file0\x00') r2 = getgid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r2, r3) fcntl$setpipe(r0, 0x407, 0x9) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)=""/71, 0x47}], 0x1, 0x7ffffffffffffffb) 2018/04/10 11:05:50 executing program 5: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) setns(r0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000d97000)={0x0, 0x1000080200005d, 0x80}) 2018/04/10 11:05:50 executing program 1: mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x440000007, &(0x7f0000ffc000/0x4000)=nil) 2018/04/10 11:05:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000000)={0xa0000, 0x0, 0x4, 0x0, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000180)={r2, 0x3f}, &(0x7f00000001c0)=0x8) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000013000501000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000000000000c012b00080001004b97e19e6e569548f41a4d7c0000000000000007acf6ba3bde0b0dc698e580912e1a81485060da63a6069db73d5667241ab1ac312fa272aa9eed37082b40c7e5e87cb98a22cf9d44448ca2f72b923554a83e695cd3f148528ed4ed9561"], 0x2c}, 0x1}, 0x0) 2018/04/10 11:05:50 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:50 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x20) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000000c0)=0x1, &(0x7f0000000100)=0x4) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x4001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080)) dup2(r0, r1) 2018/04/10 11:05:50 executing program 6: r0 = socket$inet6(0xa, 0x5, 0x0) sendto$inet6(r0, &(0x7f0000ff7000)="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", 0x76d, 0x0, &(0x7f0000ff7fe4)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x2}, 0x1c) r1 = open(&(0x7f0000000000)='./file0\x00', 0x408000, 0x2) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)=0x3) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={r2, 0x81}, 0x8) setsockopt$sock_int(r0, 0x1, 0x40000000000007, &(0x7f0000fecffc), 0x4) poll(&(0x7f0000f7bfc0)=[{r0}], 0x1, 0x0) 2018/04/10 11:05:50 executing program 3: syz_emit_ethernet(0x56, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@canfd={0xd, {{0x1, 0x3e, 0x40, 0x5}, 0x31, 0x3, 0x0, 0x0, "aa7c27b371f40af339e661b5c73bda8e0e708a6de31db860ce799ce92b9bd78d756367498fb8da735eb8a7844d065da7dc407e72f16cce7e66b9baf2ee272041"}}}}, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000180)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@canfd={0xd, {{0x2, 0xffffffffffffffc1, 0x0, 0x800}, 0x6, 0x0, 0x0, 0x0, "f4e28752d10e04926a641a7efa164ff11cf5040aaf360917f1df149f411a4dc4e21d3e03e9519957ed1892e58b014e909bcc5ed92e3fc660bfa6bd35566ea4c2"}}}}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req={0xcd3, 0xff69, 0x7, 0x4}, 0x10) r2 = memfd_create(&(0x7f0000000080)="7d6b657972696e6723776c616e3128232db900", 0x1) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f00000000c0)=""/38) 2018/04/10 11:05:50 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ef0fe4)={0x5, 0x1, 0x2, 0x200000000000000c}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x200, 0x4, 0x101000001, 0x0, r0}, 0x2c) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f00000000c0)={r2, &(0x7f0000000080)=""/61}) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'trusted.', 'eth1}\x00'}) 2018/04/10 11:05:50 executing program 4: unshare(0x28060400) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x7, 0x14, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x6}, @map={0x18, 0xf, 0x1}, @generic={0x1f, 0x1, 0x944a, 0x6}, @generic={0x80000000, 0xff, 0x7ff, 0x5}, @map={0x18, 0x3, 0x1, 0x0, 0xffffffffffffff9c}, @jmp={0x5, 0x8ad2, 0x8, 0x7, 0x9, 0x100, 0xfffffffffffffff1}, @alu={0x0, 0x0, 0x79b2dd2ca654e1a8, 0xf, 0xa, 0x0, 0xfffffffffffffff0}, @exit={0x95}, @map={0x18, 0xa, 0x1, 0x0, 0x1}, @exit={0x95}], &(0x7f0000000100)='GPL\x00', 0x3, 0xc9, &(0x7f0000000140)=""/201, 0x41100, 0x1}, 0x48) r1 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x40, 0x2) getsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000340)=""/191, &(0x7f0000000400)=0x61) finit_module(r0, &(0x7f00000002c0)='md5sumOcpuset\x00', 0x3) setsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000440)=0xfffffffffffffffd, 0x4) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000864ff6)='ns/pid\x00') setns(r2, 0x0) 2018/04/10 11:05:50 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00007de000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x3bb) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000000)={0x3, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x108) getgid() [ 63.391634] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 63.427755] netlink: 12 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/10 11:05:50 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0xa0100, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000100)={0x8000, 0xfff, 0x3, 0x40}, 0x6) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000140)='./file0\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x1001, 0x674) io_setup(0x2, &(0x7f0000000040)) [ 63.470992] netlink: 12 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/10 11:05:50 executing program 4: unshare(0x28060400) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x7, 0x14, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x6}, @map={0x18, 0xf, 0x1}, @generic={0x1f, 0x1, 0x944a, 0x6}, @generic={0x80000000, 0xff, 0x7ff, 0x5}, @map={0x18, 0x3, 0x1, 0x0, 0xffffffffffffff9c}, @jmp={0x5, 0x8ad2, 0x8, 0x7, 0x9, 0x100, 0xfffffffffffffff1}, @alu={0x0, 0x0, 0x79b2dd2ca654e1a8, 0xf, 0xa, 0x0, 0xfffffffffffffff0}, @exit={0x95}, @map={0x18, 0xa, 0x1, 0x0, 0x1}, @exit={0x95}], &(0x7f0000000100)='GPL\x00', 0x3, 0xc9, &(0x7f0000000140)=""/201, 0x41100, 0x1}, 0x48) r1 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x40, 0x2) getsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000340)=""/191, &(0x7f0000000400)=0x61) finit_module(r0, &(0x7f00000002c0)='md5sumOcpuset\x00', 0x3) setsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000440)=0xfffffffffffffffd, 0x4) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000864ff6)='ns/pid\x00') setns(r2, 0x0) 2018/04/10 11:05:50 executing program 0: statx(0xffffffffffffffff, &(0x7f0000000000)='/', 0x0, 0x1, &(0x7f0000000080)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4400, 0x0) futimesat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}}) setsockopt$inet_group_source_req(r0, 0x0, 0x0, &(0x7f0000000200)={0x81, {{0x2, 0x4e20, @multicast2=0xe0000002}}, {{0x2, 0x4e24, @rand_addr=0xfffffffffffffff9}}}, 0x108) 2018/04/10 11:05:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xbd85, 0x0, 0x0, 0x0, 0x3}) r1 = syz_open_pts(r0, 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = memfd_create(&(0x7f0000000040)='/dev/ptmx\x00', 0x1) sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e24, @rand_addr=0x80000000}, 0x4, 0x0, 0x2, 0x4}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000500)="b70510cac23e299a059697f081fb397d400c6435eac75d0fe4dfa16ce931f889f28bb63caf55b9ce6718a405430735ed859b5da5bc96315904f8432120df0fd9b0a762e811d993d1de3d3c255c560d607ab1df8bd80792e8dc9a7773128fb975dfb5d15c6ed7a524be512ea0ad1bea0bd60a748d610fc60a6fe63bb564556f323f6d5aac", 0x84}, {&(0x7f0000000080)="4248158ee5201f847829f771af", 0xd}, {&(0x7f00000005c0)="f8fdb76353eac9be855b5f6be44cb06bf665ce6746ee150cf26b7ba7e0301a3923e11563c201fd1d27d887d161381282a980ead07884c7881cc963a54365c3262c1eaa2de579a4d98624870976e01d0730f64371888d1c7155015e70bb530d0c94a2cc35d79a7891ea89d6afaa3e36967b70ce821e4a9f840a45f2064565972a920a0acbe72dc3baa10177571645aadf0d2b5eac7bceec4a1a69d5c47efeaa8e266a9a43b602cf94583604", 0xab}], 0x3, &(0x7f0000000680)=[{0x50, 0x11f, 0x416, "4bdabc40f5cb34d12f932f628cb8562eca2fb0de47d88cb142c52b7f181cde0156a9f2a94197618823e0e647d8c52d876563698998d1023f592e83570cfa"}, {0x80, 0x13f, 0x1, "3cc65999090925ea5ef82bf5741b49355981785c92719018308310b654b1caa0d532c42c57e3c918b73d6ecde84be658a58ed41754c1e458709aa32e20ce397adeb90d1f664b22324a70da117feb19462043dcb4522ed8dc830a4a80a08e3fb9a765056b787af96d6184238d"}, {0xf0, 0x119, 0x0, "133659be63e39095b8afdc39077058cb88d0227ad812a9c8c2cc26fd3167f992da564cb9c6764449ad5065de9e6db6b20db5ba5ab37db91ebd0669bffa816e4ff3e8601d9f4b15a63ce1090e18e6dbfb61cbc2b08e68e0cdc4ba63b4f70ded2bb82e1d2bf623080ba7953d06feac77a9af058e66e81b355e608b2d22fa9ae39dc94560790d9231bca1dc4e2e0494f90c130ca69a574e28671b4cc79e602bf1e6bf62d10abaaee9fbfe06b6ef5001b730e146d1302ba06088d4146293d3f26153b0546da2c43d1b8b54b2511ce2599dd7723e91ba28a649c5ab2931"}], 0x1c0, 0x24000004}, 0x4000000) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup\x00', 0x200002, 0x0) sync_file_range(r4, 0x0, 0x4, 0x4) preadv(r4, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/21, 0x15}], 0x1, 0x0) fchdir(r4) mkdir(&(0x7f0000000180)='./file0\x00', 0x104) splice(r4, &(0x7f0000000400), 0xffffffffffffffff, &(0x7f0000000440), 0x9, 0x2) rename(&(0x7f0000001e00)='./file0\x00', &(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f") mkdir(&(0x7f000000e000)='./control\x00', 0x0) r5 = open(&(0x7f0000000000)='./control\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x80}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000380)={r6, 0x5}, &(0x7f00000003c0)=0x8) mknodat(r5, &(0x7f000003f000)='./control\x00', 0x1, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f00000000c0)={0x4, 0x78378d6f, 0x7ff, 0x80000001, 0x8, 0x9, 0x2, 0xffffffffffffffff, 0x0, 0x3, 0x80000001, 0x4}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/10 11:05:50 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:50 executing program 2: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = userfaultfd(0x0) socketpair(0x0, 0xf, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000001c0)={0x12, 0x77, &(0x7f0000000140)="e7d593e53ca5e840aa19d0b1e80682e0391934f35e2d66dd50061179f4407b54dec9d2034f67d925d43c4573c0f50bdf9d1498aa40f212fb408903311d0c7339b71dbaca8dc3cc0f43b25b098cdc49bfa27e8933d0e32fb9df224bd7229f6b0878f99298bd1de734d21f430055f04b3eef658c299e6b18"}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) write(r2, &(0x7f0000000140), 0x0) mount(&(0x7f0000000280)='./control/file0\x00', &(0x7f00000002c0)='./control\x00', &(0x7f0000000240)='ext4\x00', 0x0, &(0x7f0000000300)="afa4a4f7066cb0d296bc2cdf0eab715b3ca3f1514da0cd0433eceef9c4675c45916eb07fed9b27f6eb9563a82a130d8b64e9f2fab4277ef3d08c4e05e43be5a3ce6fab6de6dd5e10a12500ab4aea2a1809db0f8d9803ea1d337c708060d745c309c0ad4cd359467836f535e99af1751e18d4e7567d0c76bf0b8117f7c4") unlink(&(0x7f00000000c0)='./control/file0\x00') accept$packet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000200)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000380)={'ip6_vti0\x00', r3}) setsockopt$inet6_int(r1, 0x29, 0xff, &(0x7f0000000040)=0x6, 0x4) close(r0) [ 63.669111] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:05:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14}}, 0xc) socket$nl_generic(0x10, 0x3, 0x10) r1 = open(&(0x7f0000001480)='./file0\x00', 0x501000, 0x80) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000014c0), &(0x7f0000001500)=0x4) r2 