INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.15' (ECDSA) to the list of known hosts. 2018/04/12 00:17:06 fuzzer started 2018/04/12 00:17:07 dialing manager at 10.128.0.26:41677 2018/04/12 00:17:13 kcov=true, comps=false 2018/04/12 00:17:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a2c000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = dup(r0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f000081cffc)=0x2) r2 = syz_open_pts(r1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x2) 2018/04/12 00:17:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000200)=""/250, 0xfa}], 0x1, 0x0) 2018/04/12 00:17:15 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x28, 0x14, 0x7, 0x0, 0x0, {0x1}, [@generic="8738124d82350000fab45e529840ffe4b3"]}, 0x28}, 0x1}, 0x0) 2018/04/12 00:17:15 executing program 1: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x7}, 0x1c) sendmmsg(r0, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)}}, {{&(0x7f0000000400)=@in={0x2, 0x4e24, @rand_addr=0x7}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000003740)}}], 0x2, 0x0) 2018/04/12 00:17:15 executing program 4: 2018/04/12 00:17:15 executing program 3: 2018/04/12 00:17:15 executing program 5: 2018/04/12 00:17:15 executing program 6: syzkaller login: [ 43.200294] ip (3680) used greatest stack depth: 54672 bytes left [ 43.755739] ip (3731) used greatest stack depth: 54312 bytes left [ 44.947697] ip (3845) used greatest stack depth: 54296 bytes left [ 45.747197] ip (3912) used greatest stack depth: 54232 bytes left [ 46.689473] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.796770] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.881611] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 46.992210] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.026428] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.039963] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.159756] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 47.238162] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 55.923859] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.945269] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.131068] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.156989] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.234581] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.255948] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.380962] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.524983] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 56.709564] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.716224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.731886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.769967] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.777519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.795842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.901724] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.910254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.924608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.981962] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 56.988341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.996820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.030886] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.039744] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.048132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.058702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.100700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.114753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.346594] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.352904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.367682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.406927] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 57.413259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.425834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2018/04/12 00:17:33 executing program 7: 2018/04/12 00:17:33 executing program 5: 2018/04/12 00:17:34 executing program 4: r0 = accept4$ipx(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x10, 0x80800) ioctl$sock_ipx_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'vlan0\x00', {0x4, 0x10000, 0x1f, "03cdf764bb6a", 0x1000}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) ioctl$KDGKBLED(r1, 0x80045113, &(0x7f0000000fff)) mq_open(&(0x7f0000000140)='vlan0\x00', 0x40, 0x100, &(0x7f0000000180)={0x4, 0x1f, 0x7, 0x1, 0x7f, 0x1, 0x8, 0x33b8}) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) 2018/04/12 00:17:34 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1010}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0x88, 0x0, 0x4, 0x0, 0x0, {0xc}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000001}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffff7fff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}]}, 0x88}, 0x1, 0x0, 0x0, 0x80}, 0x20000004) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0x10000000000c5, @time={0x0, 0x989680}, 0x8}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000200)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/12 00:17:34 executing program 6: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000200)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f0000000740)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 2018/04/12 00:17:34 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000240)=""/105, 0x69}, 0x0) close(0xffffffffffffffff) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) 2018/04/12 00:17:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) 2018/04/12 00:17:34 executing program 7: creat(&(0x7f0000000940)='./file0\x00', 0x0) truncate(&(0x7f0000000900)='./file0\x00', 0x0) creat(&(0x7f0000000980)='./file0\x00', 0x0) 2018/04/12 00:17:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:34 executing program 0: r0 = inotify_init1(0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x5f, r0, 0x0) move_pages(0x0, 0x58f, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) setsockopt$packet_int(r1, 0x107, 0x1b, &(0x7f0000000040)=0x100000000, 0x4) r2 = syz_open_dev$usbmon(&(0x7f0000000680)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f00000006c0)={{0xa, 0x4e22, 0x9, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x4}, {0xa, 0x4e24, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x6}, 0xffffffff80000000, [0x9, 0xf6c, 0xffffffffffffff57, 0x37ce4, 0x10000, 0x4, 0x8001, 0xfff]}, 0x5c) [ 59.270981] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/12 00:17:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0xd8e25a61) fsetxattr(r0, &(0x7f0000000080)=@random={'system.', 'memory.stat\x00'}, &(0x7f0000000100)='keyring^cgroupselinux//vboxnet1%\x00', 0x21, 0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f00000001c0)=[{0x20, 0x0, 0x0, 0xfffffffffffff008}, {0x6}]}, 0x10) 2018/04/12 00:17:34 executing program 7: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f000006bbc5)='/dev/sequencer\x00', 0x40a02, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @addr={0x4}}], 0x30) write$sndseq(r0, &(0x7f0000fbde80)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote={{0x81, 0x3}, 0x0, &(0x7f0000cdcfd0)={0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw8={"d8ab0f014fb8ca604dbe1e54"}}}}], 0x30) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000080)={r1}) 2018/04/12 00:17:34 executing program 6: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000200)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f0000000740)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 2018/04/12 00:17:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x1f) sendfile(r0, r0, &(0x7f00000000c0), 0x80000001) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0xfffffffffffffff7, 0x10001, 0xe41d, 0x9, 0x3, 0x3e, 0x3, 0x221, 0x38, 0x3ba, 0x2, 0x9, 0x20, 0x2, 0x0, 0x9}, [{0x70000007, 0xe1, 0x7, 0xffc0000000000, 0x40, 0x7, 0x3, 0x8}, {0x70000000, 0x7f, 0x0, 0x5, 0x3, 0x7f, 0xfffffffffffffff9, 0x1f}], "", [[], [], [], [], [], [], [], [], []]}, 0x978) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r1}, &(0x7f0000000040)=0x8) 2018/04/12 00:17:34 executing program 4: r0 = accept4$ipx(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x10, 0x80800) ioctl$sock_ipx_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'vlan0\x00', {0x4, 0x10000, 0x1f, "03cdf764bb6a", 0x1000}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) ioctl$KDGKBLED(r1, 0x80045113, &(0x7f0000000fff)) mq_open(&(0x7f0000000140)='vlan0\x00', 0x40, 0x100, &(0x7f0000000180)={0x4, 0x1f, 0x7, 0x1, 0x7f, 0x1, 0x8, 0x33b8}) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) 2018/04/12 00:17:34 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000010c0)={0x0, @in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x9}}}, &(0x7f0000001180)=0x98) r1 = getpid() sched_getscheduler(r1) prlimit64(r1, 0xd, &(0x7f0000000000)={0x2, 0x2}, &(0x7f0000000040)) 2018/04/12 00:17:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) getpriority(0x2, r1) sendmsg$nl_route(r0, &(0x7f0000d1d000)={&(0x7f0000d89ff4)={0x10}, 0xc, &(0x7f00006fa000)={&(0x7f0000000180)=@setlink={0x30, 0x13, 0x301, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8, 0x1c}, @IFLA_NET_NS_PID={0x8, 0x13}]}, 0x30}, 0x1}, 0x0) 2018/04/12 00:17:35 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x200000c, 0x32, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000003000)='-.[vmnet0^\x00', 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000140)={r2, 0x80000, r0}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) r4 = dup2(r3, r0) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x0, 0x41, &(0x7f00000000c0)={'security\x00'}, &(0x7f00000001c0)=0x24) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000000)) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000040)={0x9, 0x0, 0x0, 0x65a}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000080)={0x7c000, r5}) close(r1) 2018/04/12 00:17:35 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x1, @loopback=0x7f000001}, 0x10) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080)={[0x39, 0x34, 0x31, 0x37, 0x36, 0x39]}, 0x6) 2018/04/12 00:17:35 executing program 7: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x20, 0x8000, 0x3, r0}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000000000)='syzkaller\x00', 0xffffffffffffffff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$TIOCCBRK(r1, 0x5428) 2018/04/12 00:17:35 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1010}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0x88, 0x0, 0x4, 0x0, 0x0, {0xc}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000001}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffff7fff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}]}, 0x88}, 0x1, 0x0, 0x0, 0x80}, 0x20000004) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0x10000000000c5, @time={0x0, 0x989680}, 0x8}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000200)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/12 00:17:35 executing program 6: setrlimit(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x20080100000}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 2018/04/12 00:17:35 executing program 3: shmget$private(0x0, 0xfffffffffeffffff, 0x0, &(0x7f00006f2000/0x4000)=nil) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0xd5, 0x9, 0x7, 0xf482, 0x0, 0x81, 0x0, 0x9, 0x4, 0x3, 0x100, 0xb2, 0x3110e92d, 0x7fff, 0x8, 0x6, 0x5, 0x6, 0x9, 0x8, 0x200, 0x8, 0x6, 0x92d, 0x8, 0x42, 0x9, 0x9, 0x5, 0x2, 0x100000001, 0x6, 0x3, 0x7fffffff, 0x1ff, 0x1ff, 0x0, 0xfffffffffffffff7, 0x4, @perf_config_ext={0x8001, 0xd7ab}, 0x224c, 0x1, 0x8001, 0x7, 0x7f, 0x2, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x2) fchmod(r0, 0x28) ioperm(0x7, 0x6, 0x6) r1 = dup(0xffffffffffffffff) setsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000000)=0x4, 0x4) [ 60.303365] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/12 00:17:35 executing program 6: r0 = memfd_create(&(0x7f0000000080)="7d7d9574686f5e707230630100000400001e0070ff6f630ff8", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000440)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB='\t'], &(0x7f0000000200)=0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000000000001200"}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote={{}, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @result}}}], 0xffffff00) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000027fb0)={0x203, @time={0x77359400}}) seccomp(0x800000000001, 0x0, &(0x7f0000000ff0)={0x1, &(0x7f00000f7ff0)}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x10800, 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x1) 2018/04/12 00:17:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00002c8000)='net/ip_tables_names\x00') write$binfmt_aout(r0, &(0x7f0000000000)={{0x10b, 0x0, 0x7, 0xa, 0x38b, 0x6178, 0x2ec, 0x100000001}, "bcb8006329dcd05812d13c5027b15fd8e0a27fba287570e21ab781db"}, 0x3c) pread64(r0, &(0x7f0000000040), 0x0, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)) 2018/04/12 00:17:35 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000d19000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101400, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000080)="5a7633cd35494ad35f43d3e31a89") mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)) 2018/04/12 00:17:35 executing program 0: r0 = socket$inet(0x10, 0xa, 0x800000000000000a) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000eff0)=[{&(0x7f0000010000)="240000001900030007ff0907000083be8020000000040005031d85680300a3a2d188737e", 0x24}], 0x1}, 0x0) 2018/04/12 00:17:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x40020}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18410f89abbc7dbb5a73e10b84edc890000000000000000000000000000000070000000000000000"], &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x4e3, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/12 00:17:35 executing program 4: r0 = memfd_create(&(0x7f0000000000)='!