0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:17 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x400400, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x40000) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000380)={0x8, 0xfffffffffffffffd, 0x6, 0x7ff, 0x7, 0x1000, 0x3, 0x1, 0x10000, 0x7fff, 0x400}, 0xb) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x8) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) r5 = request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000580)=ANY=[@ANYBLOB="094000000000eaffc900000000000000ef0a00d945f67e844c6fadbbffce3a03324a0000000000070000ddffff0600000000fdbc2ac86137df562d5446cd00000000000000ff0300000000000005000000000000000400000000d8000006000000000000000000708a84e90c2e56741c4f49177fb58f"]) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, r5) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:17 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) r3 = getpgrp(0xffffffffffffffff) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x200000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r0, 0x0, 0xa, &(0x7f0000000380)='/dev/full\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r3, r4, 0x0, 0x1, &(0x7f0000000340)='\x00', r5}, 0x30) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r7 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r7, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r6, 0x0, 0x2000006) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x400800, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000000)) getsockname(r0, &(0x7f0000000200)=@x25, &(0x7f0000000280)=0x80) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(0xffffffffffffffff, r1, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000000)=""/40) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) listen(r0, 0x0) 11:39:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'}, 0x1c) 11:39:18 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) r3 = getpgrp(0xffffffffffffffff) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x200000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r0, 0x0, 0xa, &(0x7f0000000380)='/dev/full\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r3, r4, 0x0, 0x1, &(0x7f0000000340)='\x00', r5}, 0x30) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r7 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r7, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r6, 0x0, 0x2000006) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x400800, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000000)) getsockname(r0, &(0x7f0000000200)=@x25, &(0x7f0000000280)=0x80) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(0xffffffffffffffff, r1, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:18 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) accept4$x25(r1, &(0x7f0000000200)={0x9, @remote}, &(0x7f0000000240)=0x12, 0x80800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000000)) r4 = getpgrp(0x0) getpgid(r4) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) write$eventfd(r0, &(0x7f0000000180)=0x8001, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='net/softnet_stat\x00', 0xfffffffffffffffc) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:18 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) r3 = getpgrp(0xffffffffffffffff) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x200000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, r0, 0x0, 0xa, &(0x7f0000000380)='/dev/full\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r3, r4, 0x0, 0x1, &(0x7f0000000340)='\x00', r5}, 0x30) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r7 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r7, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r6, 0x0, 0x2000006) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x400800, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000000)) getsockname(r0, &(0x7f0000000200)=@x25, &(0x7f0000000280)=0x80) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x1, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) utimensat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {0x77359400}}, 0x100) 11:39:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(0xffffffffffffffff, r1, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:18 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x400400, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x40000) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000380)={0x8, 0xfffffffffffffffd, 0x6, 0x7ff, 0x7, 0x1000, 0x3, 0x1, 0x10000, 0x7fff, 0x400}, 0xb) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x8) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) r5 = request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000580)=ANY=[@ANYBLOB="094000000000eaffc900000000000000ef0a00d945f67e844c6fadbbffce3a03324a0000000000070000ddffff0600000000fdbc2ac86137df562d5446cd00000000000000ff0300000000000005000000000000000400000000d8000006000000000000000000708a84e90c2e56741c4f49177fb58f"]) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, r5) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b'}, 0x1c) 11:39:19 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r4, 0x0, 0x2000006) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x6, 0x3f}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f00000007c0)={r6, 0x7, 0x1000, "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"}, 0x1008) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000000)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:19 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x400400, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x40000) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000380)={0x8, 0xfffffffffffffffd, 0x6, 0x7ff, 0x7, 0x1000, 0x3, 0x1, 0x10000, 0x7fff, 0x400}, 0xb) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x8) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) r5 = request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000580)=ANY=[@ANYBLOB="094000000000eaffc900000000000000ef0a00d945f67e844c6fadbbffce3a03324a0000000000070000ddffff0600000000fdbc2ac86137df562d5446cd00000000000000ff0300000000000005000000000000000400000000d8000006000000000000000000708a84e90c2e56741c4f49177fb58f"]) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, r5) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:19 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x101000, 