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') readv(r2, &(0x7f0000f46000)=[{&(0x7f0000120000)=""/4096, 0xf8d}], 0x1) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000080)=""/151, 0x97}], 0x1) 2018/04/10 11:05:50 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x70, 0xc00) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) write$sndseq(r0, &(0x7f0000eeafd7)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @result}], 0x30) 2018/04/10 11:05:50 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xbd85, 0x0, 0x0, 0x0, 0x3}) r1 = syz_open_pts(r0, 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = memfd_create(&(0x7f0000000040)='/dev/ptmx\x00', 0x1) sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e24, @rand_addr=0x80000000}, 0x4, 0x0, 0x2, 0x4}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000500)="b70510cac23e299a059697f081fb397d400c6435eac75d0fe4dfa16ce931f889f28bb63caf55b9ce6718a405430735ed859b5da5bc96315904f8432120df0fd9b0a762e811d993d1de3d3c255c560d607ab1df8bd80792e8dc9a7773128fb975dfb5d15c6ed7a524be512ea0ad1bea0bd60a748d610fc60a6fe63bb564556f323f6d5aac", 0x84}, {&(0x7f0000000080)="4248158ee5201f847829f771af", 0xd}, {&(0x7f00000005c0)="f8fdb76353eac9be855b5f6be44cb06bf665ce6746ee150cf26b7ba7e0301a3923e11563c201fd1d27d887d161381282a980ead07884c7881cc963a54365c3262c1eaa2de579a4d98624870976e01d0730f64371888d1c7155015e70bb530d0c94a2cc35d79a7891ea89d6afaa3e36967b70ce821e4a9f840a45f2064565972a920a0acbe72dc3baa10177571645aadf0d2b5eac7bceec4a1a69d5c47efeaa8e266a9a43b602cf94583604", 0xab}], 0x3, &(0x7f0000000680)=[{0x50, 0x11f, 0x416, "4bdabc40f5cb34d12f932f628cb8562eca2fb0de47d88cb142c52b7f181cde0156a9f2a94197618823e0e647d8c52d876563698998d1023f592e83570cfa"}, {0x80, 0x13f, 0x1, "3cc65999090925ea5ef82bf5741b49355981785c92719018308310b654b1caa0d532c42c57e3c918b73d6ecde84be658a58ed41754c1e458709aa32e20ce397adeb90d1f664b22324a70da117feb19462043dcb4522ed8dc830a4a80a08e3fb9a765056b787af96d6184238d"}, {0xf0, 0x119, 0x0, "133659be63e39095b8afdc39077058cb88d0227ad812a9c8c2cc26fd3167f992da564cb9c6764449ad5065de9e6db6b20db5ba5ab37db91ebd0669bffa816e4ff3e8601d9f4b15a63ce1090e18e6dbfb61cbc2b08e68e0cdc4ba63b4f70ded2bb82e1d2bf623080ba7953d06feac77a9af058e66e81b355e608b2d22fa9ae39dc94560790d9231bca1dc4e2e0494f90c130ca69a574e28671b4cc79e602bf1e6bf62d10abaaee9fbfe06b6ef5001b730e146d1302ba06088d4146293d3f26153b0546da2c43d1b8b54b2511ce2599dd7723e91ba28a649c5ab2931"}], 0x1c0, 0x24000004}, 0x4000000) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup\x00', 0x200002, 0x0) sync_file_range(r4, 0x0, 0x4, 0x4) preadv(r4, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/21, 0x15}], 0x1, 0x0) fchdir(r4) mkdir(&(0x7f0000000180)='./file0\x00', 0x104) splice(r4, &(0x7f0000000400), 0xffffffffffffffff, &(0x7f0000000440), 0x9, 0x2) rename(&(0x7f0000001e00)='./file0\x00', &(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f") mkdir(&(0x7f000000e000)='./control\x00', 0x0) r5 = open(&(0x7f0000000000)='./control\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x80}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000380)={r6, 0x5}, &(0x7f00000003c0)=0x8) mknodat(r5, &(0x7f000003f000)='./control\x00', 0x1, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f00000000c0)={0x4, 0x78378d6f, 0x7ff, 0x80000001, 0x8, 0x9, 0x2, 0xffffffffffffffff, 0x0, 0x3, 0x80000001, 0x4}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 63.823954] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 63.970152] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:05:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xbd85, 0x0, 0x0, 0x0, 0x3}) r1 = syz_open_pts(r0, 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = memfd_create(&(0x7f0000000040)='/dev/ptmx\x00', 0x1) sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e24, @rand_addr=0x80000000}, 0x4, 0x0, 0x2, 0x4}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000500)="b70510cac23e299a059697f081fb397d400c6435eac75d0fe4dfa16ce931f889f28bb63caf55b9ce6718a405430735ed859b5da5bc96315904f8432120df0fd9b0a762e811d993d1de3d3c255c560d607ab1df8bd80792e8dc9a7773128fb975dfb5d15c6ed7a524be512ea0ad1bea0bd60a748d610fc60a6fe63bb564556f323f6d5aac", 0x84}, {&(0x7f0000000080)="4248158ee5201f847829f771af", 0xd}, {&(0x7f00000005c0)="f8fdb76353eac9be855b5f6be44cb06bf665ce6746ee150cf26b7ba7e0301a3923e11563c201fd1d27d887d161381282a980ead07884c7881cc963a54365c3262c1eaa2de579a4d98624870976e01d0730f64371888d1c7155015e70bb530d0c94a2cc35d79a7891ea89d6afaa3e36967b70ce821e4a9f840a45f2064565972a920a0acbe72dc3baa10177571645aadf0d2b5eac7bceec4a1a69d5c47efeaa8e266a9a43b602cf94583604", 0xab}], 0x3, &(0x7f0000000680)=[{0x50, 0x11f, 0x416, "4bdabc40f5cb34d12f932f628cb8562eca2fb0de47d88cb142c52b7f181cde0156a9f2a94197618823e0e647d8c52d876563698998d1023f592e83570cfa"}, {0x80, 0x13f, 0x1, "3cc65999090925ea5ef82bf5741b49355981785c92719018308310b654b1caa0d532c42c57e3c918b73d6ecde84be658a58ed41754c1e458709aa32e20ce397adeb90d1f664b22324a70da117feb19462043dcb4522ed8dc830a4a80a08e3fb9a765056b787af96d6184238d"}, {0xf0, 0x119, 0x0, "133659be63e39095b8afdc39077058cb88d0227ad812a9c8c2cc26fd3167f992da564cb9c6764449ad5065de9e6db6b20db5ba5ab37db91ebd0669bffa816e4ff3e8601d9f4b15a63ce1090e18e6dbfb61cbc2b08e68e0cdc4ba63b4f70ded2bb82e1d2bf623080ba7953d06feac77a9af058e66e81b355e608b2d22fa9ae39dc94560790d9231bca1dc4e2e0494f90c130ca69a574e28671b4cc79e602bf1e6bf62d10abaaee9fbfe06b6ef5001b730e146d1302ba06088d4146293d3f26153b0546da2c43d1b8b54b2511ce2599dd7723e91ba28a649c5ab2931"}], 0x1c0, 0x24000004}, 0x4000000) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup\x00', 0x200002, 0x0) sync_file_range(r4, 0x0, 0x4, 0x4) preadv(r4, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/21, 0x15}], 0x1, 0x0) fchdir(r4) mkdir(&(0x7f0000000180)='./file0\x00', 0x104) splice(r4, &(0x7f0000000400), 0xffffffffffffffff, &(0x7f0000000440), 0x9, 0x2) rename(&(0x7f0000001e00)='./file0\x00', &(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f") mkdir(&(0x7f000000e000)='./control\x00', 0x0) r5 = open(&(0x7f0000000000)='./control\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x80}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000380)={r6, 0x5}, &(0x7f00000003c0)=0x8) mknodat(r5, &(0x7f000003f000)='./control\x00', 0x1, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f00000000c0)={0x4, 0x78378d6f, 0x7ff, 0x80000001, 0x8, 0x9, 0x2, 0xffffffffffffffff, 0x0, 0x3, 0x80000001, 0x4}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/10 11:05:51 executing program 6: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) migrate_pages(r1, 0x3, &(0x7f0000000080)=0x7fff, &(0x7f00000000c0)) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000040)=""/8, 0x8}, {&(0x7f0000000080)}, {&(0x7f0000000380)=""/133, 0x85}], 0x3) 2018/04/10 11:05:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xbd85, 0x0, 0x0, 0x0, 0x3}) r1 = syz_open_pts(r0, 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = memfd_create(&(0x7f0000000040)='/dev/ptmx\x00', 0x1) sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e24, @rand_addr=0x80000000}, 0x4, 0x0, 0x2, 0x4}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000500)="b70510cac23e299a059697f081fb397d400c6435eac75d0fe4dfa16ce931f889f28bb63caf55b9ce6718a405430735ed859b5da5bc96315904f8432120df0fd9b0a762e811d993d1de3d3c255c560d607ab1df8bd80792e8dc9a7773128fb975dfb5d15c6ed7a524be512ea0ad1bea0bd60a748d610fc60a6fe63bb564556f323f6d5aac", 0x84}, {&(0x7f0000000080)="4248158ee5201f847829f771af", 0xd}, {&(0x7f00000005c0)="f8fdb76353eac9be855b5f6be44cb06bf665ce6746ee150cf26b7ba7e0301a3923e11563c201fd1d27d887d161381282a980ead07884c7881cc963a54365c3262c1eaa2de579a4d98624870976e01d0730f64371888d1c7155015e70bb530d0c94a2cc35d79a7891ea89d6afaa3e36967b70ce821e4a9f840a45f2064565972a920a0acbe72dc3baa10177571645aadf0d2b5eac7bceec4a1a69d5c47efeaa8e266a9a43b602cf94583604", 0xab}], 0x3, &(0x7f0000000680)=[{0x50, 0x11f, 0x416, "4bdabc40f5cb34d12f932f628cb8562eca2fb0de47d88cb142c52b7f181cde0156a9f2a94197618823e0e647d8c52d876563698998d1023f592e83570cfa"}, {0x80, 0x13f, 0x1, "3cc65999090925ea5ef82bf5741b49355981785c92719018308310b654b1caa0d532c42c57e3c918b73d6ecde84be658a58ed41754c1e458709aa32e20ce397adeb90d1f664b22324a70da117feb19462043dcb4522ed8dc830a4a80a08e3fb9a765056b787af96d6184238d"}, {0xf0, 0x119, 0x0, "133659be63e39095b8afdc39077058cb88d0227ad812a9c8c2cc26fd3167f992da564cb9c6764449ad5065de9e6db6b20db5ba5ab37db91ebd0669bffa816e4ff3e8601d9f4b15a63ce1090e18e6dbfb61cbc2b08e68e0cdc4ba63b4f70ded2bb82e1d2bf623080ba7953d06feac77a9af058e66e81b355e608b2d22fa9ae39dc94560790d9231bca1dc4e2e0494f90c130ca69a574e28671b4cc79e602bf1e6bf62d10abaaee9fbfe06b6ef5001b730e146d1302ba06088d4146293d3f26153b0546da2c43d1b8b54b2511ce2599dd7723e91ba28a649c5ab2931"}], 0x1c0, 0x24000004}, 0x4000000) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup\x00', 0x200002, 0x0) sync_file_range(r4, 0x0, 0x4, 0x4) preadv(r4, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/21, 0x15}], 0x1, 0x0) fchdir(r4) mkdir(&(0x7f0000000180)='./file0\x00', 0x104) splice(r4, &(0x7f0000000400), 0xffffffffffffffff, &(0x7f0000000440), 0x9, 0x2) rename(&(0x7f0000001e00)='./file0\x00', &(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f") mkdir(&(0x7f000000e000)='./control\x00', 0x0) r5 = open(&(0x7f0000000000)='./control\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x80}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000380)={r6, 0x5}, &(0x7f00000003c0)=0x8) mknodat(r5, &(0x7f000003f000)='./control\x00', 0x1, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f00000000c0)={0x4, 0x78378d6f, 0x7ff, 0x80000001, 0x8, 0x9, 0x2, 0xffffffffffffffff, 0x0, 0x3, 0x80000001, 0x4}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/10 11:05:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xbd85, 0x0, 0x0, 0x0, 0x3}) r1 = syz_open_pts(r0, 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = memfd_create(&(0x7f0000000040)='/dev/ptmx\x00', 0x1) sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e24, @rand_addr=0x80000000}, 0x4, 0x0, 0x2, 0x4}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000500)="b70510cac23e299a059697f081fb397d400c6435eac75d0fe4dfa16ce931f889f28bb63caf55b9ce6718a405430735ed859b5da5bc96315904f8432120df0fd9b0a762e811d993d1de3d3c255c560d607ab1df8bd80792e8dc9a7773128fb975dfb5d15c6ed7a524be512ea0ad1bea0bd60a748d610fc60a6fe63bb564556f323f6d5aac", 0x84}, {&(0x7f0000000080)="4248158ee5201f847829f771af", 0xd}, {&(0x7f00000005c0)="f8fdb76353eac9be855b5f6be44cb06bf665ce6746ee150cf26b7ba7e0301a3923e11563c201fd1d27d887d161381282a980ead07884c7881cc963a54365c3262c1eaa2de579a4d98624870976e01d0730f64371888d1c7155015e70bb530d0c94a2cc35d79a7891ea89d6afaa3e36967b70ce821e4a9f840a45f2064565972a920a0acbe72dc3baa10177571645aadf0d2b5eac7bceec4a1a69d5c47efeaa8e266a9a43b602cf94583604", 0xab}], 0x3, &(0x7f0000000680)=[{0x50, 0x11f, 0x416, "4bdabc40f5cb34d12f932f628cb8562eca2fb0de47d88cb142c52b7f181cde0156a9f2a94197618823e0e647d8c52d876563698998d1023f592e83570cfa"}, {0x80, 0x13f, 0x1, "3cc65999090925ea5ef82bf5741b49355981785c92719018308310b654b1caa0d532c42c57e3c918b73d6ecde84be658a58ed41754c1e458709aa32e20ce397adeb90d1f664b22324a70da117feb19462043dcb4522ed8dc830a4a80a08e3fb9a765056b787af96d6184238d"}, {0xf0, 