*[bdev\x00', 0x0) pread64(r0, &(0x7f0000000080)=""/218, 0xda, 0x400000000000002) pipe(&(0x7f0000000040)) 2018/04/12 00:17:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) [ 60.710842] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/12 00:17:36 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000fb6000)=""/28, 0x1c) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1010}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0x88, 0x0, 0x4, 0x0, 0x0, {0xc}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000001}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffff7fff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}]}, 0x88}, 0x1, 0x0, 0x0, 0x80}, 0x20000004) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0x10000000000c5, @time={0x0, 0x989680}, 0x8}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000200)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/12 00:17:36 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000001580)='./file0\x00', 0x80003, 0x0) ioctl$KDDISABIO(r1, 0x4b37) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000015c0)=ANY=[@ANYRES32=r0, @ANYBLOB="0200000000000f82bb1a103338eab990ae72d1878030c58f129cd5d4db0f8f92038a5c950d68efc5803792deb890b568f30104220bd8c290d342bb99857d86187a4480fcd4a99bc83e850d5af4e18cc340f744cfa8722c1915ba4d93d5a13f9b698fbd4dd409279f7a6ddd574b0575d44deda83e349a392574bb71a575d55885c4038dbb4586887c4ee8631a0306ae7c12c0a1717d03b2184e55057dd6355eacfc9995895ff5544ddb68e80741e17ce2018ffbf18790c7"]) sendmsg$key(r0, &(0x7f0000360000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f000033c000)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002004e207f0000010000000000000000030005000000000002004e2000000000000000000000000008001200020001000000000000000000300000000201000000000000000000000200000000000000000000000000200100000000000000000000ffffe0000001"], 0x80}, 0x1}, 0x0) 2018/04/12 00:17:36 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) prctl$getname(0x10, &(0x7f0000000100)=""/87) 2018/04/12 00:17:36 executing program 4: unshare(0x20040000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xd15000)=nil, 0xd15000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = accept4(r0, &(0x7f00000000c0)=@ethernet={0x0, @link_local}, &(0x7f0000000140)=0x80, 0x0) getsockname$ipx(r1, &(0x7f0000000040), &(0x7f0000000000)=0x10) 2018/04/12 00:17:36 executing program 7: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() sched_setattr(r0, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x200000000000003, 0x4001, 0xfffffffffffffffc, 0x0, 0x1000009}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000080)="56027fb23f7562123490fe027919b003d83597d967aa2c4e208c281b9da8c2b95e5fb4720d54a6a686240fdce2", 0x2d) 2018/04/12 00:17:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2}, @in={0x2}], 0x20) 2018/04/12 00:17:36 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x200000c, 0x32, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000003000)='-.[vmnet0^\x00', 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000140)={r2, 0x80000, r0}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) r4 = dup2(r3, r0) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x0, 0x41, &(0x7f00000000c0)={'security\x00'}, &(0x7f00000001c0)=0x24) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000000)) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000040)={0x9, 0x0, 0x0, 0x65a}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000080)={0x7c000, r5}) close(r1) [ 61.308455] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/12 00:17:36 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x200000c, 0x32, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000003000)='-.[vmnet0^\x00', 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000140)={r2, 0x80000, r0}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) r4 = dup2(r3, r0) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x0, 0x41, &(0x7f00000000c0)={'security\x00'}, &(0x7f00000001c0)=0x24) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000000)) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000040)={0x9, 0x0, 0x0, 0x65a}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000080)={0x7c000, r5}) close(r1) 2018/04/12 00:17:36 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f000039c000), 0x4) sendto$inet(r0, &(0x7f0000a92000), 0xfffffffffffffc5d, 0x800000020000001, &(0x7f0000303000)={0x2, 0x0, @loopback=0x7f000001}, 0x46) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x4000, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000080)={0x6, 0x435, 0x0, 0x0, 0x8, 0x1ff, 0x3}, 0xc) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000), 0x4) r2 = epoll_create(0x2e20) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00003de000)) 2018/04/12 00:17:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0xc9, &(0x7f00000000c0)=0xffffffff, 0x71) sendto$inet6(r0, &(0x7f0000737000), 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'mangle\x00', 0x1, "ee"}, &(0x7f0000000040)=0x25) 2018/04/12 00:17:36 executing program 4: unshare(0x400) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xecec, 0x80) sendto$inet6(r1, &(0x7f0000000040)="c70760ff019138368ca29c8e0c1af6bcc49292e71207f208513b22686aa0d9587824a22d5020d28b8c566449514c3ef6794d9c57d90ec0abc50a09aeb45c455206fc6f3067f88ccb49e4983ea73320b91eb1c79221a26feed644987d26f180558ee62e2ae9a1fbcd31a90dff767f47189443e33b4f3f0c44d5989140ae9888afac3cd1aeb3d88b2faf75b8fa5a524e0d8f1a7b", 0x93, 0x800, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) r2 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, &(0x7f0000000140)=0x90) 2018/04/12 00:17:36 executing program 6: unshare(0x40600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x3, &(0x7f0000000000), 0x2cd) r1 = dup3(r0, r0, 0x80000) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000000)=0x2) 2018/04/12 00:17:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) close(r0) 2018/04/12 00:17:36 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_ipx_SIOCIPXCFGDATA(r1, 0x89e2, &(0x7f0000000140)) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r0, 0x806, 0xfffffffffffffffe, 0x7fffffff) ioctl$fiemap(r2, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000fc00fd7fffaa8b756302000000000000000000000000000000000000000000000000000000000000"]) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) fallocate(r2, 0x0, 0x0, 0x5) rt_sigsuspend(&(0x7f00000000c0)={0x101}, 0x8) 2018/04/12 00:17:36 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20000000000039, &(0x7f0000302fe8)="ff0204000000def31d001100000000d8144e000000000205", 0x18) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x40000001, 0x9, @mcast1={0xff, 0x1, [], 0x1}, 0x2}, 0xfffffffffffffe82) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, [], 0xe}}, 0x1c) r1 = shmget(0x0, 0x1000, 0x400, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000100)=""/188) [ 61.660340] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/12 00:17:37 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f000039c000), 0x4) sendto$inet(r0, &(0x7f0000a92000), 0xfffffffffffffc5d, 0x800000020000001, &(0x7f0000303000)={0x2, 0x0, @loopback=0x7f000001}, 0x46) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x4000, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000080)={0x6, 0x435, 0x0, 0x0, 0x8, 0x1ff, 0x3}, 0xc) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000), 0x4) r2 = epoll_create(0x2e20) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00003de000)) 2018/04/12 00:17:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00007d5000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000018000)) ioctl$TCXONC(r0, 0x540a, 0x8000) 2018/04/12 00:17:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) close(r0) 2018/04/12 00:17:37 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0xc) r1 = socket$inet(0x2, 0x801, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x6, 0xd, &(0x7f0000000000)={{{@in6=@loopback={0x0, 0x1}, @in=@rand_addr}}, {{@in6=@loopback={0x0, 0x1}}}}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="040000003851384b47694c744c499c945b98db454ac49ef585d8dbfc3d0ed7f340756b1360a05cd27ce0014ab1c7bbbb814f6a161484f771fccb51d84fb0ad12a34cb25fcbbf5f3c35712a3ff9ec5060376cfdd735f5aa31a968c532fd7644f7f851613cfe3ecb9079f8a2c5d03eebbca580d2e7613dab1ff1fc8f6269ddfb0905b1d7f06bda9491934e23d8b3441fc7cf25ff592f58c561bf6b9a21c95eb7e2e4ab020cc4d901b4b9d3f13a3b8d8da43b02f1e861daa0409e77bced150b6691604f19ff09c4e08716f07b69fe106872f56bae056b6800000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000400)=0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000100)={r2, 0x4, 0x30, 0xfffffffffffffff7, 0x3}, &(0x7f0000000140)=0x18) restart_syscall() ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000440)={0x0, 0x5, 0x7, 0x9, 0xfffffffffffffffd, 0x20, 0x48e3a254, 0x7, 0x20, 0x3, 0x7fff}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r3, 0x5, 0x6, [0x1, 0xfdcb, 0x3, 0x6, 0xf, 0x3]}, &(0x7f00000001c0)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000300)={@local, 0x0}, &(0x7f0000000340)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'vlan0\x00', r4}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x8001, @mcast1={0xff, 0x1, [], 0x1}, 0x22}, @in6={0xa, 0x4e21, 0x24be, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, @in6={0xa, 0x4e20, 0x595, @loopback={0x0, 0x1}, 0x8914}, @in6={0xa, 0x4e21, 0x243, @empty, 0xeb49}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x80) 2018/04/12 00:17:37 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$sock_ipx_SIOCIPXCFGDATA(r1, 0x89e2, &(0x7f0000000140)) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r0, 0x806, 0xfffffffffffffffe, 0x7fffffff) ioctl$fiemap(r2, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000fc00fd7fffaa8b756302000000000000000000000000000000000000000000000000000000000000"]) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) fallocate(r2, 0x0, 0x0, 0x5) rt_sigsuspend(&(0x7f00000000c0)={0x101}, 0x8) 2018/04/12 00:17:37 executing program 2: r0 = socket(0x1000000010, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@ipv6_delroute={0x30, 0x19, 0x53d, 0x0, 0x0, {0xa}, [@RTA_MULTIPATH={0x14, 0x9, [{0x9}, {}]}]}, 0x30}, 0x1}, 0x0) 2018/04/12 00:17:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000a56000)=0x1, 0x4) poll(&(0x7f00008aa000)=[{r0}], 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x305c, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000180)={r2, 