0x0) accept$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x1c) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2a0100, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f00000000c0)=0x201000) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f00000008c0), 0x1000) preadv(r0, &(0x7f00000004c0), 0x0, 0x0) 11:39:19 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x400400, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x40000) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000380)={0x8, 0xfffffffffffffffd, 0x6, 0x7ff, 0x7, 0x1000, 0x3, 0x1, 0x10000, 0x7fff, 0x400}, 0xb) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x8) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) r5 = request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000580)=ANY=[@ANYBLOB="094000000000eaffc900000000000000ef0a00d945f67e844c6fadbbffce3a03324a0000000000070000ddffff0600000000fdbc2ac86137df562d5446cd00000000000000ff0300000000000005000000000000000400000000d8000006000000000000000000708a84e90c2e56741c4f49177fb58f"]) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, r5) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:19 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18, 0x0, 0x7, {0x9}}, 0x18) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t'}, 0x1c) 11:39:20 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) accept4$x25(r1, &(0x7f0000000200)={0x9, @remote}, &(0x7f0000000240)=0x12, 0x80800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000000)) r4 = getpgrp(0x0) getpgid(r4) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x300, 0x70bd28, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}}, 0x81) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:20 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x2800) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) prctl$PR_GET_NAME(0x10, &(0x7f0000000200)=""/204) 11:39:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:20 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) accept4$x25(r1, &(0x7f0000000200)={0x9, @remote}, &(0x7f0000000240)=0x12, 0x80800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000000)) r4 = getpgrp(0x0) getpgid(r4) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000e371657d2a68712abff784ee939f5fa0db4ecbce03393d23f67d5d1637a0a5ca0a7d7cd775dd83c316ba46ed0810b3c78d8269c0918a43175916cc534ff7faedc66fa11924dd0bf1723d7e5ca12d04192b093fd3637637dac0573531916007ede284ff172a9d36ae3bc42e67a34285e08675d7c187e807d596959707a9560f3d6f619d085ea936", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r1, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}}}, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)=""/135, 0x87}, {&(0x7f00000003c0)=""/202, 0xca}], 0x2, &(0x7f00000004c0)=""/66, 0x42}, 0x2}], 0x1, 0x2000, &(0x7f0000000540)={0x77359400}) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:20 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) accept4$x25(r1, &(0x7f0000000200)={0x9, @remote}, &(0x7f0000000240)=0x12, 0x80800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000000)) r4 = getpgrp(0x0) getpgid(r4) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n'}, 0x1c) 11:39:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:21 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xf) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) getsockopt$sock_buf(r2, 0x1, 0x1c, 0x0, &(0x7f0000000080)) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(0xffffffffffffffff, r1, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) r4 = gettid() getpgid(r4) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x5, 0x200, 0x8, 0x8000, 0x400, 0x5, 0x8000, 0x101, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000240)={r5, 0x3ff}, 0x8) 11:39:21 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x900, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000180)={0x800100b, 0x9, 0x6}) pread64(r2, &(0x7f00000000c0)=""/107, 0x6b, 0x0) preadv(r1, &(0x7f00000017c0), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000200)={@mcast2, 0x80, r3}) 11:39:21 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x10080, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0xf) r4 = fcntl$dupfd(r3, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r4, r5, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) r7 = getpgrp(0x0) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000200)={r0, 0x0, 0x1, 0x200, 0x5}) getpgid(r7) gettid() setsockopt$inet_tcp_int(r0, 0x6, 0x1a, &(0x7f00000002c0)=0xfffffffffffffff9, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='/dev/loop#\x00') ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000240)={{0x2, 0x4e20, @multicast2}, {0x307, @remote}, 0x8, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, 'bpq0\x00'}) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:21 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x2800) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) prctl$PR_GET_NAME(0x10, &(0x7f0000000200)=""/204) 11:39:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x8, 0x1, 0xc6}, 0x9, 0x1}) 11:39:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:21 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xfa) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:21 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x2800) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) prctl$PR_GET_NAME(0x10, &(0x7f0000000200)=""/204) 11:39:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000000000e"}, 0x1c) 11:39:21 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x0, 0x8, 0x2f, 0x80000000}) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:21 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x10001}, 0x0, 0x0, 0x0, 0x2, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:22 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x2800) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) prctl$PR_GET_NAME(0x10, &(0x7f0000000200)=""/204) 11:39:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) lseek(r0, 0x0, 0x0) 11:39:22 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace(0x4217, r5) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:22 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xf) r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-aes-neon,tgr160)\x00'}, 0x58) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r3, r4, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:22 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0xfffffffffffffffe, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:22 