0x119, 0x0, "133659be63e39095b8afdc39077058cb88d0227ad812a9c8c2cc26fd3167f992da564cb9c6764449ad5065de9e6db6b20db5ba5ab37db91ebd0669bffa816e4ff3e8601d9f4b15a63ce1090e18e6dbfb61cbc2b08e68e0cdc4ba63b4f70ded2bb82e1d2bf623080ba7953d06feac77a9af058e66e81b355e608b2d22fa9ae39dc94560790d9231bca1dc4e2e0494f90c130ca69a574e28671b4cc79e602bf1e6bf62d10abaaee9fbfe06b6ef5001b730e146d1302ba06088d4146293d3f26153b0546da2c43d1b8b54b2511ce2599dd7723e91ba28a649c5ab2931"}], 0x1c0, 0x24000004}, 0x4000000) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup\x00', 0x200002, 0x0) sync_file_range(r4, 0x0, 0x4, 0x4) preadv(r4, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/21, 0x15}], 0x1, 0x0) fchdir(r4) mkdir(&(0x7f0000000180)='./file0\x00', 0x104) splice(r4, &(0x7f0000000400), 0xffffffffffffffff, &(0x7f0000000440), 0x9, 0x2) rename(&(0x7f0000001e00)='./file0\x00', &(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f") mkdir(&(0x7f000000e000)='./control\x00', 0x0) r5 = open(&(0x7f0000000000)='./control\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x80}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000380)={r6, 0x5}, &(0x7f00000003c0)=0x8) mknodat(r5, &(0x7f000003f000)='./control\x00', 0x1, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f00000000c0)={0x4, 0x78378d6f, 0x7ff, 0x80000001, 0x8, 0x9, 0x2, 0xffffffffffffffff, 0x0, 0x3, 0x80000001, 0x4}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/10 11:05:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 64.324704] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 64.365371] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 64.375859] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 64.397216] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:05:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 64.530295] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 64.623291] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:05:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000037c0)="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", 0x1c0}], 0x1, &(0x7f0000001a00)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000002440)=@sco, 0x8a8c0888b934ffab, &(0x7f00000000c0), 0x2, &(0x7f0000001400)=""/6, 0xffffffffffffffe0}, 0x200000000) 2018/04/10 11:05:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:51 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="400000001600010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x40}, 0x1}, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000001c0)=0xfffffffffffffffe, 0x4) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000002c0)={0x8, &(0x7f0000000280)=[{}, {0x0}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000440)={r2, &(0x7f0000000340)=""/221}) r3 = request_key(&(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000500)='\x00', 0xfffffffffffffffd) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xc725, 0x9, 0x81, 0x8, 0x2}, &(0x7f0000000640)=0x98) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000680)=r4, 0x4) keyctl$update(0x2, r3, &(0x7f0000000540), 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000540)) getsockopt$inet_int(r1, 0x0, 0xa, &(0x7f0000000080), &(0x7f0000000100)=0x4) flock(r1, 0x8) ioctl$sock_netrom_TIOCINQ(r0, 0x541b, &(0x7f0000000300)) 2018/04/10 11:05:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:51 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000759000)='clear_refs\x00') mprotect(&(0x7f00003b5000/0x3000)=nil, 0x3000, 0x2000002) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x2}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syzkaller0\x00', 0x10) 2018/04/10 11:05:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000015d12)={@link_local={0x1, 0x80, 0xc2}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "f6c85b", 0x30, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0xffffff83, 0x0, 0x0, 0x0, {0x0, 0x6, "44309d", 0x0, 0x0, 0x0, @empty, @mcast1={0xff, 0x1, [], 0x1}}}}}}}}, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20, 0x10000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x7fffffff, 0x10, 0x8000, 0x3d2, "eb803806a546efbea9966aef1effa8678cea198c1ac8f085970b9fc99ceacd84"}) 2018/04/10 11:05:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 64.790596] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 64.792069] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 64.812660] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:05:51 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:51 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x102) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_ifreq(r1, 0x89f4, &(0x7f0000000040)={'sit0\x00', @ifru_map}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000001540)=@assoc_value={0x0}, &(0x7f0000001500)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000380)={r2, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0xa4, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @multicast2=0xe0000002}, @in={0x2, 0x4e20}, @in6={0xa, 0x4e24, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x332}, @in6={0xa, 0x4e22, 0x3ba3, @loopback={0x0, 0x1}, 0x2}, @in={0x2, 0x4e22, @loopback=0x7f000001}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e21, 0x80, @remote={0xfe, 0x80, [], 0xbb}, 0x3}, @in={0x2, 0x4e20}]}, &(0x7f00000001c0)=0x10) write$cgroup_int(r0, &(0x7f0000000000)={[0x32, 0x2f]}, 0x2) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={r2, 0x7, 0x7, 0x240000000000, 0x800, 0x401, 0x4, 0x10001, {r3, @in6={{0xa, 0x4e23, 0x4, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x2}}, 0x7, 0x100000000, 0x80, 0x8001, 0x65}}, &(0x7f00000002c0)=0xb0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0186415, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0xcd1, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) r4 = add_key(&(0x7f00000003c0)='cifs.idmap\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000440)="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", 0x1000, 0xfffffffffffffff9) r5 = request_key(&(0x7f0000001440)='cifs.idmap\x00', &(0x7f0000001480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000014c0)='-)ppp0ppp1+ em1\x00', 0xfffffffffffffff8) keyctl$reject(0x13, r4, 0x91, 0x8, r5) writev(r0, &(0x7f0000000040), 0x146) getsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) [ 65.040736] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 65.070898] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:05:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:52 executing program 6: syz_emit_ethernet(0x66, &(0x7f0000015d12)=ANY=[@ANYBLOB="0180c2000000aaaaaaaa000086dd60f6c85b00303a0000000000000000000000ffffac14ffbbff02000000000000000000000000000183007da3000000006044309d0000000000000000000000000000000000000000ff010000000000000000000000000001"], 0x0) 2018/04/10 11:05:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000037c0)="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", 0x1c0}], 0x1, &(0x7f0000001a00)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000002440)=@sco, 0x8a8c0888b934ffab, &(0x7f00000000c0), 0x2, &(0x7f0000001400)=""/6, 0xffffffffffffffe0}, 0x200000000) 2018/04/10 11:05:52 executing program 0: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5011, r0, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000)=0x100000001, 0x4) ftruncate(r0, 0x7) 2018/04/10 11:05:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000c26fec)={0x1, 0x88, 0x103, 0x2}, 0x2c) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x101100, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0}, 0x20) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x1}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={r2}, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f000000a000), &(0x7f0000000300)="4b0795a1a267c8f42f8d2bb645302e4496de5e5693c3bd17b3cbf0cb2538667d37945fd1d0b255e568aec3c52e7a0f401d667df5a2fe761ac1eaff31cb47a0"}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000080), &(0x7f00000000c0)=""/231}, 0x18) 2018/04/10 11:05:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 65.235287] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 65.288495] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:05:52 executing program 6: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xfd0000)=nil, 0xfd0000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x408000000001, 0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000bb5000)={0x0, 0x0, 0x1f3}, 0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r1, 0x80, 0x9, 0x81, 0x84, 0x7}, &(0x7f0000000100)=0x14) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000180)={0x7c, 0x6, 0xcae, 0xd2}, 0x8) 2018/04/10 11:05:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="00fbb59e16a686ae5f") lseek(r0, 0xfffffffffffffffe, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000001200)={0x0, 0x1}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) rt_sigaction(0xd, &(0x7f0000000000)={0xa7, {0x7}, 0x0, 0x68}, &(0x7f0000000040), 0x8, &(0x7f0000000080)) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000023000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000000001010096d700000000000000251200000008001200"], 0x1c}, 0x1}, 0x0) 2018/04/10 11:05:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:52 executing program 0: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)='loginuid\x00') splice(r1, &(0x7f0000000100), r1, &(0x7f0000000140)=0x8, 0x0, 0x1) exit(0x4) read(r1, &(0x7f00000002c0)=""/90, 0x5a) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000000)={0x1f, 0x81, 0x6}) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000200)="dc5b3e788f4e243821d79766471cb66961e3e026a915d70e3004abb246862623db9de471021c210f9eee9b9b24f58f48560e27e1e25638ddd45c9898eef77a4b6a7f87d03b6bb71af379fc42d0e7340a30c8b4978214f53632769f09724f777b68935a5afbd82adeaa899f34e4e82cc577ceed26b287e647b0cef5b690dc0735ef4110522731805993ce7ab6803c4e5f5daddb9c145c067bedc1", 0x9a, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r2, 0x7) 2018/04/10 11:05:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000580)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) fcntl$getflags(r0, 0x0) recvmsg(r1, &(0x7f0000b2dfc8)={&(0x7f00007ebffa)=@hci, 0xc, &(0x7f0000f75000)=[{&(0x7f0000f75000)=""/228, 0xe4}], 0x1, &(0x7f0000ec7000)=""/107, 0x6b}, 0x0) 2018/04/10 11:05:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 65.533130] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 2018/04/10 11:05:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:52 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x206000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)={0x1, 0x0, [0x0]}) r2 = accept$alg(r0, 0x0, 0x0) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x73e0) sendfile(r2, r3, &(0x7f0000e64ff8), 0x8e18) sendfile(r2, r3, &(0x7f00007ed000), 0x2b) 2018/04/10 11:05:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 0: unshare(0x80000002) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:53 