0x6, &(0x7f0000000080)=[0xfffffffffffffffc, 0x200, 0x9, 0x5, 0x43, 0x80], &(0x7f00000000c0)=[0x2, 0x5], 0x14, 0x3, 0x10001, &(0x7f0000000100)=[0x1, 0x5, 0xfffffffffffffffb], &(0x7f0000000140)=[0x6, 0x7f]}) 2018/04/12 00:17:37 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0)={0x8, 0x3, 0x3, 0x100000001}, 0x6) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f00000001c0)="5bdc5d85ad40d4d279ad6ce440afeb4534580075ef7eeb06052baf4674a13ee10ecf8436b9e4e9a8dc55c8365bf8a60cd0c741387abca8ebd071b4e57d5b2bb794a5091e9ed63601c84fffa86a03f5a6fb71a7f8654bae1fe630ad50d96b4d6dbae8e9dfbe23f06817ab8cc6c013bbddc6f8cb7cfd1c15ba79c848e83fee4acf7d64e3fd5a4c111ad00e8a84d2f576b5a72f86d45becd0c1483a548d15", 0x9d) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="6d616e676c65000000000000010000000000000050caa12e0000000000000400f1f155f9cf8bf4492efa01bdc36ce2b710eb169535bb763fede9109946aeef8c14cd43a382157d475c3ff8c4d3c5343e946d4261ac7c51557165b4648187f9220694540002003e7db4ae459ab42393fe9d6c8f06fb994a5ab4fd34c45c265df41b453377cf2ab2e6bf14147334e8317d31b50d6323f915cc7f48ab6c105b6b60bf96270100222601dd715e34b3d0f60c1f35c905eab415bbe315b67b319b"], &(0x7f0000000080)=0xffffffffffffff93) unshare(0x88000800) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000040)) ftruncate(r0, 0x0) 2018/04/12 00:17:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) fchdir(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000600)='./file2\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000040)='threaded\x00', 0xffc5) dup3(r2, r1, 0x0) fallocate(r1, 0x3, 0x0, 0xffff) [ 62.590249] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/12 00:17:37 executing program 7: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000366000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r0, 0x0) shutdown(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='tunl0\x00', 0x10) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x4) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f00000000c0)={{0xb0, 0x401}, 'port1\x00', 0x0, 0x400, 0x28000000000, 0x2, 0xff, 0x8, 0x2, 0x0, 0x2, 0x4}) ioctl$sock_netdev_private(r2, 0x89f7, &(0x7f00000001c0)="2734eac70e4a2ac0d6") pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) connect$unix(r1, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 2018/04/12 00:17:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x3, 0x84) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x4, 0x3, 0x200, 0xff, 0xffffffff80000001, 0x3f, 0xfffffffffffffffe, 0x8ab2, 0x0}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={r2, 0xfffffffffffffffa}, &(0x7f0000000240)=0x8) setsockopt$inet_group_source_req(r0, 0x0, 0x8000000000030, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1=0xe0000001}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0x108) 2018/04/12 00:17:37 executing program 5: accept4$unix(0xffffffffffffffff, &(0x7f0000fccfe4), &(0x7f0000fcc000)=0x1c, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000fcbfd4)={0x1, 0xa, 0x1, 0xfffffffffffffff7}, 0x2c) 2018/04/12 00:17:37 executing program 3: r0 = epoll_create1(0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x600440, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000100)="4ddc62243a5120aff25b7911cd14ee49", 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0x5, 0x824, 0x8, 0xf9, 0x0, 0x2, 0x40440, 0x4, 0x8, 0xfffffffffffffc00, 0x0, 0x3ff, 0x7fff, 0x6, 0x1ff, 0xfe4, 0x6, 0x80, 0xc2, 0x100, 0x7, 0x0, 0x5, 0x0, 0x8, 0x821, 0x1c, 0x6, 0x3, 0x100, 0xfff, 0x96, 0x4, 0x1c83, 0xffffffffffffffff, 0x18, 0x0, 0x5, 0x0, @perf_config_ext={0x80000001, 0x19e22e55}, 0x80, 0x3, 0xfff, 0x5, 0x3, 0x0, 0xc0}, r1, 0xd, r2, 0xa) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000d36ff4)={0xfc147812c6696267}) timerfd_settime(r3, 0x1, &(0x7f0000005000)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) epoll_pwait(r0, &(0x7f0000a1efac)=[{}], 0x1, 0x0, &(0x7f0000bbfff8), 0x8) 2018/04/12 00:17:37 executing program 0: unshare(0x40600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = creat(&(0x7f0000226000)='./file0\x00', 0x0) r2 = dup2(r1, r0) close(r0) pread64(r2, &(0x7f0000000080)=""/4096, 0x1000, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000001080)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x1ff}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000040)={r3, 0x10000, 0x0, 0x2, 0xb}, &(0x7f0000001140)=0x18) 2018/04/12 00:17:37 executing program 2: prctl$intptr(0x2000000000029, 0x3) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000842fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000e90000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x2208c0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000040)={0x100000000, 0x40928efc}) close(r0) userfaultfd(0x800) 2018/04/12 00:17:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) close(r0) 2018/04/12 00:17:37 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000387000), 0x4) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'teql0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}}) sendmmsg$unix(r1, &(0x7f00000015c0), 0x0, 0x1) connect$unix(r1, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) write(r0, &(0x7f0000495000), 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, &(0x7f0000001480)="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", 0xfb, 0x40000, &(0x7f0000001580)={0x2, 0x4e22}, 0x10) r3 = getpgid(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000040)=r3) fcntl$setlease(r1, 0x400, 0x1000000) close(r0) r4 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r4, &(0x7f0000001440)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x800000}, 0xc, &(0x7f0000001400)=[{&(0x7f0000000300)={0x10c8, 0x26, 0x0, 0x70bd26, 0x25dfdbfc, "", [@typed={0xc, 0x32, @u64=0x5}, @generic="0a40c25dd37af2f74c067e0e17e810b5645f893c744140754e4c39442532d65f77016bb27f5e90efe58d9056c8db537ae6ec67120dc97574c3c9f5a8d92c02cf9462472fbb13b3aa0ade20fb12d35988d9f6db050c753538c0", @nested={0x24, 0x70, [@typed={0xc, 0x61, @str='teql0\x00'}, @typed={0xc, 0x90, @u64=0x8}, @typed={0x8, 0x31, @uid=r5}]}, @typed={0x8, 0x36, @ipv4=@multicast1=0xe0000001}, @typed={0xc, 0x57, @u64=0x4}, @generic="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", @typed={0x4, 0x60}, @nested={0xc, 0x66, [@typed={0x8, 0x10, @uid=r6}]}, @generic="828bb7b6717d2dfc71b70c"]}, 0x10c8}], 0x1, 0x0, 0x0, 0x48040}, 0x800) 2018/04/12 00:17:37 executing program 5: clone(0x200, &(0x7f0000000080), &(0x7f0000000040), &(0x7f0000f8b000), &(0x7f0000804000)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000a7bfc8), &(0x7f00006fcff0)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') r1 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x20000000}) r2 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000d93ff6)=@abs, 0x1b6) lseek(r1, 0x0, 0x4) r4 = syz_open_procfs(r2, &(0x7f0000000100)='maps\x00') dup2(r3, r3) exit(0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x401, 0x8) dup2(r5, r4) [ 63.022344] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/12 00:17:39 executing program 7: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x20000, 0x1e4) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000380)={'nat\x00'}, &(0x7f0000000400)=0x78) r2 = msgget(0x1, 0x100) msgctl$IPC_RMID(r2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, @in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x2c) 2018/04/12 00:17:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={"045bb7eccb2ce27692c56f00", 0x0}) uselib(&(0x7f0000000000)='./file0\x00') r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x3, 0x200000) getsockopt$inet_dccp_int(r2, 0x21, 0x10000001, &(0x7f00000002c0), &(0x7f00000001c0)=0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x8) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="0000000000000300000000000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000082a4a6eba64168a2e002b00"], 0x2c}, 0x1}, 0x0) 2018/04/12 00:17:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f000088b000)='net/dev_snmp6\x00') getdents(r0, &(0x7f0000000000)=""/48, 0x30) getdents64(r0, &(0x7f0000749f33)=""/205, 0xcd) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@multicast1, @multicast1, 0x0}, &(0x7f0000000080)=0xc) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x10}, r1}, 0x14) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f00000001c0)={0x5, &(0x7f0000000100)=[{}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @remote}, {}]}) 2018/04/12 00:17:39 executing program 2: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x4, 0x400000) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/20, 0xfffffe46) 2018/04/12 00:17:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x31, &(0x7f0000000000), 0x0) 2018/04/12 00:17:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:39 executing program 6: ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f00004f3000)='ns/cgroup\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r1, 0x400, 0x70bd28, 0x25dfdbfc, {0x9}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x4000014) ioctl$VT_RELDISP(r0, 0xb701) getsockname$inet(r0, &(0x7f0000000180)={0x0, 0x0, @local}, &(0x7f00000001c0)=0x10) 2018/04/12 00:17:39 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000387000), 0x4) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'teql0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}}) sendmmsg$unix(r1, &(0x7f00000015c0), 0x0, 0x1) connect$unix(r1, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) write(r0, &(0x7f0000495000), 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, &(0x7f0000001480)="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", 0xfb, 0x40000, &(0x7f0000001580)={0x2, 0x4e22}, 0x10) r3 = getpgid(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000040)=r3) fcntl$setlease(r1, 0x400, 0x1000000) close(r0) r4 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r4, &(0x7f0000001440)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x800000}, 0xc, &(0x7f0000001400)=[{&(0x7f0000000300)={0x10c8, 0x26, 0x0, 0x70bd26, 0x25dfdbfc, "", [@typed={0xc, 0x32, @u64=0x5}, @generic="0a40c25dd37af2f74c067e0e17e810b5645f893c744140754e4c39442532d65f77016bb27f5e90efe58d9056c8db537ae6ec67120dc97574c3c9f5a8d92c02cf9462472fbb13b3aa0ade20fb12d35988d9f6db050c753538c0", @nested={0x24, 0x70, [@typed={0xc, 0x61, @str='teql0\x00'}, @typed={0xc, 0x90, @u64=0x8}, @typed={0x8, 0x31, @uid=r5}]}, @typed={0x8, 0x36, @ipv4=@multicast1=0xe0000001}, @typed={0xc, 0x57, @u64=0x4}, @generic="7fa90f948ab73078f1b97d6d0d0f55dc5c925de6fb1034349e68b79c49fcae538b1a3e7de743474fc31f55396db0724e7033b428f88324452d36d96805e635ecf3ef28dcd0e6e3259ecac8c119aba5e704261d388a1e7ca421cc4a6e6166ddb57ec95deb74256a47952a4a347b95081a2a57e897250998d9e3580b9692a5b8145b205a8ef5d90b3c72f3c51f02b2deba7bedb4350a9b9c341938171e7b2f6210d900f90764f1304935faf706de199ed4b16f718ab48642ef1aa64e9ca9db3ff7475f97f99d7cbd264d0608d46e8fa2054ead471833c2dc03f532f4e32556947455c1ee1533c974001f686a8b67874a53778a4ba884cde9a0e32f6eead30cc24ccfe303f46dd0f74028a3f03bb5e33d00d52ab6bb6c0f49988b5ef37e7ec2efc7d8c2850ba35023f53a8f7fa34b5f028d870afd38764964e7ccd1bfe1bac26518e5ef561d702f3d68dd5472b7f665d5eb0c2b09d23740590e1c17deb0a45bca216686e0ede80af37ecfe7e0e3bc3c9a8a6ae36a371422dfa395b3206b4a0132c9a7fe45170a25d50d3893928120018d556cfdb082412d20af92528c62b97e2f2236c9974fa244e4f53e5afb74f2f6225a5cdf7f071e4c02e6ad9483337a1f591323fea9b5b0e75da1671b11001b076b2edcd5efeec279cf370c396d1ae2380517c817a2f0f15fc4ab985879249f38093e7f33e1ea280623fcd916437097ddbd8313a4145c8bfe785c728c1d55c8f1e1874ac637be1fc039893f40832dd16208cef78c5518f72bc306e940c6fab13885ceb05570914fa48770057e8bdc6493074a1b53128fdfac7b3339226b8e1db0cf1519cdbc8615d2e26f0a59a3c8e3257454941bbf948968b94bc79984ecbff93727b4c36cdbfe1d3e92e7878329df6a8f26a5a861527a5c72a2c3ebec8d1bbd50a2fd5c273d9a2f6b024311fb976855ee814595d981682452be795a13a50d5f6533495401226e1fe906c289c85cdbd0aba023bacbf32c89949710f8c9fec88239846a0b95cebf48c140f972b2a4a6d41cc74e3763e4c8cdb5412bd25870cdc1f280047c4dad8b8e93dee3af77f5530248e23e783a46db585058f6d01c218a36b26ef2852ec8e2cdee9203c029c63008e829e7e2c0d53adce6868f4815f2bc7367577b3fa589dad32eb939de24eb5045adda8f9e6aa35bc3a4a7d8700af364afe77fd467fc975dc84d5f63a80c3e9adffc9ff91dc22a570c120a12fa9458ac2125497f4ad72ba4d30145a9bb1802afafc110e939cf102b21127821672bcf89e2f81731a2e1d89bde433f7483cda74