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={'rose0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0xfffffffffffff3d1}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r4, 0x200}, &(0x7f0000000240)=0x8) preadv(r3, &(0x7f00000017c0), 0x1fe, 0x0) fallocate(r0, 0x8, 0xa49f, 0x6) 11:39:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:22 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xf) r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-aes-neon,tgr160)\x00'}, 0x58) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r3, r4, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000010"}, 0x1c) 11:39:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:22 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000000)={{0x7, @name="00c2bf95cd6365c8fabcd1f171d71e27e7a4371847705be89aeb8747c50dedad"}, 0x8, 0x58c, 0x4}) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:22 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace(0x4217, r5) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:22 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xf) r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-aes-neon,tgr160)\x00'}, 0x58) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r3, r4, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x2, 0x0) connect(r1, &(0x7f0000000000)=@nl=@unspec, 0x80) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x2, 0x0) connect(r1, &(0x7f0000000000)=@nl=@unspec, 0x80) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:23 executing program 5: r0 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffff9c, 0x0, 0xe, &(0x7f0000000100)='(wlan0]#bdev\xd0\x00', 0xffffffffffffffff}, 0xd8) r2 = syz_open_procfs(r1, &(0x7f0000000200)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00), 0x896, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0xe}, 0x36, r3}) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:23 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000000)=0xe8) r6 = geteuid() r7 = getuid() setresuid(r5, r6, r7) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000012"}, 0x1c) 11:39:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x2, 0x0) connect(r1, &(0x7f0000000000)=@nl=@unspec, 0x80) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1, 0x0, 0xfc9a}}], 0x1, 0x0, 0x0) sendto$llc(r0, &(0x7f0000000000)="a24f9d74ac4ef87ac0156c79470dbfa9c2f8d22177142e25367ec47c286beb70c97e5bd316b0555b2b76df", 0x2b, 0x1, &(0x7f00000000c0)={0x1a, 0x18, 0x2, 0x3, 0xd852, 0x1, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) 11:39:23 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000200)=0x4) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={r4, 0x81, 0x0, 0x8}, &(0x7f0000000280)=0x18) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:23 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000000)={{0x7, @name="00c2bf95cd6365c8fabcd1f171d71e27e7a4371847705be89aeb8747c50dedad"}, 0x8, 0x58c, 0x4}) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:23 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000200)=""/89, &(0x7f0000000280)=0x59) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f00000007c0)={0x278, r4, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x184, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff63}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1, @mcast2, 0x3ff}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x10001, @local, 0x5}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @rand_addr=0x7}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x87b, @remote, 0x7fff}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x15}, 0xfffffffffffffffa}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vlan0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0xd81, @ipv4={[], [], @remote}, 0x39}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x729cc1a4}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffc}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9e64}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x928}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff090}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x1f}}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}]}, 0x278}, 0x1, 0x0, 0x0, 0x40000}, 0x90) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = dup2(r0, r0) connect$rose(r1, &(0x7f0000000200)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x386, [@bcast, @null, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x40) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000240)={0x60000000}) r4 = memfd_create(0x0, 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b", 0x3}], 0x1, 0x0) getsockname$netrom(r2, &(0x7f0000000100)={{0x3, @null}, [@default, @remote, @default, @remote, @null, @bcast, @netrom, @null]}, &(0x7f00000001c0)=0x48) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r4) sendfile(r2, r3, 0x0, 0x2000006) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) r5 = getpgid(0xffffffffffffffff) setpgid(r5, r5) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x1, &(0x7f0000000780)=[{0x0}]) 11:39:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:24 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000200)=""/89, &(0x7f0000000280)=0x59) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f00000007c0)={0x278, r4, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x184, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff63}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1, @mcast2, 0x3ff}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x10001, @local, 0x5}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @rand_addr=0x7}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x87b, @remote, 0x7fff}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x15}, 0xfffffffffffffffa}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vlan0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0xd81, @ipv4={[], [], @remote}, 0x39}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x729cc1a4}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffc}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9e64}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x928}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff090}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x1f}}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}]}, 0x278}, 0x1, 0x0, 0x0, 0x40000}, 0x90) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00T'}, 0x1c) 11:39:24 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x100, 0x0) 