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x4, 0x32, 0xffffffffffffffff, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000000000)=""/40, &(0x7f0000000040)=0xfffffffffffffe7f) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) accept4$inet6(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c, 0x800) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000080)={'bond0\x00', 0xffffffff}) 2018/04/10 11:05:53 executing program 3: r0 = socket$inet6(0xa, 0x7, 0x7fff) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000093bfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0x7) r2 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f000073a000)=0x1c9, 0x4) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}, 0x4}, 0x1c) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'dummy0\x00', {0x2, 0x4e20, @loopback=0x7f000001}}) 2018/04/10 11:05:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 0: unshare(0x80000002) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x206000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)={0x1, 0x0, [0x0]}) r2 = accept$alg(r0, 0x0, 0x0) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x73e0) sendfile(r2, r3, &(0x7f0000e64ff8), 0x8e18) sendfile(r2, r3, &(0x7f00007ed000), 0x2b) 2018/04/10 11:05:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x206000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)={0x1, 0x0, [0x0]}) r2 = accept$alg(r0, 0x0, 0x0) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x73e0) sendfile(r2, r3, &(0x7f0000e64ff8), 0x8e18) sendfile(r2, r3, &(0x7f00007ed000), 0x2b) 2018/04/10 11:05:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:53 executing program 0: unshare(0x80000002) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 3: unshare(0x28060400) semget$private(0x0, 0x4, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) semtimedop(0x0, &(0x7f000001dfd6)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f000001f000)={0x2000, 0x989680}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) unshare(0x405fd) r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x80, &(0x7f0000000080)=0x2) 2018/04/10 11:05:54 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 0: unshare(0x80000002) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00004f7000)="649c47ad46390d006dc80000009d4d54", 0x10) r1 = dup(r0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendmsg$key(r2, &(0x7f00003b3fe4)={0x0, 0x0, &(0x7f0000946ff8)={&(0x7f00001a2ea8)=ANY=[], 0x2ab}, 0x1}, 0x0) recvmmsg(r2, &(0x7f00000026c0)=[{{&(0x7f0000000340)=@rc, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000580)=""/4096, 0x1000}}, {{&(0x7f0000001580)=@ethernet={0x0, @local}, 0x80, &(0x7f0000002680)=[{&(0x7f0000001600)=""/107, 0x6b}, {&(0x7f0000001680)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, &(0x7f0000002740)={0x77359400}) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000080)={@remote, @broadcast, 0x0}, &(0x7f00000000c0)=0xc) bind$packet(r1, &(0x7f0000000100)={0x11, 0x1c, r3, 0x1, 0xdf05, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) 2018/04/10 11:05:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller0\x00', 0x112}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'syzkaller0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}}) getpeername(r0, &(0x7f0000000080)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000140)=0x80) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='io.stat\x00', 0x0, 0x0) mq_getsetattr(r3, &(0x7f00000003c0)={0xedc8, 0x6496, 0x23bf2c97, 0x1, 0x2, 0x3, 0x5}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="90cf", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000001c0)=0x7) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000002c0)="3b42a59e3d1f00ba912e1c6402253cc084f05870bfa5e390a6d5460b8f6af88137870982100b7a0c64b799641fd2e11917d6370b36d709f9874ea96fddc78dacde05ea", 0x43) connect$ipx(r2, &(0x7f0000000000)={0x4, 0xd8, 0x6, "be50592ec6fd", 0x7165}, 0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x0, 0xfffffffffffffff9, 0x8608}, 0x10) r4 = dup2(r0, r1) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0x4, &(0x7f0000000040)=0x1, 0x4) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000340)) 2018/04/10 11:05:54 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x0, 0x4, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xa) fcntl$getown(r0, 0x9) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x3, 0xff, 0x1, 0x2, 0x1, 0xfffffffffffffff7}, &(0x7f0000000280)=0x20) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000040)=0x1c) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000180)={r3, 0x401}, &(0x7f00000001c0)=0x8) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000002c0)) 2018/04/10 11:05:54 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 0: unshare(0x80000002) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 2: syz_emit_ethernet(0x4a, &(0x7f00006ba000)=ANY=[@ANYBLOB="0180c2000000e2701bb6068908004501003c000000000029907800000000ffffffff00009078e0000001b09b6d5c2a91e414699d955ce83b632ad2be27d4049739030d61b6f37e405db5"], &(0x7f0000000040)) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) 2018/04/10 11:05:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:54 executing program 0: unshare(0x80000002) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:54 executing program 3: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./control\x00', 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) mkdirat(r0, &(0x7f0000016ff8)='./file0\x00', 0x0) r1 = openat(r0, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000140)='./control\x00', 0x80000, 0x4) mkdirat(r1, &(0x7f0000000100)='./control\x00', 0x0) recvmsg(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/117, 0x75}], 0x2, &(0x7f00000002c0)=""/32, 0x20, 0xd96f}, 0x61) mknodat(r0, &(0x7f0000000380)='./control/file0\x00', 0x48, 0x20) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000001800)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000300)={0x1a}) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000440)) sendmsg(r0, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001840)="8c3b6ca957d4b04b17caf199bcd1e8249756c86b3b84026d0d5576d770c3417d203675c4e5bda293cdfc61536d3086c87adf2b786dd6bd0efb87a1a4ed47093b0dc6fa", 0x43}], 0x1, &(0x7f0000001a40)}, 0x400c000) renameat2(r1, &(0x7f000003aff6)='./control\x00', r0, &(0x7f0000000180)='./control/file0\x00', 0x2) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000480)={0x0, 0x80, &(0x7f0000001580)=[@in6={0xa, 0x4e21, 0x6, @empty, 0x30}, @in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}, 0xfb}, @in6={0xa, 0x0, 0x200, @mcast2={0xff, 0x2, [], 0x1}, 0xe27}, @in6={0xa, 0x4e24, 0x101, @dev={0xfe, 0x80, [], 0x15}, 0xfffffffffffffff8}]}, &(0x7f0000001600)=0xc) dup3(r2, r2, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000340)={0x0, 0x0, 0x100000, 0x7, 0x1, 0x1, 0xff, 0x10000, 0x7, 0x80000001}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000280)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x5}, 0x8) 2018/04/10 11:05:55 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:55 executing program 0: unshare(0x80000002) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:55 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000486000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/04/10 11:05:55 executing program 3: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0xa44}) bpf$PROG_LOAD(0x5, &(0x7f00006f4fb8)={0x1, 0x4, &(0x7f0000002000)=ANY=[@ANYBLOB="1800000000000000000005000000000000000000001c000000009500000000000000000000000000"], &(0x7f0000000180)='syzkaller\x00', 0xea4c, 0x627, &(0x7f00000001c0)=""/195}, 0x48) 2018/04/10 11:05:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:55 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x100, 0x4) accept4(r2, &(0x7f0000000080)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000000100)=0x80, 0x80800) close(r1) r3 = memfd_create(&(0x7f0000002000)='proclo}\x00', 0x0) getsockopt$ipx_IPX_TYPE(r2, 0x100, 0x1, &(0x7f0000000340), &(0x7f0000000380)=0x4) r4 = getpgrp(0x0) sched_setaffinity(r4, 0x8, &(0x7f0000c35000)=0x1) r5 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)="78d71c31c3b20fa3eb6e87efc71edb954305ae0eaf88f52228812c63ef6f1efdcb1c1d765c957788434eec704f68239c3416aaed1f91ce663c4a2e5ff33813177b097cd209c07469c3fd9550b4a0e0d2b8c7f1df1c4d8e8a586161a8e229fa760ed4fc383d0aa136b8b2f44335b7736127313e46c4895f7746f05248afb698ed978dd287bdf1edc8636e5ebbb7694dc81e6e0ac13e9ade8ff543302ef027695566dee3fc0cecf4990532747d6ab91d7c1479328e771fa5d89ea4579c", 0xbc, 0xfffffffffffffffa) r6 = request_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='system.posix_acl_access\x00', 0xfffffffffffffffc) keyctl$reject(0x13, r5, 0x2, 0xefe, r6) pwritev(r3, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) fsetxattr(r1, &(0x7f00000fa000)=@known='system.posix_acl_access\x00', &(0x7f0000129ff6)='^/eth0{%@\x00', 0xa, 0x0) fremovexattr(r1, &(0x7f00002a8000)=@known='system.posix_acl_default\x00') close(r0) 2018/04/10 11:05:55 executing program 0: unshare(0x80000002) bind$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:55 executing program 6: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f000000dff8)=@file={0x1}, 0x2) add_key(&(0x7f0000bbaff8)='trusted\x00', &(0x7f0000c33ffb)={0x73, 0x79, 0x7a}, &(0x7f00000d6000), 0x0, 0xffffffffffffffff) listen(r0, 0x0) accept(r0, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80) add_key(&(0x7f0000efeffa)='logon\x00', &(0x7f0000a13000)={0x73, 0x79, 0x7a}, &(0x7f0000bd9faa), 0x0, 0xfffffffffffffffe) listen(r0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x44) setsockopt$inet_int(r1, 0x0, 0xc, &(0x7f0000000040)=0x6, 0xfffffc34) 2018/04/10 11:05:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:56 executing program 6: syz_open_procfs(0x0, &(0x7f0000000340)='cmdline\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='system.advise\x00', &(0x7f0000000140)='+cpuset(system\x00', 0xf, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3}) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) write$eventfd(r2, &(0x7f0000000040), 0x8) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r0, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @queue}], 0x1c) tee(r1, r0, 0x3, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000180)={'mangle\x00', 0x5e, "a143d0d9f363f0703f43fb09fe30b0dff9737244b17560f653ab5c26cba4e70777b72e688680f12ede400446604b1299b856d75d77e9d1efa1500747e45af9125987a68666e0bc4b1b7c0dbae6a5b7e596b80ea0b8484790bee4492d8c6a"}, &(0x7f0000000000)=0x82) dup2(r1, r3) 2018/04/10 11:05:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:56 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:56 executing program 3: mmap(&(0x7f0000000000/0xfd4000)=nil, 0xfd4000, 0x0, 0x40000000000031, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000000c0), 0x4) 2018/04/10 11:05:56 executing program 0: unshare(0x80000002) bind$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:56 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x100, 0x4) accept4(r2, &(0x7f0000000080)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000000100)=0x80, 0x80800) close(r1) r3 = memfd_create(&(0x7f0000002000)='proclo}\x00', 0x0) getsockopt$ipx_IPX_TYPE(r2, 0x100, 0x1, &(0x7f0000000340), &(0x7f0000000380)=0x4) r4 = getpgrp(0x0) sched_setaffinity(r4, 0x8, &(0x7f0000c35000)=0x1) r5 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)="78d71c31c3b20fa3eb6e87efc71edb954305ae0eaf88f52228812c63ef6f1efdcb1c1d765c957788434eec704f68239c3416aaed1f91ce663c4a2e5ff33813177b097cd209c07469c3fd9550b4a0e0d2b8c7f1df1c4d8e8a586161a8e229fa760ed4fc383d0aa136b8b2f44335b7736127313e46c4895f7746f05248afb698ed978dd287bdf1edc8636e5ebbb7694dc81e6e0ac13e9ade8ff543302ef027695566dee3fc0cecf4990532747d6ab91d7c1479328e771fa5d89ea4579c", 0xbc, 0xfffffffffffffffa) r6 = request_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='system.posix_acl_access\x00', 0xfffffffffffffffc) keyctl$reject(0x13, r5, 0x2, 0xefe, r6) pwritev(r3, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) fsetxattr(r1, &(0x7f00000fa000)=@known='system.posix_acl_access\x00', &(0x7f0000129ff6)='^/eth0{%@\x00', 0xa, 0x0) fremovexattr(r1, &(0x7f00002a8000)=@known='system.posix_acl_default\x00') close(r0) 2018/04/10 11:05:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:56 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:56 executing program 3: r0 = memfd_create(&(0x7f0000000000)='!