f81d535925479986dd8984857b5c9f2fc3d40faac4e6710c1c1336fd5580ab701d881cbba2941e92c619eb8eda26c8498765a16848ef2df160c2d2a4a31631300fa4ce082af22a0f49456f9d48cf4d2a5332a88c4ffb9a411e87d4894b73412eefce429499ccbeff16f83d238de2469ec755ca5c2bd7f5992dd3ffeed7a039640e449d56c9c3bdfb0406e56ae14c145cd9c36c5fed6d0824f0914f3bffd63f72ac28a2f6e1e2f96e89f7ec611b302c4245a832c0e718992aa7ec07ebd1ce1a2d02132fb24e8c38796d525bfeb80fed5307c67466530dbe2ea9095524b962866bab5ef1dd6d463ce5767daea8570b6c93b347d726559cb1eb4b39218f7ad438f63912c136b4331c08517117d61df12ea571f97ef034eda8f6b4f47a3a1fa7eac177192d5166be2f1797a0cfb095944cab138ff358f270540076af4854071cc4cef289cffbee5e06c3b89aff11537bf7fd1509d4a3caaedbdcf5f969a0bd0235c2793b46f1d9d8021c964a6f6a3a75d427253302d7d4bbe390edb75465b013bff3998167f608db1ace327754ff6b678cc187968b3e0026afa28728168c860b86719ea6385fc62bb9850054b3fc5176d30b81c438fabbbcbba247c7d627688a855c66d3dc2a549b865ebfbd6b74ed93d6bd8828f258052b1a6548468288015462fdd19a54e28250616bed116259b6088e5d9210c6a5c7b5e3da2852113c9aa5b070fe80f0d10d0fd26e2595a6b8901a1a73f4b11017b67db8f89d27675256e1eadca53be900cc678319b7e5a5a9d36532bcd3dbb111fed9787c47ac0b6b6215cf4797348e96f5e37316119e316ec6b40552fe73fcda1a0bd7c4b7ec82374e2de0e01a686309eb6435a9568a7ee50d4c2209a688d61be85ae41e3fcd37c4eae5f5e1af31fea56bf35ea9bad9463e8c785d47594ae9a0d526dc8b91051bf815aca78c7655aeb6303a25f8e7e6c55f4bd335e9a44722784b506cc81cd4ddff6fa2a5b2d9c458d2b77abbd2aa84eb5419af295cb2213008025a24b432af9c431526f7e4f2158fcc1bb3262e7c3da173d415a14cb14dea325f9a75520d2c4d622fe58b2a764517a888c1246dc214c32c7cb6e806193151d7f9a63a8a5a2d718876aa471c8724635ea3fef7165af9262f523434e29329a23c1e8a863c131d0a5f0c69c0de0bd5a91e682bceeee9e6546266ceb9728f7e5ae423b7dece4f432dac32ffba4e75bfaab11d36043945cfb2a0386cc362e98968a7e7845aeaadc0b49e8ce81da922c3da4cca07628bcf0f7dcd6937811971a29ae125bff3c549032d4d4b41375fc11946d80eebfa951680166f740da9bc964af969650c072be25187726181a5bf24fb390c504d6d03128c3f087543c9caf5dc9c3d8e9b1b998a0eeaab67c992b2de2a2748e31d18572b87af07baa1e88f7b8d539ff2cb65ad4682ba378f6a974fe2e99da05e092f75a6b118aee902f10cfebf3fc36534637c35a83c2bb702135ee9f55ba6638ff4fa37c5926f1c5d67cf45898c6889ce643f6ced712773c532067ce80c349c7fe6734d8566b0578ab752fec27b70d44c05e740fb22ef08273fa803705f67f406260463f5fbbdc64d73beff85d7613ec63e9150ad2219821339789ec29a350f7aae02c0437a97f3bfa4f174d3e5d9164283aa27ca7aefd3287f284df03990d4a8d615638a61f3f150a425c3cdf360d3e6b0a271a8c7649d64fdb424f944e4cd9ab55da6613684ce939b4c480b071167446bacc04a4119ee6b25790cf4820820dd34d662c03d7713c510ebfdb7dafc7fbfa8b96c478fb4b4522e6ed51a4393ca18c44d840be2061ab5544b871561d8f0cad13c4a84b088418ec5cad14781e74e11070e0120fc55cad05ed58019fd6df098342799d408b786043269e4c555a82bafecd07d1e51553d2511e344572a6bdf01d1e3af8af796a5d2b53da8067b043208b9d80c04279f95f03d58d96558490e2e807031d57e72680d6a0ad352d48b5025ec898a76dc845dc6f5dc92410ea8bf95a6b11fdaa276f1b49da0c72df24e04e5216d908c2cd1be8caafe9698e46d48b3771558812694f3bbaf19e57e7f0096d81ff6723458ffc150c7d73d9d913c791875632e5b0fc37cdc3cbe102247d128c9c02aac4e17aa417f74972b97d5a7c824928dd9900d88c85b14d205448fd9e86a54bf4982a6f3b25e1eb4a9de83a8afd134b6af1b8e5397b0647936c021b2266dcde3b8898d25dc1b59bb977d85108259ba911cebcc642f6d932cffa752e07b18ff5faf48ebb3597e93bde748554873814d33633755d0cfc46504dce2078864fe8778a4c829d0a996efa3ecd7d9e048a574ef70383fee91b94f175e350bbbc8f318c835d4448acfdfdcaf846fcb6e49b46559670b9e40498fdd72b4ae859b28a618e446868b0a01a9179c7342aec68a1adc6268b36b3508fe34be7ee5f0d8736eb7db1b544efce2676a9eafccdfadd6d5797093945ddb030ad96699c7d2a0a7172b35b698e2f37311ddb181f5fb5e23ac73f7f5173deac2c097c2975528ba509e3a06083b840ee96c80d89ff8a553c0990cc66800e73468a00243bdfeb34133553edb17d5a04ce722fcbc744de188f6821a9e3e09a37b91018456b02975a5edb7202d515a62d029305990d4caa3c2a023c25b973efd901587dd68d83adc1f6137ded14f553d6086140fec1a3ecb0843463ad1fd55507b6f6f51b0fb7ecf27f15fb376007c9e0acee08ecf214b92fc540d2ab2ac3e8bca9f0239b164ea07f70e3694d267c860db656b7311c9df0a54acfa99b86f3e2d30dcb6d6bfa2fe46e0cf33f2d8769053012536570e13c73eff0703dee9b089c6b6fa4c624df184482fd3b35f03e76018aba208d76ba7987092464dd84b10591fd4a810c294df74340043451a047421f8ec777dcf3e5b8bc2716dc7b382873ed077ba888676471ef94c3bd09f8f0ab100b89520874fe15f3b2c69b8c86d2617a91d2913e11cdebc2f0a52b6bcb6ec45a3e4fb1598affe95c14dca8044f9bd5ed32b3b4e025ed564a48c3cf4d30bde4e32bffe344c87375bd37bf0a5ee7decdda8d520fa8d46bc4be0e1661129f35b8a8b2c86b92ae92e708f5171abe0c061dcd0bd68521d7e76843c1e15435cca0b87f1d54922b020f9ba227b784b7a0809cd9920afda604003d1577f4324733e70991ec6c7cc6ab3977cde8f8644237310a68ef4ba745da5331f8307f22fcc14bdf5149686d6ebf6adcce291e4391cc61f85b0623b7f7b9c0a2d2399385f321ec19b53217dcfad35d78e4ace1b1fb782c7ef5701eaac2c3e144c5445d01592ded6d62bb2ef1527263326ccc011a5413313689c13b36e871117b40fd23384fe7f06191b2c3ef6c57302ca1a42b6c6beb1de1a3076b582d83005174021ec04864d35416dcc87bc26a2477ac8652549bb3b1cc5829b600077fa85faad16d12f8106539d1a8ff82da701949dc4e77370bf57fcff061c2e0b1fdb02a4267d08a1d9321ac4ad09fdb1f2f2491a56dc31d7aef408f928075d169b885bc5d993b3471cc95d473e2f44bfc68a7eced9aab58e066093d1147e26198d56326694dfef39ca33efaeb14dd549437ef0c61bd7051cd2685349bfb3a8b08850d0b5b3e0d8890b848e706125ddae91456b0481d083d217a15cfedc3fd8547f40342e6f1a020de83e232af08c4831ba3005534b5b49bf0f5368ad8d25ff415318aa8b56908360b938933c043e2c9ada3eb9884646200bc00ec815edc33cf19ba4e736ca6d97d0db22d3d706a7e474b123bbd788ade99f871d7c05c918450e227dc140b6f435b4c8c5ec2d7e27bbe7406959b11716cf998cb72dfcba43a3e93a75cdc3a8179e30379bada0e3f131c6bb0e60d3f1f10d5dab8690fdefe8580000c856eda683c104e38d423bb9163ba9add2e42f41da4991c50997061c5f29d20672c66fb04fcbdf7161fb1efd9b374102bbd6b1b8167bcffa2c00c06c19aff2b7ba032cd4212a61e6ddf0451f08e658e1821b03313c3c4281154227a110f03dee9516c273c504f700984a6bb593fc431816cd02bde55e2570f8d4a21fbb0095d6ed5f885b3d8b15c3cd487d4403fceb3800e58d2d3ad99036c8ce53ae4fad9826d45bed218ea5522a91aa2b376b82ea37732331f4e57d5f53a3123ae8e15400a2d570101d68c38c6e6de3a7b8a82d7c3465948e00c8a986e7ec2e883131964308682d59835a9bbe1882c03918e94a795c3d4fe8065eee5ce215b5de17a9740a06c025a0f5ddf5939ad0d7feba77947ea258431f42cbdd8c400042d4c72916b39423cd813612f9ca982896b196147cd0d39b009b4733b07b377e61013b1ba6572c156ffd2ec0b854f214f0bdca59db92e500c469f91608d965efd7185c7c1f81e13d57e4a6e483591bee6c7046e5c0c6b85d63e07d39530b6794695ee9ebbd89994a7d61d29d1f1869609785eff4f44414c7b36b6f504a5d7e17070830fcc4853c18b6997df", @typed={0x4, 0x60}, @nested={0xc, 0x66, [@typed={0x8, 0x10, @uid=r6}]}, @generic="828bb7b6717d2dfc71b70c"]}, 0x10c8}], 0x1, 0x0, 0x0, 0x48040}, 0x800) [ 64.252675] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/12 00:17:39 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xac, &(0x7f00000000c0), &(0x7f0000000040)=0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0xa3, "814713a490cd7f7e30aa1095f7d2b8c0f3c7e11cae0f35dd181a2d8d9c012fdc10e67f29e5035162ab18d947a233b278ee2a17a342c1703b41a2a1b9d42bffe7995fdec6dd9ecfed0369e3ef9e1c0019ff41bd2ee41dfeb3135c0c81cafb112e50eeca7ebb675697418976db40a0f39433da2a349c91279b26dc98be883e481b0c0e5001f9d7585cde7e71d0224439b3dc7a73f64f04162add897e224edb6313bc5c21"}, &(0x7f0000000080)=0xab) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={r2, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000240)=""/240, &(0x7f0000000340)=0xf0) sched_yield() stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) 2018/04/12 00:17:39 executing program 0: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x686f01, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@local={0xfe, 0x80, [], 0xaa}, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in, 0x0, 0xff}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0x1}}, 0xe8) sendmsg$key(r2, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={&(0x7f0000001700)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 2018/04/12 00:17:39 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000005380)=[{{&(0x7f0000000040)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/167, 0xa7}, {&(0x7f0000000180)=""/75, 0x4b}], 0x2, &(0x7f0000000240), 0x0, 0x6}, 0x1}, {{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000280)=""/71, 0x47}, {&(0x7f0000000300)=""/254, 0xfe}, {&(0x7f0000000400)=""/169, 0xa9}, {&(0x7f00000004c0)=""/89, 0x59}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/251, 0xfb}], 0x6, &(0x7f00000016c0)=""/129, 0x81, 0x200}, 0x2}, {{&(0x7f0000001780)=@in={0x0, 0x0, @remote}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/15, 0xf}, {&(0x7f0000001840)=""/20, 0x14}, {&(0x7f0000001880)=""/163, 0xa3}, {&(0x7f0000001940)=""/43, 0x2b}], 0x4, &(0x7f00000019c0)=""/164, 0xa4, 0x772}, 0x708}, {{&(0x7f0000001a80)=@in={0x0, 0x0, @local}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001b00)=""/22, 0x16}], 0x1, &(0x7f0000001b80)=""/98, 0x62, 0xe39}, 0x100}, {{&(0x7f0000001c00)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000004f80)=[{&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/173, 0xad}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/93, 0x5d}, {&(0x7f0000003dc0)=""/143, 0x8f}, {&(0x7f0000003e80)=""/29, 0x1d}, {&(0x7f0000003ec0)=""/4096, 0x1000}, {&(0x7f0000004ec0)=""/169, 0xa9}], 0x8, &(0x7f0000005000)=""/50, 0x32, 0x400}, 0x4}, {{&(0x7f0000005040)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f00000052c0)=[{&(0x7f00000050c0)=""/221, 0xdd}, {&(0x7f00000051c0)=""/88, 0x58}, {&(0x7f0000005240)=""/103, 0x67}], 0x3, &(0x7f0000005300)=""/65, 0x41, 0x6}, 0x8001}], 0x6, 0x100, &(0x7f0000005500)={0x77359400}) bind$unix(r0, &(0x7f0000005540)=@abs={0x0, 0x0, 0x4e23}, 0x6e) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f000000a000)) open$dir(&(0x7f000001bff4)='./file0/bus\x00', 0x88040, 0x0) mount(&(0x7f0000033ff4)='./file0/bus\x00', &(0x7f000000fff8)='./file0\x00', &(0x7f0000032ffb)='fuse\x00', 0x7ffbf, &(0x7f0000032000)) open(&(0x7f0000033000)='./file0/bus\x00', 0x40, 0x0) 2018/04/12 00:17:39 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101900) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000080)="102740be07a79c560ce8dd1be4836f48d8f65a9c859ce03fde77b1a074036bb19ebf6ff5c7d1c6d0bb697dbaf42b182881d5edab11b8ae2eae48353d542af958ba1a8518b851ece82336a0549fb0990d057d85f6ca9763e48bb4e561610044e3b39c5c3fba95fb2d841735f42ac82f0e6b2ecc5e96f5a3e70461c8805ec8c05b77cd86a8f613676e9008b83641633f64f3069e6f9e17bdfba5ddf69dca0e0f78a38d5721b4fed551bfb568c626b6d96d56827eb33734245bbac4dddeeecbcf418a868848673593aba5") 2018/04/12 00:17:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000bd7000)={&(0x7f0000000040)=ANY=[@ANYBLOB="380100001000130700000000000000000000000000000000000000000000000000000000000000000000ffffac14ffaa00000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x138}, 0x1}, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r1, &(0x7f0000000240)="ce11c3012ea77311cc8da0211ff6da56db3ff87690790ed8cd1af3e7987d2bdcf3341c86a18c4777fc546f569f66f028366c7adb9bdfa7202d0a6f5254179795fc31630f8b2c318a2e6c89e2ac5969267031baa92c3d661789ebcacda3c350a68d46d11dfb0665a4fcd4ca474e9935ac2d81023c30a48128a7d8d6d620ce942aa82a2222accf929d4bfe53e420481c8c06cf3c33e69e14794b37af3554222e3a762d6e8883bc1ed046319167a0", 0xad, r2) r3 = creat(&(0x7f0000000380)='./file0\x00', 0x40) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000440)={r4, 0x1}, 0x8) 2018/04/12 00:17:39 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x3}, 0x1c) sendmsg(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000280)="337eacfbde72b95af70b5c1effb841525c19d58b0cf13475aa21c1a9939231cbbb4abb9299cde9d6060d00b4498dcde018d7fdda87ea9c75188a71a6a8965c9bc78a7c606fea8794f2cd4864a59c49af3983cc0e2dce9abe8cb256233565b64e1dde5dee75b5724948ee24125ce1da7677e089b4d7f97c881b9d02cb2b540c7edfe0c4008fa934291560717dfb6a477d879f0f75c150aaeda3b76b915870e7e78166c0edbe19f39a0070ff5f99788ba7e1a03b6369839a6649f694ebd21aca1ff6706562fd9846c3ed7c0223f0de20c3d86d7f9aa5e2f63c44766fbe3d7be5281ba61ec3a4b5b9c6776ed3308629fdde", 0xf0}, {&(0x7f0000000380)="db9c75254890a9563f7558a56ca54568af54b9228728c3b6ce27135dec2b2580599e1b02c3126bcd7b1a1f97ac4277f1302c1b08210dab7441cf057033fddc", 0x3f}, {&(0x7f00000003c0)="e7e30cf4a795af59e8a8ddd58883e1e71777b2bb93fe4095b895d2c2be28bb2ef2e46326c4e685ec", 0x28}, {&(0x7f0000000400)="49977e4d83ec625fa6e1bf206a7d89921dcd24e134923ce174f06ddc932741e7e08bea39c2c63cc743ade237e536d0f6bfa9c71df1062e2c5b34e51025f6ba27d02e6133ab41afb9", 