*[bdev\x00', 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000040)=""/148) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000680)=0x4) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000200)="c9", 0x1}, {&(0x7f0000000300)}, {&(0x7f0000000440)="8b48276c6a8a2fb34dc2d91cc2d052c8fa1678890193ecc25efbbd22cd4de1bacbec29791f9ba776047dab58b20d22190f90c0365a2ba8a5997de5da8ed0c587cad62cb802b7ed0db5647a8dd82f6046b1dd5c10136a32426b4ca6a24e1a2632f1416cd017b7ef06ec520b72f47aaffadbdc5271ecb6dfab713df958972507820ea02f3397a4866220b8141936b31a39bf224546dc83526dc249a6b5daf591", 0x9f}, {&(0x7f0000000540)="4fa5f8f8c49300e922ea4de6a868f893577bb50d4f39b3caf28e53d0cba975dd544d98ccbd78377c67540f8d74bde28cb39860b4fc71734a7ce55f3beb4c4047a1909c5acc7fecd95e73db4a512f72970937f91fbfe8f176d4ebe45f23a521ba0bba60ed6f2c4f793a8bde87ecb531eb4e78dfbe03543f6b9cc6bb500339a82e063e908fef8e7358fef8b2c9cf5f0a4b3a180645604669f42a3108093933056f4c159e85c78d0f0ce4994ebda9c4a2987ee565d45327666462", 0xb9}], 0x4, 0x0) 2018/04/10 11:05:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:56 executing program 0: unshare(0x80000002) bind$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:57 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20, 0x5, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@nfc, 0x10, &(0x7f0000000080), 0x45, &(0x7f0000000380)=""/128, 0x80}, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000180)='<', 0x1) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x2, 0x400) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) readlinkat(r1, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/104, 0x68) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000100)={r2, 0x2}) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000002ff0), 0x0, &(0x7f0000000480)=[{0x0, 0x1ff, 0x3ff, "4db0ef4efa8c96e0b9d8a3be31ff4741096bd46d29e209acd69fe88cfd38b58bea98844cbfa447f25f99c35e72fa37a84a2a852317553022bdf7b1ce3f4e80ec14a8c83275ff0c9646d0ee2978840587fd386f20a49ad3c766c4da0a22ebe4f27a08977cc37ceffaf24b9ad5cfc5cf1d6f23a648927f3cb7cba8ff8f02ffb569f681bd07c1aedb70f6d4fa6b5788ef40a05b791d1e55"}, {0x0, 0x102, 0x1, "dc3321c3f3e5a8d727c2d985b27c863a9a77d1b14984338ac9908963d34c4cb63032c0c4a6662d406c0e64244f56a0d9c07fc98bd67630a6d30be27c957f5a0e2d1f0fc716c11014825bdeaea4fd66d1c1ccb159b445f2f5cefc5d9b453aa798bae71bbd1a1426595edf78ef9ea348388b3e0772f6df203127c9ce1ce205c26c103598d7f55fe87c539e809c81222e4d27dd9c65ce22a62175"}, {0x0, 0x1, 0x8, "b6c12c3b35fc76f9c6329d1458fbc18512282d5e20159606b2aa67087bc8401507b2296acdaa93d0bc5e77e9464e4c037f5623fc306bf18d6dbc859d0af2675a21f993b05026654ad1365b89470405ee3d960eb425dca4b2aab9d4a08cf1a159283b3ef4301c16bfcedf8f1aaea42af62a4ece38ba892dcbfb6f81171e9176861645b10d0aabee15405329a3d5dd50be142483bcfe837a912f610b"}, {0x0, 0x10e, 0x40, "d67860002a4d5be6cd55acaab3e3bfc60da023264e6b54dd7bef4c2a70a73f6ddce9c96bf67d1095efff51a0f35931ebc7691cf344e79eb5e9b5829b8893f6515e7303d1c7457e4656d9d2aadf77a262347515fe1f3c8e77d02c5010e7513f3e2bd987a2be0c5518a75f480f7cdbc99bdeef0fdc49ef4871746023b9f500cf6fa971dc6650bdd1abe974dc0b74798032b9485baf9ed138e587cc15c84422cb8a51cc2f7fd5b23c91df4510e8e072e45cfb9f75a9093319aeb76f0c0ec0bb2374"}, {0x0, 0x88, 0x8, "49e0d9c8f882db99d9017bffa01f338ea7124a28b57b7966d03f47e73c01992c5ed8314ac2779715d05528583ed4d17c1be531986e7a4e8c9bb8949dbe53183ea862bce1e419ffceadb2159906807ca9c13a5582dba5994cbf1ca960e9e2268fc5747fb53937c8d0b035152226b0d05a96667ee16067951016bfbccd04666841bf2cb2415b9ed8cef3f25ddff5648d0d6c9ae3be62d28111d9737bcfe00940d184714206b54d9cda70142e3b78f470d5c2746f69dbba428b7c935715d42d50e36a3f44eb1dca9e8b"}, {0x0, 0x10f, 0x4, "d4c488c81800ce3a6b8afdc6aed54a56efbbe9b9e42b7320820241234ef2530b8046e5576caa8f98b4cea4cab92cd6e4ce2c2457c2d51f08dcad21e528f68cf1b4ad835bc83e3910c248ca4ca49f89b2a442b61943e935eb6e49394e962392c00e2857af0c49cd70599d2d5d2d11688ad00a0e3c212408613c45863f177b537d9d93d8f8a3e7de5ec861bac4fdabcb77faf4deafa7a008ced73b3bd66ff96c40d37e2ba44f781cfa530bf372e5c4f4de5264025bf197f61bc53c6f8ac9f1aca8388508171b74502ef31cab3bdb32e2ba174ec67e29df2134ffc1e624be84"}, {0x0, 0x10f, 0x3ca5, "4b0de470266268c89ac682aba76fd73eb48a16066506c8d7e16f28118f5d3ee351a748435688b43b2b2b4c76e3398bc68b3e7f019b66d60d28f80f05fac2400f973cf6529b1bfd22aff34a9a9e75fdbded3c2d8cfa9dc32df3c66c47fb6f2c6bf391126a68fd2827048d828794c0611902322c6b9f7ae86581a494b5656a43fc76e07668a3a9ef9b3c0c08e9431a62d1470be481749991c631b1c2f73abae159751adfc53356658c5ad33dc1"}, {0x0, 0x0, 0xa18, "5a290d704815be783c709b5744721d40a33b64487223ab4ac84461e0d910ebd37caa7d33afb062fbc3a2079a0f6419692116ea2203438d222cb785f31c0f992a6b17759f3edd60aac94b4e49a49d651b220ef4dabbbaff315c1b687ad6a544c8302fd6986a633cdca51ccbd63218482376ba3d1c03ec3d3348deb4b5de3947160eac3c26e95f096bcfcc0f0373dd6d8c5ac5d27f1928fdb8040711b9c70a84d9ddf17ec62df68bd2ea3e"}], 0xfffffffffffffe41, 0x4}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={r3, 0x401}, 0x8) 2018/04/10 11:05:57 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:57 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = semget(0x1, 0x3, 0x688) semctl$SETVAL(r1, 0x2, 0x10, &(0x7f0000000000)=0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000080)={'lo\x00', {0x2, 0x0, @loopback=0x7f000001}}) 2018/04/10 11:05:57 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x100, 0x4) accept4(r2, &(0x7f0000000080)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, &(0x7f0000000100)=0x80, 0x80800) close(r1) r3 = memfd_create(&(0x7f0000002000)='proclo}\x00', 0x0) getsockopt$ipx_IPX_TYPE(r2, 0x100, 0x1, &(0x7f0000000340), &(0x7f0000000380)=0x4) r4 = getpgrp(0x0) sched_setaffinity(r4, 0x8, &(0x7f0000c35000)=0x1) r5 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)="78d71c31c3b20fa3eb6e87efc71edb954305ae0eaf88f52228812c63ef6f1efdcb1c1d765c957788434eec704f68239c3416aaed1f91ce663c4a2e5ff33813177b097cd209c07469c3fd9550b4a0e0d2b8c7f1df1c4d8e8a586161a8e229fa760ed4fc383d0aa136b8b2f44335b7736127313e46c4895f7746f05248afb698ed978dd287bdf1edc8636e5ebbb7694dc81e6e0ac13e9ade8ff543302ef027695566dee3fc0cecf4990532747d6ab91d7c1479328e771fa5d89ea4579c", 0xbc, 0xfffffffffffffffa) r6 = request_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='system.posix_acl_access\x00', 0xfffffffffffffffc) keyctl$reject(0x13, r5, 0x2, 0xefe, r6) pwritev(r3, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) fsetxattr(r1, &(0x7f00000fa000)=@known='system.posix_acl_access\x00', &(0x7f0000129ff6)='^/eth0{%@\x00', 0xa, 0x0) fremovexattr(r1, &(0x7f00002a8000)=@known='system.posix_acl_default\x00') close(r0) 2018/04/10 11:05:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:57 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:57 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:57 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x8000000006) r2 = dup2(r1, r0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000100)="88", 0x1}], 0x1) syz_emit_ethernet(0x32, &(0x7f0000015f93)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa000008004b00002400000000000090780000000059e8fc4c50d171360401907800e401fd00f4b4a5"], 0x0) 2018/04/10 11:05:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:57 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:58 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:58 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={"6c6f00000017000000b905efaa00", &(0x7f0000000040)=@ethtool_cmd={0x4a}}) 2018/04/10 11:05:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:58 executing program 3: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) read(r1, &(0x7f0000001180)=""/4096, 0x1000) dup2(r2, r3) 2018/04/10 11:05:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000003000)=[{&(0x7f0000000000)="390000001100090469000000810000000700004003000000450001070000001419001aff0400230007000000020000080900000000f41ee400", 0x39}], 0x1) r1 = dup2(r0, r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) 2018/04/10 11:05:58 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:58 executing program 2: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)=0x801) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000180)=[{{r1, r2/1000+10000}, 0xfffffffffffff366, 0x7, 0xffff}], 0x18) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f00000000c0)={{0x1}}) r3 = syz_open_procfs(0x0, &(0x7f0000000280)="2f65786500000000000409004bddd9de91be10eebf000ee9a9d50f1e8600000854fa07424adee93707da75af1f0200f5cd26d7a0d2ef6ae0d178621cffc0a87164000000e39c5a") ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0c0583b, &(0x7f0000000040)={0x0, &(0x7f0000000040)}) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000000)=0xa1d) 2018/04/10 11:05:58 executing program 6: r0 = open(&(0x7f0000000300)='./file0/file0\x00', 0x8040, 0x10) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000000080)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000000)={0xfffffffffffffffd}, &(0x7f0000d31ff0), &(0x7f00007adff0)={0x77359400}, 0x8) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000140)={0xa, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000180)={r1, 0x1}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{}, {}, {}, {}]}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x8d00, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x2) accept$inet(r2, &(0x7f00000001c0)={0x0, 0x0, @remote}, &(0x7f0000000200)=0x10) 2018/04/10 11:05:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:58 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 71.762219] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:05:59 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:59 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:59 executing program 3: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) read(r1, &(0x7f0000001180)=""/4096, 0x1000) dup2(r2, r3) [ 72.736840] RDS: rds_bind could not find a transport for 172.20.20.0, load rds_tcp or rds_rdma? [ 72.782658] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:05:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:59 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:05:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:05:59 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x800000000000400) getpeername$netlink(r0, &(0x7f0000000100), &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2) r1 = socket$netlink(0x10, 0x3, 0x0) fgetxattr(r1, &(0x7f0000785000)=@known='security.selinux\x00', &(0x7f0000043000), 0x0) 2018/04/10 11:05:59 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000), 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 72.932328] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:00 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = creat(&(0x7f0000015ff4)='./file0/bus\x00', 0x0) close(r0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000140), 0x0, 0x0) keyctl$get_keyring_id(0x0, r1, 0x4) mq_getsetattr(r0, &(0x7f0000000040), &(0x7f00000000c0)) 2018/04/10 11:06:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 73.013248] RDS: rds_bind could not find a transport for 172.20.20.0, load rds_tcp or rds_rdma? [ 73.050019] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 73.185301] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 73.281944] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:00 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:00 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:00 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000), 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:00 executing program 2: r0 = socket$nl_xfrm(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001200)={'bridge0\x00', &(0x7f0000001500)=@ethtool_drvinfo={0x3, "aebeb9f21f0b17905f134547519ee0413a9408775d05a38c07798368e051f8a1", "04874f0d4cfa86b0231e53d2b1f1a8c122b4cdea8b1861a7c6942d68467db4f2", "0b531d4fea6d1d4bf9e2574086139dade46d7bbfbc186ec717e527e6ec710b2b", "4972e53bda5912b3895668819a4b269f6d40a035d6ef9fd8c601f9278705a86b", "9944301c219f399d805739df28eb215a4ff359325c6ea2d2cf83a579d87e1702", "b0e0b419ad8866013765a27d"}}) r1 = dup(r0) recvfrom$llc(r1, &(0x7f0000000000)=""/216, 0xd8, 0x100, &(0x7f0000000100)={0x1a, 0x33f, 0xffffffff, 0x3, 0x9, 0x5, @random="0ee686ab728d"}, 0x10) 2018/04/10 11:06:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:00 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12013, r1, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) 2018/04/10 11:06:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 73.640125] RDS: rds_bind could not find a transport for 172.20.20.0, load rds_tcp or rds_rdma? [ 73.674157] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 73.684025] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 73.693493] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 73.702608] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 73.711686] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:00 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:00 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) [ 73.856671] RDS: rds_bind could not find a transport for 172.20.20.0, load rds_tcp or rds_rdma? 2018/04/10 11:06:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)="6e7300e630097a575ccb9e42f06b372f0530c81d28e2d0f26aa61c9210ea9a4401b00cff12811df641d3d14349509ee7e5778a242c896974e189e60cb2692ce5fb84995102bdfc4b5d9ce3aee7d076fad433a304f000510d9dcc96dd67c351868eb6a5445aecde32596900c365e3b93af537266b55a2e4bf12bdbf0e06b9a2bb2adf3ded295d300c3dfb55a33ac6511b3f6535e03d8496e4378eac289bd973a8f51e0cb60233211b1c4ac5cb2b") fchdir(r0) ioctl$KDENABIO(r0, 0x4b36) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 2018/04/10 11:06:00 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000), 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:00 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000040)={0x5, 0x3, 0x0, 0x5, 0x10000}) ioctl$TCXONC(r0, 0x540a, 0x2) poll(&(0x7f00003be000)=[{r1}], 0x1, 0x5d) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000de0000)) 2018/04/10 11:06:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:00 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:00 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) [ 74.029519] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 74.054310] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 74.059527] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:01 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000040)={'team0\x00', {0x2, 0x4e24}}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000480), &(0x7f00000004c0)=0x10) shutdown(r1, 0x2) 2018/04/10 11:06:01 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:01 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000), 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 74.269310] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:01 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bbfff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000040)={0x5, 0x3, 0x0, 0x5, 0x10000}) ioctl$TCXONC(r0, 0x540a, 0x2) poll(&(0x7f00003be000)=[{r1}], 0x1, 0x5d) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000de0000)) 2018/04/10 11:06:01 executing program 2: capset(&(0x7f00005cf000)={0x20080522}, &(0x7f0000f03fe8)={0x0, 0x0, 0x0, 0xffffffffffffffff}) unshare(0x400) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x2, 0x70bd2a, 0x25dfdbfd, {0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000140)) [ 74.353649] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:01 executing program 0 (fault-call:2 fault-nth:0): r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) [ 74.410360] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:02 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0xa100, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xdd, 0xd3, &(0x7f0000000080)="83d77bb0987e1dbd02aa0924301008557d9120b1debacd35d188e14b44d3ad482218174afbfc3c56cc50435beb10e81fa0394c7a13dbd20210fd908aa70b1e2f922cc7166f58f135f8cbd04802d31eb18bb53d933e01a0c3f44186d546193fa9a6ae85272223cbbb4388ec1d0f67c6daac072e484bcec00312b532d532e10f9a8236841503947d23e498ee4514069973bfdfe339143a4dc86c9c64c3c061377a326ebc77893c870932d114074dcd03b682ca5fe11d5093457d3174f641aa9e76b12be91bbfa43241a6996e964034d74932283c260c6aae15d9874795d0", &(0x7f0000000180)=""/211, 0x3, 0x1}, 0x28) ftruncate(r0, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:02 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:02 executing program 2: capset(&(0x7f00005cf000)={0x20080522}, &(0x7f0000f03fe8)={0x0, 0x0, 0x0, 0xffffffffffffffff}) unshare(0x400) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x2, 0x70bd2a, 0x25dfdbfd, {0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000140)) [ 75.259833] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 75.263749] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 75.274127] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:02 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/04/10 11:06:02 executing program 2: capset(&(0x7f00005cf000)={0x20080522}, &(0x7f0000f03fe8)={0x0, 0x0, 0x0, 0xffffffffffffffff}) unshare(0x400) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x2, 0x70bd2a, 0x25dfdbfd, {0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000140)) 2018/04/10 11:06:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:02 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 75.492823] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 75.590791] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 75.619393] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:03 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x80000, 0x0) ioctl$sock_ipx_SIOCIPXNCPCONN(r1, 0x89e3, &(0x7f0000000080)=0x3) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:03 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:03 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 76.197376] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 76.221249] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 76.233140] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:03 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000180)) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000000c0)={@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x2, 0x1, {0xa, 0x4e22, 0x80000001, @loopback={0x0, 0x1}, 0x3}}}, {&(0x7f0000000000)=""/37, 0x25}, &(0x7f0000000080), 0x52}, 0xa0) 2018/04/10 11:06:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:03 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:03 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000100)="88c1b6db034a08738c2a8609b594ce7dd1d5af5e4257b4f272eaa2438eb210421810222a7f847d3c938f1d096f6d9cbed8dd5f217a7988623dabd92db26ce75d5fbbc81681b9220101f09a2fb07411d3c6c6404e96419eff1682f6ec5b92bbcc6a03eea14a21", 0x66, 0x810, &(0x7f0000000180)=@llc={0x1a, 0x30d, 0x2, 0x5, 0x5, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000200)={0x3, 0x25e, 0x3, 0x8, 0x2, [{0x4, 0x3f, 0x4, 0x0, 0x0, 0x5}, {0x100, 0x4b88, 0x80000000}]}) dup2(r0, r1) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) socket$rds(0x15, 0x5, 0x0) [ 76.493341] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 76.598511] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 76.626623] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:04 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) getpeername(r0, &(0x7f0000000080)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, &(0x7f0000000000)=0x80) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:04 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:04 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 77.125977] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 77.149553] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 77.162080] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:04 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10000, 0x0) recvfrom$inet(r1, &(0x7f0000000080)=""/213, 0xd5, 0x2143, 0x0, 0x0) 2018/04/10 11:06:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:04 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 77.411437] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 77.435290] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 77.452805] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x18) accept$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}, @dev={0xfe, 0x80, [], 0xb}, @mcast2={0xff, 0x2, [], 0x1}, 0x5a3, 0x7fff, 0x9, 0x0, 0xffffffff, 0x44400000, r2}) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x20}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={r3, @in={{0x2, 0x4e21, @multicast2=0xe0000002}}, 0x0, 0x1, 0xed4, 0x1, 0x41}, &(0x7f0000000340)=0x98) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x2, @loopback=0x7f000001}, 0x17a) 2018/04/10 11:06:05 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 78.028339] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 