0x48}, {&(0x7f0000000480)="eef2d19daa7881776d75dbbc929d2224288ee4c37e14712ab872aec85a3d42d9cde75b1eff75f5245e8e2d64218ec2277c0623ea755ff1f228e67bebcdb3053ed87c9f5f3c9259f9f4e9450cb3d16e21e322c7cc53bdb14abb9ac6", 0x5b}, {&(0x7f0000000500)="9bb95a873fd3c847ca1d3b6899e9eaedf7f8bf5dbc1902a4ac3a671965785a0f6a9032e5a2f5aa518a1a31c3ea559e6c431b3aa9be4d1d8e50737db9d5709dbdc8a5fc4861c410b2ac1a0a279116b8a91b5874b88338eccd6461c3f63dd5b60d659dbe1dcf42a4ebf4899bf397220ff954931c8ce1e114101cc3e8896f9cc72b0aca4bf77adc4870cfb4c0a3c1379c4d2764b9c56c", 0x95}, {&(0x7f0000000740)="de67535b705299527619b3f026b258899b56707f68e4ffba6e7d54fee8a148f4d3102fd0944bd2c93247106c6c16b2f61f5fefe7a199fc629f54b9cbf46ae92649538174043e532ef4cbc3ec3cdd78a1e6dfa76e7ac7f5f1ad1d5ef3e18fe831b7ac79417b5ba932cbccc4082253212666cc49592b5bd6299819361fa47dd3be9b61953d31d9ff4be7853dbc", 0x41}], 0x7, &(0x7f0000000080)}, 0x800000002000c080) write(r0, &(0x7f0000000100)="d019", 0x2) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x7d213e0c, 0x9c0000, 0x2, 0x0, 0x81}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x6}, 0x8) write(r0, &(0x7f0000000180)="f2fe3bfb924b381dd583a910c34ae5b2136cb366afca98ce2b9455bb9e12256a2bcc8ab1e60f9548a9d4c419b624a1a0447e0b44042de63ee72807858d5956d2b0640a35f3e3527fb5d7b12ccbcd281edad956328011286a8a220a936e36f3bb2cc48f3543366e733c00140723a37e4d19605ce1405be9cdd31b7d0fc02966940dc96b295c4f5e808d2b21bdbc1af0bafe43353faf29720855c495fcf4a3813da23e9dd593554cd684260a2d3953dab6cc7530219089ddd670fb9916a7dead3b16ff3187b1a2a94c816d0d85d7943695e1c2f054ba2f6059c3722c510892d7", 0xdf) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x38382, 0x0) listen$netrom(r2, 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000600)={0x5, 0x7, 0x6, 0x7, 0xdc8, 0x9, 0x40, 0x0, r1}, 0x20) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040), &(0x7f00000005c0)=0x4) 2018/04/12 00:17:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) [ 64.560934] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 64.570224] netlink: 60 bytes leftover after parsing attributes in process `syz-executor3'. [ 64.644830] netlink: 60 bytes leftover after parsing attributes in process `syz-executor3'. 2018/04/12 00:17:39 executing program 6: r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f00002eb000)={0x10}, 0xc5, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001900110100000000000000000a0000000000000000000000140000000000000000008f8278ccc5b7fe1d9c710f62eb3c91210f43dbdb15a6aad0fdbc00000000000000000000"], 0x30}, 0x1}, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x15, &(0x7f0000000040), &(0x7f0000000180)=0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000140)=0x1f, 0x4) 2018/04/12 00:17:39 executing program 2: unshare(0x40600) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) membarrier(0x10, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) 2018/04/12 00:17:39 executing program 0: r0 = memfd_create(&(0x7f000088f000)='b\n\x00\x00\x00', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x8, 0x810, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0x50, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=r1, 0x4) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f00000001c0)={0x0, 0x7}) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000200)) futex(&(0x7f00000000c0), 0x1, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x0) 2018/04/12 00:17:39 executing program 7: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) r0 = socket$bt_rfcomm(0x1f, 0x5bb34ec889131649, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x1, 0x4) 2018/04/12 00:17:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x1000000012) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000014000)={&(0x7f0000000080)={0x14, 0x1d, 0x301, 0x0, 0x0, {0x7}}, 0x14}, 0x1}, 0x0) socketpair(0x9, 0x0, 0xfff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqsrc(r1, 0x0, 0x2f, &(0x7f00000000c0)={@empty, @multicast1, @dev}, &(0x7f0000000100)=0xc) 2018/04/12 00:17:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00008f0000)='/dev/ptmx\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000532000)=0x19) ioctl$TCFLSH(r1, 0x40085500, 0x4) 2018/04/12 00:17:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:39 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x3}, 0x1c) sendmsg(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000280)="337eacfbde72b95af70b5c1effb841525c19d58b0cf13475aa21c1a9939231cbbb4abb9299cde9d6060d00b4498dcde018d7fdda87ea9c75188a71a6a8965c9bc78a7c606fea8794f2cd4864a59c49af3983cc0e2dce9abe8cb256233565b64e1dde5dee75b5724948ee24125ce1da7677e089b4d7f97c881b9d02cb2b540c7edfe0c4008fa934291560717dfb6a477d879f0f75c150aaeda3b76b915870e7e78166c0edbe19f39a0070ff5f99788ba7e1a03b6369839a6649f694ebd21aca1ff6706562fd9846c3ed7c0223f0de20c3d86d7f9aa5e2f63c44766fbe3d7be5281ba61ec3a4b5b9c6776ed3308629fdde", 0xf0}, {&(0x7f0000000380)="db9c75254890a9563f7558a56ca54568af54b9228728c3b6ce27135dec2b2580599e1b02c3126bcd7b1a1f97ac4277f1302c1b08210dab7441cf057033fddc", 0x3f}, {&(0x7f00000003c0)="e7e30cf4a795af59e8a8ddd58883e1e71777b2bb93fe4095b895d2c2be28bb2ef2e46326c4e685ec", 0x28}, {&(0x7f0000000400)="49977e4d83ec625fa6e1bf206a7d89921dcd24e134923ce174f06ddc932741e7e08bea39c2c63cc743ade237e536d0f6bfa9c71df1062e2c5b34e51025f6ba27d02e6133ab41afb9", 0x48}, {&(0x7f0000000480)="eef2d19daa7881776d75dbbc929d2224288ee4c37e14712ab872aec85a3d42d9cde75b1eff75f5245e8e2d64218ec2277c0623ea755ff1f228e67bebcdb3053ed87c9f5f3c9259f9f4e9450cb3d16e21e322c7cc53bdb14abb9ac6", 0x5b}, {&(0x7f0000000500)="9bb95a873fd3c847ca1d3b6899e9eaedf7f8bf5dbc1902a4ac3a671965785a0f6a9032e5a2f5aa518a1a31c3ea559e6c431b3aa9be4d1d8e50737db9d5709dbdc8a5fc4861c410b2ac1a0a279116b8a91b5874b88338eccd6461c3f63dd5b60d659dbe1dcf42a4ebf4899bf397220ff954931c8ce1e114101cc3e8896f9cc72b0aca4bf77adc4870cfb4c0a3c1379c4d2764b9c56c", 0x95}, {&(0x7f0000000740)="de67535b705299527619b3f026b258899b56707f68e4ffba6e7d54fee8a148f4d3102fd0944bd2c93247106c6c16b2f61f5fefe7a199fc629f54b9cbf46ae92649538174043e532ef4cbc3ec3cdd78a1e6dfa76e7ac7f5f1ad1d5ef3e18fe831b7ac79417b5ba932cbccc4082253212666cc49592b5bd6299819361fa47dd3be9b61953d31d9ff4be7853dbc", 0x41}], 0x7, &(0x7f0000000080)}, 0x800000002000c080) write(r0, &(0x7f0000000100)="d019", 0x2) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x7d213e0c, 0x9c0000, 0x2, 0x0, 0x81}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x6}, 0x8) write(r0, &(0x7f0000000180)="f2fe3bfb924b381dd583a910c34ae5b2136cb366afca98ce2b9455bb9e12256a2bcc8ab1e60f9548a9d4c419b624a1a0447e0b44042de63ee72807858d5956d2b0640a35f3e3527fb5d7b12ccbcd281edad956328011286a8a220a936e36f3bb2cc48f3543366e733c00140723a37e4d19605ce1405be9cdd31b7d0fc02966940dc96b295c4f5e808d2b21bdbc1af0bafe43353faf29720855c495fcf4a3813da23e9dd593554cd684260a2d3953dab6cc7530219089ddd670fb9916a7dead3b16ff3187b1a2a94c816d0d85d7943695e1c2f054ba2f6059c3722c510892d7", 0xdf) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x38382, 0x0) listen$netrom(r2, 0x2) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000600)={0x5, 0x7, 0x6, 0x7, 0xdc8, 0x9, 0x40, 0x0, r1}, 0x20) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040), &(0x7f00000005c0)=0x4) [ 64.810993] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/12 00:17:39 executing program 6: recvmsg(0xffffffffffffffff, &(0x7f0000001fc8)={&(0x7f0000015000)=@can, 0x10, &(0x7f0000015000), 0x0, &(0x7f0000015000)=""/23, 0x17}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000000000002500000000000f000fa000000000000000000000000000009574000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/04/12 00:17:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:39 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x40002, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x4, 0x6000) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x200003) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) 2018/04/12 00:17:40 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x80001, 0x110) r0 = epoll_create1(0x0) fgetxattr(r0, &(0x7f0000000040)=@known='security.selinux\x00', &(0x7f00000000c0)=""/208, 0xd0) 2018/04/12 00:17:40 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x25, &(0x7f0000000040)={@rand_addr, @multicast1=0xe0000001}, 0x8) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x109100) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000080)={0x0, 0xfffffffffffffff7}, &(0x7f00000000c0)=0x8) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r3) accept$ax25(r1, &(0x7f0000000280), &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={r2, @in={{0x2, 0x4e21}}, 0x1, 0x81}, 0x90) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e22, 0x5, @local={0xfe, 0x80, [], 0xaa}, 0x5}}, 0x4, 0x4}, 0x90) futex(&(0x7f0000000300)=0x2, 0x1, 0x0, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f0000000380)=0x2, 0x1) 2018/04/12 00:17:40 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x88) recvfrom$inet6(r0, &(0x7f0000000000)=""/185, 0xffffffd5, 0x0, 0x0, 0x1e0) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000957000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23}, 0x1c, &(0x7f00002c9000)}, 0x8000) sendto$inet6(r1, &(0x7f00000000c0)="8c2919ded875831be5b77eff780da7845c46eca865e7996cadd20caf3a8e2411e9be40feb6bbfe7d18cf993606fbe957bcbea7cb12e280d0c3665846a3ac3f2e8f5e53c7feb5a8500c0411a7d26f280b15816a3207cb32bd4e7bfb6bc88b75b85814029aa10f55c5b4f3a52d6891aeb6d6196ddcfc486587470f2479df88d24ae3621a886fd5c9c02f0fbf9dda07e5e312c34e6002ff5aa87c8999b9e5ba8becd3a6be283ab4e6f676393cf69e17dd3f1a31973f6ab582f9a2a5d516b5adaf5fbfce5fcbe2278141617c", 0xca, 0x0, &(0x7f000001b000)={0xa, 0x3, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/12 00:17:40 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x6, 0x6, 0xfffffffffffff95b, 0x9}) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) r4 = socket$packet(0x11, 0x400000002, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x7}, 0x4) sendto$inet(r3, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:40 executing program 3: unshare(0x400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0xa, 0x1c49, 0x2}, 0x2c) r1 = epoll_create(0x7) epoll_pwait(r1, &(0x7f0000000000), 0x0, 0x1, &(0x7f0000000080)={0x4e8}, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000200)=""/203}, 0x18) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x19c5, 0x6, &(0x7f0000000640)=[{&(0x7f0000000100)="f517cee8260850d7eb0e84bfea2286e1b82e47fa68549b451d42244a40998554a0186e98d713460b2e28e936b8542dd4ceb4d80f37ea4e6998a28f483f25d8dca686d2cb9cb2cf4c13d2451328a2290c728dcb95676d2b0cc78a2d86c93cd313cc9bd2b310841118ed946a9511aa7e8cf5c5846985bfdcdc92d3cfeb8443e6f3f409616de2d8aa36fb060a089e82787c80c08d4fe060446d9fb28d54991cea14c576ed708de4840ec32b37ac845f7b5e5934cd3c18b9a072c4cad3fcdbe5f36b9f4db0efb2902053ebddf52dbbff9c4bc86bdb", 0xd3, 0x6}, {&(0x7f0000000300)="d29584d5b10c5f76d3959c64bd4d03f10985a6d7f557cbeb6488eaca587df88adb08a6547e299503a88105759a1b0510d64bebaad3f1b52345d5def37ad31342bbacd9f5b1247aeb1fa6127cf2acb53051584dc40ea69542e4ad614592f01de5dcf6faf9b983d548df8066af58094443ee7dcf41b6b551eb7f54edbf834a4d78f0c57930ae44b653e9892005bd0d92fcf0c19900a4d7b3baedc9dd2263d928b083909bf82035aabd7f", 0xa9, 0x7}, {&(0x7f00000003c0)="46b94301a52e6f24590c934d38b07c6d87a29450dabc7e7ee225bc621a27aedda24cdf0f56d54c8e96ee1ec547630452a2edd361cfa7", 0x36, 0x2}, {&(0x7f0000000400)="8ffddae98e51d1a3380fcb927f1899e79ee8e543812554229b4382586a99b20d1771e71515667def845237bb34337bc06b88e398cf902716189b7dbb98f0aedcbbe9d92a3c37cdd779108829699037d7d4a7d5079fc4807c720851e9bc02b83e9278ba8a65335cc28e356acf1ae850b9f088fffd3ae556bc18d46befa97f51c9b01c2ebd7241dba7be9b5efcdfa9e59b6d31fad05b9177357ab18aab69ba677af60f5a365cfcafb09cb690fce49be4f174a0022ad5213a013386f978cc2985a0f0696e075199b948f026f4", 0xcb, 0x81}, {&(0x7f0000000500)="04d8d50183267e0b16aa2cd82fff07fc8f3fccb6bdf303c8f00baebb24d046337668d0d2a84b2ae9182969a22e4a587cf2e60d82e40c4d3301107560058b6cd96cbc5e3c55e61f03c09ce1857bc0491fe14a8c2ef3a513c00318f8e9926d5bde87c7a2ba160b6e67fd3221a409a5ef97a6c3063cac7693f9d7ef652cc6955c5b9df51033a9bc6d7b27771980ea68f5fbc0e594f13c7b0e541a559888c285d2a8635cfab732739b95e1a2af85b4773e8bf106c08b2db2709f565331691c212d14b8987ae83026e73162a561af5a358937", 0xd0, 0x7}, {&(0x7f0000000600)="6b67adf13f995af4", 0x8, 0x6}], 0x800002, &(0x7f0000000700)={[{@statfs_quantum={'statfs_quantum', 0x3d, [0x37, 0x35, 0x30, 0x31, 0x7d, 0x3f]}, 0x2c}, {@commit={'commit', 0x3d, [0x0, 0x3f, 0x3f, 0x37, 0x38]}, 0x2c}, {@localcaching='localcaching', 0x2c}, {@discard='discard', 0x2c}, {@suiddir='suiddir', 0x2c}, {@quota_quantum={'quota_quantum', 0x3d, [0x33, 0x39, 0x3f, 0x31]}, 0x2c}, {@norgrplvb='norgrplvb', 0x2c}, {@nobarrier='nobarrier', 0x2c}]}) [ 65.229824] IPv4: Oversized IP packet from 127.0.0.1 2018/04/12 00:17:40 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) ustat(0xfffffffffffffffc, &(0x7f0000000100)) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f00000000c0), 0x3) 2018/04/12 00:17:40 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='veth1\x00') getsockopt$inet_int(r1, 0x10d, 0xc1, &(0x7f0000000180), &(0x7f0000000140)=0x4) 2018/04/12 00:17:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:40 executing program 4: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x20031, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000080)=0xc8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={"6c6f0000000000000000000100", &(0x7f0000000100)=ANY=[@ANYBLOB="1b000000040000000000000086938159387a2e626b8b003d5071f60c3a926af261d0a6de62430e521e959ce8deb464b76883349a463c1e5f141eb2028cfe0996358d554d503447d3a50bac667f2170645f9b58ccce5a3d526a6d749c7beff2cfc68374204f58e28ef1d4985c461a508a895b81e186effbcab6ad31ebf5001f0000000000000091eb1976f230f82648aec392c08e9c5800ad60"]}) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000000c0)) 2018/04/12 00:17:40 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x40002, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x4, 0x6000) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x200003) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) 2018/04/12 00:17:40 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x88) recvfrom$inet6(r0, &(0x7f0000000000)=""/185, 0xffffffd5, 0x0, 0x0, 0x1e0) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000957000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23}, 0x1c, &(0x7f00002c9000)}, 0x8000) sendto$inet6(r1, &(0x7f00000000c0)="8c2919ded875831be5b77eff780da7845c46eca865e7996cadd20caf3a8e2411e9be40feb6bbfe7d18cf993606fbe957bcbea7cb12e280d0c3665846a3ac3f2e8f5e53c7feb5a8500c0411a7d26f280b15816a3207cb32bd4e7bfb6bc88b75b85814029aa10f55c5b4f3a52d6891aeb6d6196ddcfc486587470f2479df88d24ae3621a886fd5c9c02f0fbf9dda07e5e312c34e6002ff5aa87c8999b9e5ba8becd3a6be283ab4e6f676393cf69e17dd3f1a31973f6ab582f9a2a5d516b5adaf5fbfce5fcbe2278141617c", 0xca, 0x0, &(0x7f000001b000)={0xa, 0x3, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/12 00:17:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x40002, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x4, 0x6000) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x200003) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) 2018/04/12 00:17:40 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x6, 0x6, 0xfffffffffffff95b, 0x9}) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) r4 = socket$packet(0x11, 0x400000002, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x7}, 0x4) sendto$inet(r3, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) [ 66.062094] IPv4: Oversized IP packet from 127.0.0.1 2018/04/12 00:17:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x40002, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x4, 0x6000) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x200003) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) 2018/04/12 00:17:41 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x40002, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x4, 0x6000) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x200003) ioctl$TIOCSCTTY(r1, 0x540e, 0xfff) 2018/04/12 00:17:41 executing program 6: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r0, 0x409, 0x2) 2018/04/12 00:17:41 executing program 4: syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_cache\x00') r1 = gettid() ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000080)=r1) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000100)=0xfffffffffffffffa) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x101, 0x0, 0x10000, 0x1, 0xdf6, 0x5, 0x8, 0xfffffffffffffe00, 0x100000000, 0x5, 0x7f, 0x1}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x7fffffff) 2018/04/12 00:17:41 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x6, 0x6, 0xfffffffffffff95b, 0x9}) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) r4 = socket$packet(0x11, 0x400000002, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x7}, 0x4) sendto$inet(r3, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:41 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='veth1\x00') getsockopt$inet_int(r1, 0x10d, 0xc1, &(0x7f0000000180), &(0x7f0000000140)=0x4) [ 66.394326] IPv4: Oversized IP packet from 127.0.0.1 2018/04/12 00:17:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f000001aff4)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f000026f000)={0x40000000}) 2018/04/12 00:17:41 executing program 6: pipe2(&(0x7f0000000580)={0xffffffffffffffff}, 0x4000) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = fcntl$getown(0xffffffffffffff9c, 0x9) r3 = epoll_create(0x3) sendmsg$nl_netfilter(r0, &(0x7f0000000a00)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000640)={0x354, 0x5, 0x6, 0x400, 0x70bd2a, 0x25dfdbfb, {0x7, 0x0, 0x8}, [@nested={0x100, 0x37, [@typed={0x8, 0x22, @u32=0x18}, @generic="e50a6abc31176777d0a98660ac92984efa9174d43d52f27e27f19da8709f64695d6c9b0162795ed2f0e0d912eb31c4dc7c9ad7639a61d5b1e75140d53ed57d20e3363b9feba41bfc57aa51e175bbec99d5837eefd9c6018dc75b58a19bc6331a5c9552b73f87be05bec98faadeaff48e1b3d5998b4d8d3b6f94d2e647d421c6628f67bb4114471d3f64b56a1ff8db0156d8b0b17be9ad26dc30aa23bad70ce57fdb3f55453367e824596a44e4778d8a6c8722064f1140170f0952fbb06b88d9f0c74033940ec24cdcc1a9cfdfaac1c", @generic="126641652f", @typed={0x14, 0x84, @ipv6=@dev={0xfe, 0x80, [], 0x15}}, @typed={0xc, 0x6c, @str='eth1\'\x00'}]}, @nested={0x28, 0x14, [@typed={0x4, 0x5c}, @typed={0x8, 0x8f, @fd=r1}, @typed={0x8, 0x33, @ipv4=@broadcast=0xffffffff}, @typed={0x8, 0x4d, @pid=r2}, @typed={0x8, 0xe, @fd=r3}]}, @generic="941bb1537c27f1e0f21ad5af3b2c3e481751600e190ac197bb17534d06c628c91bbb051aad07dce94eca6d0e2ad672e4f6a9063a02cd7edcbf0e3aeaeebbd6c718559c84daa5454d379bf1049467b5069a86f7f2d1c28a0c8e682a8c6ffcf403b1df3114a99af67f5b6dd8a25fcf61871b068cf2ab55da92349de90cbd0b9098505a4c6264dfc4c218050e26b3aeb8591f2a6c43edd1baa4b025a1fc88d2929cefb8bf6d2512f15216c696cb42a9bc5da9ebbb0391a8f7e753cd3a77b929da2e6a033c20044810fb619446ce379408eafd05c8b02d4fe7625f11f02d7412490e970f51faec6fbcb0cbcec98a4dbc22baffaf207f30ac77", @generic="97bd34839715f75b7a80c6082c704fa84ac19166c39e924d592e2362325b9c24313d270bd5c5a9c4e4f85c139c356bf969", @typed={0x14, 0x32, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @generic="e01bb74cf6e1dbcb177f67553f59700f9bd60c169c562b19a5bddb81ed22400c00ec1107e70f41e38ca64608fc682e2b1937584ca54da6652e062f48369af596a81d98f032fab58180c693342ae875bcc2b659bffccd9d68c88dd6407729497ffaaaf90ffb1fb71c595a5dc5bc6ebf73694bdc34d89c288dc422c6e6a669fd144e874061acf06494a9591b184c44e23be8aabf09ea70bbcabf11bc1434a2806a9c04afa4e8f7b1e4a3b754fac8a17620be602b0d7d79b02fcef31598c2a707ea2f4dda20dc5da9dfaec36e", @typed={0x8, 0x4, @ipv4}, @typed={0x8, 0x3f, @u32=0x37a7}]}, 0x354}, 0x1, 0x0, 0x0, 0x8004}, 0x4000) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r4, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000b0d5f400000000000029000000040000001c81c1bc00000000"], 0x18}}], 0x2, 0x0) 2018/04/12 00:17:41 executing program 0: r0 = socket(0x5, 0x80000, 0xffffffffffffffff) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={"73797a5f74756e0000000000001000", &(0x7f00000001c0)=ANY=[@ANYBLOB="3300000000000000fec52f9e6e8e6fa33f8c26727477409e0e78ba4450320b38382c63814557227a2adbcd8568725520dabe191fd077b1177975a3c564b48cebc9ed981c4d9ba5375f2c977cbad426849842edf997b524e723423b54d222f9b04950b1aca3da96ca0effc6a4e4d3d16b8ffa2f4a44c3d2097c5ac756f716aa7a52119a9909225241f6f56ba9eff938b8cfed7a3acd38600dfa26581306063f9112a52251d401d8516cd7a5170d24f670d5b4e21e41a91630a44eda9c52b1ac39787a5a3032b8931879b7b55dd91d"]}) 2018/04/12 00:17:41 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) unshare(0x20000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0), 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000040)) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=""/128, &(0x7f0000000180)=0x80) getrusage(0x0, &(0x7f0000000440)) 2018/04/12 00:17:41 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x6, 0x6, 0xfffffffffffff95b, 0x9}) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) r4 = socket$packet(0x11, 0x400000002, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x7}, 0x4) sendto$inet(r3, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:41 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='veth1\x00') getsockopt$inet_int(r1, 0x10d, 0xc1, &(0x7f0000000180), &(0x7f0000000140)=0x4) 2018/04/12 00:17:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:41 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x88) recvfrom$inet6(r0, &(0x7f0000000000)=""/185, 0xffffffd5, 0x0, 0x0, 0x1e0) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000957000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23}, 0x1c, &(0x7f00002c9000)}, 0x8000) sendto$inet6(r1, &(0x7f00000000c0)="8c2919ded875831be5b77eff780da7845c46eca865e7996cadd20caf3a8e2411e9be40feb6bbfe7d18cf993606fbe957bcbea7cb12e280d0c3665846a3ac3f2e8f5e53c7feb5a8500c0411a7d26f280b15816a3207cb32bd4e7bfb6bc88b75b85814029aa10f55c5b4f3a52d6891aeb6d6196ddcfc486587470f2479df88d24ae3621a886fd5c9c02f0fbf9dda07e5e312c34e6002ff5aa87c8999b9e5ba8becd3a6be283ab4e6f676393cf69e17dd3f1a31973f6ab582f9a2a5d516b5adaf5fbfce5fcbe2278141617c", 0xca, 0x0, &(0x7f000001b000)={0xa, 0x3, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) [ 66.998745] IPv4: Oversized IP packet from 127.0.0.1 2018/04/12 00:17:42 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000001aff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040)="83", 0x1}], 0x100000000000011e) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f00007ae000)=0x1, 0x28e) write(r1, &(0x7f0000000000)='f', 0x1) recvmsg(r0, &(0x7f0000019fc8)={0x0, 0x70, &(0x7f000001a000), 0x0, &(0x7f000001b000)}, 0x2) 2018/04/12 00:17:42 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='veth1\x00') getsockopt$inet_int(r1, 0x10d, 0xc1, &(0x7f0000000180), &(0x7f0000000140)=0x4) 2018/04/12 00:17:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) ioctl$TCSETSW(r0, 0x5402, &(0x7f00009dc000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffc}) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00001aa000)=[{&(0x7f00006aaf01)=""/255, 0xff}], 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) close(r0) 2018/04/12 00:17:42 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000f21fee)='/dev/input/event#\x00', 0x2, 0x2) write$evdev(r0, &(0x7f00000000c0), 0x11) 2018/04/12 00:17:42 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x6, 0x6, 0xfffffffffffff95b, 0x9}) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) socket$packet(0x11, 0x400000002, 0x300) sendto$inet(r3, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:42 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) unshare(0x20000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0), 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000040)) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=""/128, &(0x7f0000000180)=0x80) getrusage(0x0, &(0x7f0000000440)) 2018/04/12 00:17:42 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) unshare(0x20000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0), 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000040)) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=""/128, &(0x7f0000000180)=0x80) getrusage(0x0, &(0x7f0000000440)) 2018/04/12 00:17:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00006ffff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000000), 0x22d, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004b40)=[{{&(0x7f00000000c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000180)=""/97, 0x61}, {&(0x7f0000000200)=""/108, 0x6c}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/148, 