78.065454] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = dup3(r0, r0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e21, 0x40, @remote={0xfe, 0x80, [], 0xbb}, 0x81}}, [0x3ff, 0x1f, 0xbaa, 0xffffffffffff589d, 0x2, 0x7, 0x110, 0x0, 0x101, 0x29fa, 0x6, 0x0, 0x7, 0x0, 0xff]}, &(0x7f00000001c0)=0x100) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000240)=0x83) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000200)={0x6, 0x24}) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 78.319310] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 78.324922] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 78.338617] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:05 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000b002000000000000ffffffffffffffff00000000ffffffff18020000ffffffffffffffff18020000ffffffff03000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x310) bind$rds(r0, &(0x7f00000003c0)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$sndseq(r1, &(0x7f00000000c0)=[{0x5, 0x5, 0x2, 0x10001, @tick=0x7, {0x6, 0x1f}, {0x2, 0xca}, @result={0xc2, 0x7}}, {0x6, 0xfffffffffffffffb, 0xba, 0x5, @tick=0x400000000000000, {0x7, 0x1}, {0x10000, 0x7ff}, @raw8={"c255d0c6aeb7de7e0285dfdf"}}, {0x80000001, 0x3, 0x2, 0x6, @tick=0x7, {0x81, 0x2}, {0xff00000000000}, @raw32={[0x6, 0x5]}}, {0x8536, 0x3, 0x0, 0x6, @time={r2, r3+30000000}, {0x80, 0x5}, {0xe86, 0x8001}, @control={0xfff, 0x2}}, {0x0, 0x9159, 0x800, 0xffffffffffffff7f, @tick=0x1, {0xffff, 0x8}, {0xfffffffffffffeff, 0x4797}, @raw8={"81d92f2f80499fa9db2ef513"}}, {0xbe7f, 0xfffffffffffeffff, 0xa1bf, 0x4, @tick=0x8001, {0xe165, 0x356}, {0x59890000000, 0x7}, @control={0x1, 0x1f, 0x5}}, {0x1, 0x10001, 0x1f, 0xfffffffffffffffd, @tick=0x1, {0xfffffffffffffffe, 0x7dc}, {0x4, 0x5}, @connect={{0xc73, 0xd2f}, {0x10000000, 0x4}}}], 0x150) 2018/04/10 11:06:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:05 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:05 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0xfffffffffffffee7) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) [ 79.017946] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 79.028719] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:06 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:06 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000180)={{&(0x7f0000000080)=""/213, 0xd5}, &(0x7f0000000000), 0x50}, 0x20) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000300)={{&(0x7f00000001c0)=""/233, 0xe9}, &(0x7f00000002c0)}, 0x20) 2018/04/10 11:06:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:06 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:06 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:06 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 79.334365] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:07 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0xfffffffffffffffc, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 2018/04/10 11:06:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:07 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:07 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:07 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:07 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000340)={0x2}, 0x4) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20020000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xc0, 0x1, 0x7, 0x4, 0x70bd2c, 0x25dfdbfd, {0x7, 0x0, 0x8}, [@nested={0xac, 0x50, [@generic="4e4c6a21bfd34b964214d2b9fc3d7183cb3f2752bec794c7a1dd6a209664bd1509812513e83fcc902efc948bdfb462120a109144bb69194916acecec0b4517ef2ba1e1fd8aede76778dba17a03c04e19da8ea0964692a46c2981c5ea15965ad7f79a", @typed={0x8, 0x90, @uid=r1}, @generic="9cf310240fc10407951d92a724940ed178c6547a0426418ec9ebe067861d3e2dc2a638b06163574f95cd53515b971337bd901d2fc23272c593b353a0dfcd"]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000002c0)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:07 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:07 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:07 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:07 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) socketpair$inet6(0xa, 0x80e, 0xffff, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0xfffffffffffffffa}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000100)={r2, 0x3, 0x20, 0xfffffffffffffff8, 0x2}, &(0x7f0000000140)=0x18) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) 2018/04/10 11:06:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = semget$private(0x0, 0x4, 0x100) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000080)=""/173) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:08 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:08 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) r1 = dup(r0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000080)) 2018/04/10 11:06:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x7) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80001}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x400, 0x70bd29, 0x25dfdbfc, {0x3}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000040) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:08 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = accept4(r0, &(0x7f0000000080)=@in6, &(0x7f0000000100)=0x80, 0x800) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140)=[{0x8, 0x9}, {0xf, 0x4}, {0x8}, {0xa, 0x99}], 0x4) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:09 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0xe0) ioctl$TIOCEXCL(r1, 0x540c) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0xfffffffffffffffe, @local={0xac, 0x14, 0x14, 0xaa}}, 0xfe80) 2018/04/10 11:06:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000), 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000), 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) shmget$private(0x0, 0x1000, 0x4, &(0x7f0000ffc000/0x1000)=nil) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x3, 0x4002) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000140)={0x2, 0x1db}) unshare(0x200) r2 = memfd_create(&(0x7f0000000000)="27707070307d26656d305dc02900", 0x3) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000000c0)=0x1e) 2018/04/10 11:06:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r1, &(0x7f00000000c0)="16", 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x18000, 0x0) statx(r1, &(0x7f0000000240)='./file0\x00', 0x20000000003fe, 0x840, &(0x7f0000000100)) r2 = dup3(r0, r0, 0x80000) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000000)=0x44, 0x4) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:09 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:09 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) shmget$private(0x0, 0x1000, 0x4, &(0x7f0000ffc000/0x1000)=nil) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x3, 0x4002) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000140)={0x2, 0x1db}) unshare(0x200) r2 = memfd_create(&(0x7f0000000000)="27707070307d26656d305dc02900", 0x3) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000000c0)=0x1e) 2018/04/10 11:06:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:09 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) r1 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0x4, r2) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffff, 0x20000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000140)) 2018/04/10 11:06:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f0000002901)='dev ', 0x0) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/242, &(0x7f0000000000)=0xf2) 2018/04/10 11:06:10 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) write(0xffffffffffffffff, &(0x7f00000000c0)="16", 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0x4000008000000002, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) setsockopt$ipx_IPX_TYPE(r1, 0x100, 0x1, &(0x7f00000000c0)=0x40, 0x4) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000100)={{0x0, 0x6}, 0x2}, 0x10) 2018/04/10 11:06:10 executing program 7: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) write(0xffffffffffffffff, &(0x7f00000000c0)="16", 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:10 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x200000000000, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000280)={0xb0d, 0xf2, 0x20, {r1, r2+30000000}, 0xff, 0x7f}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0xd0, 0x1}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={r3, 0xffffffff, 0x10, 0x7, 0x3}, &(0x7f0000000200)=0x18) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x125000, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080)=0x400, 0x4) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000140)=0x3, 0x4) 2018/04/10 11:06:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) write(0xffffffffffffffff, &(0x7f00000000c0)="16", 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:10 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0x4000008000000002, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) setsockopt$ipx_IPX_TYPE(r1, 0x100, 0x1, &(0x7f00000000c0)=0x40, 0x4) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000100)={{0x0, 0x6}, 0x2}, 0x10) [ 83.849147] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:10 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000080)={r0, 0x8, 0xfb, "a890f20ec5756b988d313a1df3d78c7c581d731f89bc08c445bab45b1c72c079920ee194d7d4c44b54faa3097c95f2f2c9fc388a21331175647a93b9cef883d29582d0c64d9a0dbbd393238829c994e81f377be57b959021f4dc943d39cdfb3aca00da45915aea0bc56375a1d80343e91f55c346651c2ae875f3ab54a6502292335e16aad74305edd8c0d51f254b33f824d464d7cd8735ba744dd58be310bbb581f690fbae6bb78f532a6f52540bd7dff398715aed908f63"}) 2018/04/10 11:06:10 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005580)='./cgroup.net\x00', 0x200002, 0x0) r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r0, &(0x7f00000000c0)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="480000001400030300000000000000000a000000", @ANYBLOB="1400020000000000e3ff0000000000000000000008000800000c00001400060000000000f30e00000000000000000000"], 0x2}, 0x1}, 0x0) 2018/04/10 11:06:11 executing program 4: 2018/04/10 11:06:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:11 executing program 5: [ 84.191348] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:11 executing program 4: 2018/04/10 11:06:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:11 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000), 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:11 executing program 0: socketpair(0x3, 0x6, 0x10001, &(0x7f0000002380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet6(r0, &(0x7f0000002400)={0x0, 0x0, 0x0, @dev}, &(0x7f00000023c0)=0xfffffe9c, 0x80800) recvmmsg(r1, &(0x7f0000002200)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000000c0)=""/44, 0x2c}, {&(0x7f0000000100)=""/57, 0x39}, {&(0x7f0000000140)=""/170, 0xaa}, {&(0x7f0000000200)=""/25, 0x19}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/149, 