0x94}, {&(0x7f0000000440)=""/255, 0xff}], 0x7, &(0x7f00000005c0)=""/128, 0x80, 0x8000}, 0x9}, {{&(0x7f0000000640)=@hci, 0x80, &(0x7f0000000700)=[{&(0x7f00000006c0)=""/59, 0x3b}], 0x1, &(0x7f0000001a40)=""/4096, 0x1000, 0x20}, 0x8000}, {{&(0x7f0000000740)=@ethernet={0x0, @local}, 0x80, &(0x7f0000004a40)=[{&(0x7f0000002a40)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/127, 0x7f}, {&(0x7f0000003a40)=""/4096, 0x1000}, {&(0x7f0000000840)}, {&(0x7f0000000880)=""/43, 0x2b}, {&(0x7f00000008c0)=""/7, 0x7}, {&(0x7f0000000900)=""/146, 0x92}], 0x7, &(0x7f0000004ac0)=""/85, 0x55, 0xffff}, 0x4}], 0x3, 0x10000, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000004c40)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000004c80)={@dev={0xfe, 0x80, [], 0xf}, 0x53, r3}) sendmmsg(r1, &(0x7f00000009c0)=[{{0x0, 0x0, &(0x7f00000002c0), 0x78, &(0x7f0000000300)}}, {{0x0, 0x0, &(0x7f0000000680), 0x59, &(0x7f00000006c0)}}], 0x2, 0x0) [ 67.330005] IPv4: Oversized IP packet from 127.0.0.1 2018/04/12 00:17:42 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='veth1\x00') 2018/04/12 00:17:42 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x6, 0x6, 0xfffffffffffff95b, 0x9}) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(r3, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:42 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) unshare(0x20000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0), 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000040)) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=""/128, &(0x7f0000000180)=0x80) getrusage(0x0, &(0x7f0000000440)) 2018/04/12 00:17:42 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) unshare(0x20000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0), 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000040)) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=""/128, &(0x7f0000000180)=0x80) getrusage(0x0, &(0x7f0000000440)) 2018/04/12 00:17:42 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) [ 67.577564] IPv4: Oversized IP packet from 127.0.0.1 2018/04/12 00:17:42 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) unshare(0x20000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0), 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000040)) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=""/128, &(0x7f0000000180)=0x80) getrusage(0x0, &(0x7f0000000440)) 2018/04/12 00:17:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:42 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x6, 0x6, 0xfffffffffffff95b, 0x9}) r3 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r3, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:42 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) unshare(0x20000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0), 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000040)) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=""/128, &(0x7f0000000180)=0x80) getrusage(0x0, &(0x7f0000000440)) 2018/04/12 00:17:42 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:43 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:43 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) unshare(0x20000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0), 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000040)) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=""/128, &(0x7f0000000180)=0x80) 2018/04/12 00:17:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) ioctl$TCSETSW(r0, 0x5402, &(0x7f00009dc000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffc}) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00001aa000)=[{&(0x7f00006aaf01)=""/255, 0xff}], 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) close(r0) 2018/04/12 00:17:43 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x6, 0x6, 0xfffffffffffff95b, 0x9}) r3 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r3, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:43 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:43 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x88) recvfrom$inet6(r0, &(0x7f0000000000)=""/185, 0xffffffd5, 0x0, 0x0, 0x1e0) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000957000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23}, 0x1c, &(0x7f00002c9000)}, 0x8000) sendto$inet6(r1, &(0x7f00000000c0)="8c2919ded875831be5b77eff780da7845c46eca865e7996cadd20caf3a8e2411e9be40feb6bbfe7d18cf993606fbe957bcbea7cb12e280d0c3665846a3ac3f2e8f5e53c7feb5a8500c0411a7d26f280b15816a3207cb32bd4e7bfb6bc88b75b85814029aa10f55c5b4f3a52d6891aeb6d6196ddcfc486587470f2479df88d24ae3621a886fd5c9c02f0fbf9dda07e5e312c34e6002ff5aa87c8999b9e5ba8becd3a6be283ab4e6f676393cf69e17dd3f1a31973f6ab582f9a2a5d516b5adaf5fbfce5fcbe2278141617c", 0xca, 0x0, &(0x7f000001b000)={0xa, 0x3, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/12 00:17:43 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x6, 0x6, 0xfffffffffffff95b, 0x9}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:43 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:43 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x6, 0x6, 0xfffffffffffff95b, 0x9}) r3 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r3, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:44 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(r2, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:44 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:44 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) unshare(0x20000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0), 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000040)) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) 2018/04/12 00:17:44 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000f8ff4)={@multicast2=0xe0000002, @loopback=0x7f000001, @broadcast=0xffffffff}, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0xf}, @loopback=0x7f000001}, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') readv(r2, &(0x7f0000f46000)=[{&(0x7f0000949000)=""/101, 0x65}, {&(0x7f0000120000)=""/4096, 0x1000}], 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/12 00:17:44 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x6, 0x6, 0xfffffffffffff95b, 0x9}) r3 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r3, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:44 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x88) recvfrom$inet6(r0, &(0x7f0000000000)=""/185, 0xffffffd5, 0x0, 0x0, 0x1e0) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000957000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23}, 0x1c, &(0x7f00002c9000)}, 0x8000) [ 69.351194] IPv4: Oversized IP packet from 127.0.0.1 2018/04/12 00:17:44 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:45 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x6, 0x6, 0xfffffffffffff95b, 0x9}) sendto$inet(0xffffffffffffffff, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:45 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:45 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) unshare(0x20000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000002c0), 0x4) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) 2018/04/12 00:17:45 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(r2, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x41) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000000)={{0x1b31}}) 2018/04/12 00:17:45 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:45 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x88) recvfrom$inet6(r0, &(0x7f0000000000)=""/185, 0xffffffd5, 0x0, 0x0, 0x1e0) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000957000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23}, 0x1c, &(0x7f00002c9000)}, 0x8000) [ 70.535169] IPv4: Oversized IP packet from 127.0.0.1 2018/04/12 00:17:45 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x6, 0x6, 0xfffffffffffff95b, 0x9}) sendto$inet(0xffffffffffffffff, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) clock_gettime(0xfffffffffffffffc, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001bc0)=[{{&(0x7f0000001580)=@rc, 0x80, &(0x7f0000001a80), 0x0, &(0x7f0000000040)=""/186, 0xffffffffffffffbc}}], 0x1, 0x41, &(0x7f0000001c80)={0x0, r1+10000000}) 2018/04/12 00:17:45 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:45 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:45 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{}, {}]}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:45 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) unshare(0x20000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x8) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) [ 70.814808] IPv4: Oversized IP packet from 127.0.0.1 2018/04/12 00:17:45 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x6, 0x6, 0xfffffffffffff95b, 0x9}) sendto$inet(0xffffffffffffffff, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) clock_gettime(0xfffffffffffffffc, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001bc0)=[{{&(0x7f0000001580)=@rc, 0x80, &(0x7f0000001a80), 0x0, &(0x7f0000000040)=""/186, 0xffffffffffffffbc}}], 0x1, 0x41, &(0x7f0000001c80)={0x0, r1+10000000}) 2018/04/12 00:17:45 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) unshare(0x20000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) setns(0xffffffffffffffff, 0x0) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) 2018/04/12 00:17:46 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:46 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:46 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) unshare(0x20000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) 2018/04/12 00:17:46 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff299, 0x440840) r2 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r2, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) clock_gettime(0xfffffffffffffffc, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001bc0)=[{{&(0x7f0000001580)=@rc, 0x80, &(0x7f0000001a80), 0x0, &(0x7f0000000040)=""/186, 0xffffffffffffffbc}}], 0x1, 0x41, &(0x7f0000001c80)={0x0, r1+10000000}) 2018/04/12 00:17:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:46 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x88) recvfrom$inet6(r0, &(0x7f0000000000)=""/185, 0xffffffd5, 0x0, 0x0, 0x1e0) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000957000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23}, 0x1c, &(0x7f00002c9000)}, 0x8000) [ 71.539681] IPv4: Oversized IP packet from 127.0.0.1 2018/04/12 00:17:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) clock_gettime(0xfffffffffffffffc, &(0x7f0000000100)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001bc0)=[{{&(0x7f0000001580)=@rc, 0x80, &(0x7f0000001a80), 0x0, &(0x7f0000000040)=""/186, 0xffffffffffffffbc}}], 0x1, 0x41, &(0x7f0000001c80)={0x0, r1+10000000}) 2018/04/12 00:17:46 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) unshare(0x20000) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) 2018/04/12 00:17:46 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:46 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000140)={r1, 0x2}) r2 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r2, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:46 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:46 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) [ 71.842560] IPv4: Oversized IP packet from 127.0.0.1 2018/04/12 00:17:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) clock_gettime(0xfffffffffffffffc, &(0x7f0000000100)) 2018/04/12 00:17:47 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r1 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r2, 0x9}, 0x8) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) 2018/04/12 00:17:47 executing program 6: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{}, {}]}) r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:47 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:47 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:47 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x88) recvfrom$inet6(r0, &(0x7f0000000000)=""/185, 0xffffffd5, 0x0, 0x0, 