0x95}, {&(0x7f0000001300)=""/39, 0x27}, {&(0x7f0000001380)=""/144, 0x90}], 0x8, &(0x7f00000014c0)=""/104, 0x68, 0x2}, 0x5}, {{&(0x7f0000001540)=@ethernet={0x0, @local}, 0x80, &(0x7f0000001840)=[{&(0x7f00000015c0)=""/59, 0x3b}, {&(0x7f0000001600)=""/31, 0x1f}, {&(0x7f0000001640)=""/222, 0xde}, {&(0x7f0000001740)=""/232, 0xe8}], 0x4, &(0x7f0000001880)=""/169, 0xa9, 0x4}, 0x10001}, {{&(0x7f0000001940)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001b00)=[{&(0x7f00000019c0)=""/71, 0x47}, {&(0x7f0000001a40)=""/158, 0x9e}], 0x2, &(0x7f0000001b40)=""/105, 0x69, 0x1}, 0x2}, {{&(0x7f0000001bc0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001c40)=""/86, 0x56}, {&(0x7f0000001cc0)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x3}, 0x9}, {{&(0x7f0000001e00)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001e80)=""/91, 0x5b}, {&(0x7f0000001f00)=""/12, 0xc}, {&(0x7f0000001f40)=""/178, 0xb2}, {&(0x7f0000002000)=""/204, 0xcc}], 0x4, &(0x7f0000002140)=""/181, 0xb5, 0x2}, 0x800}], 0x5, 0x40000000, &(0x7f0000002340)={0x77359400}) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:11 executing program 1: 2018/04/10 11:06:11 executing program 5: 2018/04/10 11:06:11 executing program 3: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r0, &(0x7f00000000c0)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000), 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:12 executing program 1: [ 85.027546] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:12 executing program 4: 2018/04/10 11:06:12 executing program 5: pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) futex(&(0x7f000031dffc), 0x400000085, 0x0, &(0x7f0000004000), &(0x7f0000000000), 0x4030000004) 2018/04/10 11:06:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:12 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x200, 0x400000) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x1000000, @loopback=0x7f000001}, 0xbc) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000080)={0x10001, 0x0, 0x7fffffff, 0x100, 0x8, 0xf80, 0x8, 0x3, 0x0, 0xfffffffffffffff9, 0x4, 0xbe4}) 2018/04/10 11:06:12 executing program 1: 2018/04/10 11:06:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:12 executing program 4: 2018/04/10 11:06:12 executing program 5: pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) futex(&(0x7f000031dffc), 0x400000085, 0x0, &(0x7f0000004000), &(0x7f0000000000), 0x4030000004) 2018/04/10 11:06:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000940)=[{{&(0x7f0000000040)=@in6={0xa, 0x4e23, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000100)}}], 0x1, 0x0) 2018/04/10 11:06:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 85.604542] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:12 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1ff, 0x8000) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@int=0x37, 0x4) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00', 0x54, "71f7a62983be91703815e61f5717198f29dfeaa9867b59824c50cfc80cceeb66e0d6b22c0c12975f90e7d07c1e5e788a446dff507d0ef36fcee6cc5e7a0f40f13ec956aa408ef0523830f72eb49a7533120fec87"}, &(0x7f0000000140)=0x78) 2018/04/10 11:06:12 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) 2018/04/10 11:06:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:12 executing program 5: pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) futex(&(0x7f000031dffc), 0x400000085, 0x0, &(0x7f0000004000), &(0x7f0000000000), 0x4030000004) 2018/04/10 11:06:12 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000940)=[{{&(0x7f0000000040)=@in6={0xa, 0x4e23, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x80, &(0x7f0000000100)}}], 0x1, 0x0) 2018/04/10 11:06:12 executing program 3: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 85.988684] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 85.999614] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 2018/04/10 11:06:13 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f00000005c0), 0x1000, &(0x7f00000006c0)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140), 0x0, 0x8001}], 0x0, &(0x7f0000000580)=ANY=[]) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x7, 0x11, r0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x15555555555555bf, &(0x7f00000002c0), 0x0, &(0x7f0000000780)=ANY=[]) madvise(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x9) 2018/04/10 11:06:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000797ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) ioctl(r0, 0x20000000002287, &(0x7f0000000000)) 2018/04/10 11:06:13 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:13 executing program 0: remap_file_pages(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x4, 0x1, 0x1) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) syncfs(r0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCFLSH(r1, 0x540b, 0x7) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xcc00021}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="10081000", @ANYRES16=r2, @ANYBLOB="20002bbd7000ffdbdf2503000000080001004e21000008000400880000000800020002000000080001004e22000004000500040005000800040002000000040005000800040001000000"], 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) fadvise64(r0, 0x0, 0x2, 0x6) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000001340)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0) 2018/04/10 11:06:13 executing program 3: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) 2018/04/10 11:06:13 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 86.143575] mmap: syz-executor0 (6777) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/10 11:06:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000), 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x200408d4, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/10 11:06:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000aeb000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14}, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, {[@timestamp={0x44, 0xc, 0x7, 0x4, 0x0, [{}, {}]}]}}, @icmp=@address_reply={0x12}}}}}, &(0x7f0000000000)) 2018/04/10 11:06:13 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="05", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 86.357468] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 86.688843] ================================================================== [ 86.696267] BUG: KMSAN: uninit-value in copy_page_to_iter+0x754/0x1b70 [ 86.702931] CPU: 1 PID: 6812 Comm: blkid Not tainted 4.16.0+ #83 [ 86.709063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.718402] Call Trace: [ 86.720976] dump_stack+0x185/0x1d0 [ 86.724611] ? kmsan_internal_check_memory+0x145/0x1d0 [ 86.729866] kmsan_report+0x142/0x240 [ 86.733654] kmsan_internal_check_memory+0x164/0x1d0 [ 86.738736] kmsan_copy_to_user+0x69/0x160 [ 86.742964] copy_page_to_iter+0x754/0x1b70 [ 86.747277] ? radeon_atom_encoder_disable+0xada/0xb70 [ 86.752542] generic_file_read_iter+0x2ee8/0x43f0 [ 86.757385] blkdev_read_iter+0x20d/0x280 [ 86.761514] ? blkdev_write_iter+0x5f0/0x5f0 [ 86.765902] __vfs_read+0x6fb/0x8e0 [ 86.769513] vfs_read+0x36c/0x6c0 [ 86.772960] SYSC_read+0x172/0x360 [ 86.776502] SyS_read+0x55/0x80 [ 86.779770] do_syscall_64+0x309/0x430 [ 86.783655] ? vfs_write+0x8d0/0x8d0 [ 86.787365] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 86.792548] RIP: 0033:0x7f825c099310 [ 86.796252] RSP: 002b:00007ffdd28d4cb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 86.803951] RAX: ffffffffffffffda RBX: 0000000000002000 RCX: 00007f825c099310 [ 86.811206] RDX: 0000000000000561 RSI: 0000000001bc25a8 RDI: 0000000000000003 [ 86.818454] RBP: 0000000001bc2580 R08: 0000000000000018 R09: 0000000001680000 [ 86.825698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001bbf030 [ 86.832945] R13: 0000000000000561 R14: 0000000001bbf080 R15: 0000000001bc2598 [ 86.840193] [ 86.841794] Uninit was stored to memory at: [ 86.846102] kmsan_internal_chain_origin+0x12b/0x210 [ 86.851190] kmsan_memcpy_origins+0x11d/0x170 [ 86.855661] __msan_memcpy+0x19f/0x1f0 [ 86.859527] _copy_to_iter+0x852/0x28f0 [ 86.863477] copy_page_to_iter+0x383/0x1b70 [ 86.867780] shmem_file_read_iter+0x99f/0x1180 [ 86.872338] do_iter_readv_writev+0x7bb/0x970 [ 86.876813] do_iter_read+0x303/0xd70 [ 86.880589] vfs_iter_read+0x118/0x180 [ 86.884453] loop_queue_work+0x270e/0x3ef0 [ 86.888665] kthread_worker_fn+0x58f/0x900 [ 86.892874] loop_kthread_worker_fn+0x90/0xb0 [ 86.897344] kthread+0x539/0x720 [ 86.900686] ret_from_fork+0x35/0x40 [ 86.904370] Uninit was created at: [ 86.907886] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 86.912877] kmsan_alloc_page+0x82/0xe0 [ 86.916915] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 86.921646] alloc_pages_vma+0xcc8/0x1800 [ 86.925769] shmem_alloc_and_acct_page+0x6d5/0x1000 [ 86.930760] shmem_getpage_gfp+0x35db/0x5770 [ 86.935144] shmem_file_read_iter+0x508/0x1180 [ 86.939703] do_iter_readv_writev+0x7bb/0x970 [ 86.944177] do_iter_read+0x303/0xd70 [ 86.947952] vfs_iter_read+0x118/0x180 [ 86.951815] loop_queue_work+0x270e/0x3ef0 [ 86.956040] kthread_worker_fn+0x58f/0x900 [ 86.960267] loop_kthread_worker_fn+0x90/0xb0 [ 86.964749] kthread+0x539/0x720 [ 86.968093] ret_from_fork+0x35/0x40 [ 86.971777] [ 86.973378] Bytes 0-1376 of 1377 are uninitialized [ 86.978278] ================================================================== [ 86.985613] Disabling lock debugging due to kernel taint [ 86.991040] Kernel panic - not syncing: panic_on_warn set ... [ 86.991040] [ 86.998399] CPU: 1 PID: 6812 Comm: blkid Tainted: G B 4.16.0+ #83 [ 87.005817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.015146] Call Trace: [ 87.017724] dump_stack+0x185/0x1d0 [ 87.021356] panic+0x39d/0x940 [ 87.024538] ? kmsan_internal_check_memory+0x145/0x1d0 [ 87.029791] kmsan_report+0x238/0x240 [ 87.033581] kmsan_internal_check_memory+0x164/0x1d0 [ 87.038664] kmsan_copy_to_user+0x69/0x160 [ 87.042879] copy_page_to_iter+0x754/0x1b70 [ 87.047183] ? radeon_atom_encoder_disable+0xada/0xb70 [ 87.052440] generic_file_read_iter+0x2ee8/0x43f0 [ 87.057268] blkdev_read_iter+0x20d/0x280 [ 87.061397] ? blkdev_write_iter+0x5f0/0x5f0 [ 87.065789] __vfs_read+0x6fb/0x8e0 [ 87.069397] vfs_read+0x36c/0x6c0 [ 87.072828] SYSC_read+0x172/0x360 [ 87.076349] SyS_read+0x55/0x80 [ 87.079606] do_syscall_64+0x309/0x430 [ 87.083471] ? vfs_write+0x8d0/0x8d0 [ 87.087165] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 87.092336] RIP: 0033:0x7f825c099310 [ 87.096032] RSP: 002b:00007ffdd28d4cb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 87.103726] RAX: ffffffffffffffda RBX: 0000000000002000 RCX: 00007f825c099310 [ 87.110982] RDX: 0000000000000561 RSI: 0000000001bc25a8 RDI: 0000000000000003 [ 87.118239] RBP: 0000000001bc2580 R08: 0000000000000018 R09: 0000000001680000 [ 87.125487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001bbf030 [ 87.132734] R13: 0000000000000561 R14: 0000000001bbf080 R15: 0000000001bc2598 [ 87.140390] Dumping ftrace buffer: [ 87.143907] (ftrace buffer empty) [ 87.147597] Kernel Offset: disabled [ 87.151197] Rebooting in 86400 seconds..