0x1e0) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendto$inet6(r1, &(0x7f00000000c0)="8c2919ded875831be5b77eff780da7845c46eca865e7996cadd20caf3a8e2411e9be40feb6bbfe7d18cf993606fbe957bcbea7cb12e280d0c3665846a3ac3f2e8f5e53c7feb5a8500c0411a7d26f280b15816a3207cb32bd4e7bfb6bc88b75b85814029aa10f55c5b4f3a52d6891aeb6d6196ddcfc486587470f2479df88d24ae3621a886fd5c9c02f0fbf9dda07e5e312c34e6002ff5aa87c8999b9e5ba8becd3a6be283ab4e6f676393cf69e17dd3f1a31973f6ab582f9a2a5d516b5adaf5fbfce5fcbe2278141617c", 0xca, 0x0, &(0x7f000001b000)={0xa, 0x3, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/12 00:17:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r1 = accept4(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:47 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r0 = open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0x80, 0x4, 0x2, 0x7, 0x4, 0x5, 0x0, 0x5, 0x7, 0x1, 0xaca, 0x96b7, 0xffff, 0x3, 0x2]}, &(0x7f0000000340)=0x100) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) 2018/04/12 00:17:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r1 = accept4(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) 2018/04/12 00:17:47 executing program 6: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:47 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:47 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:47 executing program 2: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r1 = accept4(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:47 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) [ 73.037120] IPv4: Oversized IP packet from 127.0.0.1 2018/04/12 00:17:48 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:48 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x88) recvfrom$inet6(r0, &(0x7f0000000000)=""/185, 0xffffffd5, 0x0, 0x0, 0x1e0) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendto$inet6(r1, &(0x7f00000000c0)="8c2919ded875831be5b77eff780da7845c46eca865e7996cadd20caf3a8e2411e9be40feb6bbfe7d18cf993606fbe957bcbea7cb12e280d0c3665846a3ac3f2e8f5e53c7feb5a8500c0411a7d26f280b15816a3207cb32bd4e7bfb6bc88b75b85814029aa10f55c5b4f3a52d6891aeb6d6196ddcfc486587470f2479df88d24ae3621a886fd5c9c02f0fbf9dda07e5e312c34e6002ff5aa87c8999b9e5ba8becd3a6be283ab4e6f676393cf69e17dd3f1a31973f6ab582f9a2a5d516b5adaf5fbfce5fcbe2278141617c", 0xca, 0x0, &(0x7f000001b000)={0xa, 0x3, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/12 00:17:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) 2018/04/12 00:17:48 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:48 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000), 0x3) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r1 = accept4(r0, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(0xffffffffffffffff) 2018/04/12 00:17:48 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) 2018/04/12 00:17:48 executing program 2: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) [ 73.478193] IPv4: Oversized IP packet from 127.0.0.1 2018/04/12 00:17:48 executing program 6: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:48 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(0xffffffffffffffff, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:48 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) 2018/04/12 00:17:48 executing program 2: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x88) recvfrom$inet6(r0, &(0x7f0000000000)=""/185, 0xffffffd5, 0x0, 0x0, 0x1e0) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendto$inet6(r1, &(0x7f00000000c0)="8c2919ded875831be5b77eff780da7845c46eca865e7996cadd20caf3a8e2411e9be40feb6bbfe7d18cf993606fbe957bcbea7cb12e280d0c3665846a3ac3f2e8f5e53c7feb5a8500c0411a7d26f280b15816a3207cb32bd4e7bfb6bc88b75b85814029aa10f55c5b4f3a52d6891aeb6d6196ddcfc486587470f2479df88d24ae3621a886fd5c9c02f0fbf9dda07e5e312c34e6002ff5aa87c8999b9e5ba8becd3a6be283ab4e6f676393cf69e17dd3f1a31973f6ab582f9a2a5d516b5adaf5fbfce5fcbe2278141617c", 0xca, 0x0, &(0x7f000001b000)={0xa, 0x3, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/12 00:17:48 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(0xffffffffffffffff, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:48 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) unshare(0x20000400) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) 2018/04/12 00:17:48 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x0, @rand_addr}, 0x10) 2018/04/12 00:17:48 executing program 6: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:49 executing program 2 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 2018/04/12 00:17:49 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) timerfd_create(0x0, 0x0) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) 2018/04/12 00:17:49 executing program 6: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:49 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000602000)=0x4, 0x3) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/04/12 00:17:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x20000001, &(0x7f000007f000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000009c0)={&(0x7f0000000780)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000040)=ANY=[@ANYBLOB="cb"], 0x1}, 0x1}, 0x8000) close(r0) 2018/04/12 00:17:49 executing program 7: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x88) recvfrom$inet6(r0, &(0x7f0000000000)=""/185, 0xffffffd5, 0x0, 0x0, 0x1e0) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendto$inet6(r1, &(0x7f00000000c0)="8c2919ded875831be5b77eff780da7845c46eca865e7996cadd20caf3a8e2411e9be40feb6bbfe7d18cf993606fbe957bcbea7cb12e280d0c3665846a3ac3f2e8f5e53c7feb5a8500c0411a7d26f280b15816a3207cb32bd4e7bfb6bc88b75b85814029aa10f55c5b4f3a52d6891aeb6d6196ddcfc486587470f2479df88d24ae3621a886fd5c9c02f0fbf9dda07e5e312c34e6002ff5aa87c8999b9e5ba8becd3a6be283ab4e6f676393cf69e17dd3f1a31973f6ab582f9a2a5d516b5adaf5fbfce5fcbe2278141617c", 0xca, 0x0, &(0x7f000001b000)={0xa, 0x3, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) 2018/04/12 00:17:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) 2018/04/12 00:17:49 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) [ 74.682761] FAULT_INJECTION: forcing a failure. [ 74.682761] name failslab, interval 1, probability 0, space 0, times 1 [ 74.694248] CPU: 1 PID: 5856 Comm: syz-executor5 Not tainted 4.16.0+ #83 [ 74.701147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.710551] Call Trace: [ 74.711405] FAULT_INJECTION: forcing a failure. [ 74.711405] name failslab, interval 1, probability 0, space 0, times 1 [ 74.713206] dump_stack+0x185/0x1d0 [ 74.713251] should_fail+0x87b/0xab0 [ 74.713296] should_failslab+0x279/0x2a0 [ 74.713396] kmem_cache_alloc+0x136/0xb90 [ 74.740045] ================================================================== [ 74.747412] BUG: KMSAN: uninit-value in show_trace_log_lvl+0xda4/0x1030 [ 74.754168] CPU: 1 PID: 5856 Comm: syz-executor5 Not tainted 4.16.0+ #83 [ 74.760993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.770346] Call Trace: [ 74.772936] dump_stack+0x14a/0x1d0 [ 74.776555] ? show_trace_log_lvl+0xda4/0x1030 [ 74.781127] kmsan_report+0x142/0x240 [ 74.784919] __msan_warning_32+0x6c/0xb0 [ 74.788970] show_trace_log_lvl+0xda4/0x1030 [ 74.793367] ? kmem_cache_alloc+0x136/0xb90 [ 74.797679] ? kmem_cache_alloc+0x136/0xb90 [ 74.801990] show_stack+0xfc/0x150 [ 74.805526] ? print_worker_info+0x1b0/0x660 [ 74.809922] dump_stack+0x185/0x1d0 [ 74.813542] should_fail+0x87b/0xab0 [ 74.817246] should_failslab+0x279/0x2a0 [ 74.821296] kmem_cache_alloc+0x136/0xb90 [ 74.825431] ? dst_alloc+0x295/0x830 [ 74.829137] dst_alloc+0x295/0x830 [ 74.832673] ip_route_output_key_hash_rcu+0x2ba3/0x3940 [ 74.838053] ? __local_bh_enable_ip+0x3b/0x140 [ 74.842630] ? _raw_read_unlock_bh+0x50/0x70 [ 74.847043] ip_route_output_flow+0x1eb/0x3c0 [ 74.851533] udp_sendmsg+0x2183/0x3180 [ 74.855430] ? __msan_poison_alloca+0x15c/0x1d0 [ 74.860085] ? ip_copy_metadata+0xac0/0xac0 [ 74.864409] ? udp_sendmsg+0x1820/0x3180 [ 74.868459] ? udp_send_skb+0x1320/0x1320 [ 74.872594] inet_sendmsg+0x48d/0x740 [ 74.876384] ? inet_getname+0x500/0x500 [ 74.880347] SYSC_sendto+0x6c3/0x7e0 [ 74.884059] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 74.889500] ? prepare_exit_to_usermode+0x149/0x3a0 [ 74.894512] SyS_sendto+0x8a/0xb0 [ 74.897956] do_syscall_64+0x309/0x430 [ 74.901835] ? SYSC_getpeername+0x560/0x560 [ 74.906149] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 74.911324] RIP: 0033:0x455279 [ 74.914500] RSP: 002b:00007f087b294c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 74.922305] RAX: ffffffffffffffda RBX: 00007f087b2956d4 RCX: 0000000000455279 [ 74.929562] RDX: 000000000000ffe4 RSI: 0000000020865000 RDI: 0000000000000013 [ 74.936822] RBP: 000000000072bea0 R08: 0000000020fd9ff0 R09: 0000000000000010 [ 74.944081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 74.951351] R13: 00000000000004f7 R14: 00000000006fa7c8 R15: 0000000000000000 [ 74.958610] [ 74.960220] Uninit was stored to memory at: [ 74.964536] kmsan_internal_chain_origin+0x12b/0x210 [ 74.969626] __msan_chain_origin+0x69/0xc0 [ 74.973851] update_stack_state+0x9e2/0xa40 [ 74.978160] unwind_next_frame+0x618/0xe50 [ 74.982384] show_trace_log_lvl+0xb49/0x1030 [ 74.986779] show_stack+0xfc/0x150 [ 74.990305] dump_stack+0x185/0x1d0 [ 74.993936] should_fail+0x87b/0xab0 [ 74.997648] should_failslab+0x279/0x2a0 [ 75.001699] kmem_cache_alloc+0x136/0xb90 [ 75.005838] dst_alloc+0x295/0x830 [ 75.009373] ip_route_output_key_hash_rcu+0x2ba3/0x3940 [ 75.014731] ip_route_output_flow+0x1eb/0x3c0 [ 75.019217] udp_sendmsg+0x2183/0x3180 [ 75.023091] inet_sendmsg+0x48d/0x740 [ 75.026879] SYSC_sendto+0x6c3/0x7e0 [ 75.030581] SyS_sendto+0x8a/0xb0 [ 75.034028] do_syscall_64+0x309/0x430 [ 75.037910] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 75.043084] Local variable description: ----wait.i@d_alloc_parallel [ 75.049469] Variable was created at: [ 75.053169] d_alloc_parallel+0x7b/0x22e0 [ 75.057304] lookup_slow+0x1a0/0x760 [ 75.060998] ================================================================== [ 75.068343] Disabling lock debugging due to kernel taint [ 75.073775] Kernel panic - not syncing: panic_on_warn set ... [ 75.073775] [ 75.081129] CPU: 1 PID: 5856 Comm: syz-executor5 Tainted: G B 4.16.0+ #83 [ 75.089255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.098606] Call Trace: [ 75.101190] dump_stack+0x14a/0x1d0 [ 75.104808] panic+0x39d/0x940 [ 75.108025] ? show_trace_log_lvl+0xda4/0x1030 [ 75.112616] kmsan_report+0x238/0x240 [ 75.116407] __msan_warning_32+0x6c/0xb0 [ 75.120458] show_trace_log_lvl+0xda4/0x1030 [ 75.124856] ? kmem_cache_alloc+0x136/0xb90 [ 75.129167] ? kmem_cache_alloc+0x136/0xb90 [ 75.133482] show_stack+0xfc/0x150 [ 75.137014] ? print_worker_info+0x1b0/0x660 [ 75.141423] dump_stack+0x185/0x1d0 [ 75.145046] should_fail+0x87b/0xab0 [ 75.148752] should_failslab+0x279/0x2a0 [ 75.152808] kmem_cache_alloc+0x136/0xb90 [ 75.156943] ? dst_alloc+0x295/0x830 [ 75.160660] dst_alloc+0x295/0x830 [ 75.164201] ip_route_output_key_hash_rcu+0x2ba3/0x3940 [ 75.169554] ? __local_bh_enable_ip+0x3b/0x140 [ 75.174124] ? _raw_read_unlock_bh+0x50/0x70 [ 75.178531] ip_route_output_flow+0x1eb/0x3c0 [ 75.183025] udp_sendmsg+0x2183/0x3180 [ 75.186904] ? __msan_poison_alloca+0x15c/0x1d0 [ 75.191564] ? ip_copy_metadata+0xac0/0xac0 [ 75.195888] ? udp_sendmsg+0x1820/0x3180 [ 75.199939] ? udp_send_skb+0x1320/0x1320 [ 75.204073] inet_sendmsg+0x48d/0x740 [ 75.207865] ? inet_getname+0x500/0x500 [ 75.211829] SYSC_sendto+0x6c3/0x7e0 [ 75.215538] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 75.220979] ? prepare_exit_to_usermode+0x149/0x3a0 [ 75.225994] SyS_sendto+0x8a/0xb0 [ 75.229438] do_syscall_64+0x309/0x430 [ 75.233328] ? SYSC_getpeername+0x560/0x560 [ 75.237640] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 75.242815] RIP: 0033:0x455279 [ 75.245991] RSP: 002b:00007f087b294c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 75.253689] RAX: ffffffffffffffda RBX: 00007f087b2956d4 RCX: 0000000000455279 [ 75.260947] RDX: 000000000000ffe4 RSI: 0000000020865000 RDI: 0000000000000013 [ 75.268205] RBP: 000000000072bea0 R08: 0000000020fd9ff0 R09: 0000000000000010 [ 75.275463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 75.282722] R13: 00000000000004f7 R14: 00000000006fa7c8 R15: 0000000000000000 [ 75.290506] Dumping ftrace buffer: [ 75.294042] (ftrace buffer empty) [ 75.297732] Kernel Offset: disabled [ 75.301347] Rebooting in 86400 seconds..