11:39:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:24 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000200)=""/89, &(0x7f0000000280)=0x59) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f00000007c0)={0x278, r4, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x184, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff63}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1, @mcast2, 0x3ff}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x10001, @local, 0x5}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @rand_addr=0x7}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x87b, @remote, 0x7fff}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x15}, 0xfffffffffffffffa}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vlan0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0xd81, @ipv4={[], [], @remote}, 0x39}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x729cc1a4}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffc}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9e64}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x928}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff090}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x1f}}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}]}, 0x278}, 0x1, 0x0, 0x0, 0x40000}, 0x90) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000180)={0x8, 0x6, 0x6, {0x77359400}, 0x5, 0x2000000000000000}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f00000000c0)=0x10) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)=@random={'security.', 'net/softnet_stat\x00'}, &(0x7f0000000240)=""/252, 0xfc) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = dup2(r0, r0) connect$rose(r1, &(0x7f0000000200)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x386, [@bcast, @null, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x40) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000240)={0x60000000}) r4 = memfd_create(0x0, 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b", 0x3}], 0x1, 0x0) getsockname$netrom(r2, &(0x7f0000000100)={{0x3, @null}, [@default, @remote, @default, @remote, @null, @bcast, @netrom, @null]}, &(0x7f00000001c0)=0x48) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r4) sendfile(r2, r3, 0x0, 0x2000006) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) r5 = getpgid(0xffffffffffffffff) setpgid(r5, r5) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x1, &(0x7f0000000780)=[{0x0}]) 11:39:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:24 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x100}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000240)={r1, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}, 0x8}}, 0x100000000, 0x80000001, 0x42, 0xfc2, 0x1}, &(0x7f0000000300)=0x98) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xf) r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r3, r4, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0x5, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x5, 0x80000) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000200), &(0x7f0000000240)=0x8) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000280)={r1, 0x3, 0x32, "a182f47d9c4c77dbc4f83f95723dc77a91c9d5b616c18f98ae6aab09cdcdea8b97c9df92189a2a610fcdb39544e3f0fc56afc1a9c98ab813cdef75e290b5dfa765e3c666de4712be541cdfc181c75187310436e13e100c2ff4f5f60978707ebf9b9d5c1150a0ae758c3eb918457d8d4ec99ebe1c92ba5d56558f949f3707a972b782b2337e7fbf4394651844cc808e9c408858d10b96d9663db3d6489e4b5d717eb54d1c4ea21127f7f6d0d11f89fd68adda63fbe42c3ac6f496580737ea4561eb20d5b4b858b10bc820027a9fa337872991129cb94a7138b8b00ea33cb0c7565375186f29a8"}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x80302, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f00000001c0)={r3, 0x2}) 11:39:25 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x9, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) io_setup(0xadf, &(0x7f0000000000)=0x0) io_cancel(r5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0xffffffff8e81021b, r0, &(0x7f0000000200)="d4e7912a25f315bf289210e6a010bca1b977b7cccd67e50ff40054f672deaec6f609d8b12ff56c69a6767b9137de5f1d048e9146be725109df9b818f687ec13a916fa2", 0x43, 0x7, 0x0, 0x1, r0}, &(0x7f00000002c0)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:25 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x100}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000240)={r1, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}, 0x8}}, 0x100000000, 0x80000001, 0x42, 0xfc2, 0x1}, &(0x7f0000000300)=0x98) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xf) r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r3, r4, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:25 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x2, 0x100}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000240)={r1, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}, 0x8}}, 0x100000000, 0x80000001, 0x42, 0xfc2, 0x1}, &(0x7f0000000300)=0x98) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xf) r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r3, r4, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:25 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) fallocate(r3, 0x10, 0x8, 0x3ff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000fc"}, 0x1c) 11:39:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:25 executing program 5: syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000180)=""/251}, {&(0x7f0000000280)=""/238}, {&(0x7f0000000000)=""/59}, {&(0x7f0000000380)=""/215}, {&(0x7f00000008c0)=""/4096}, {&(0x7f00000000c0)=""/47}], 0x100000000000006f, 0x0) 11:39:25 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x100, 0x0) 11:39:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:25 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) r4 = getpgrp(0x0) getpgid(r4) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000000)={0xffffffffffff9ad2, 0x7}) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000000c0)=0x8) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) preadv(r0, &(0x7f00000004c0)=[{&(0x7f0000000180)=""/23}, {&(0x7f00000001c0)=""/86}, {&(0x7f0000000240)=""/108}, {&(0x7f00000002c0)=""/54}, {&(0x7f0000000300)=""/146}, {&(0x7f00000008c0)=""/4096}, {&(0x7f0000001d00)=""/4096}, {&(0x7f00000003c0)=""/130}, {&(0x7f0000000480)=""/20}], 0x2f0, 0x0) 11:39:26 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1ced6b535ce32230}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r5, 0x100, 0x70bd2d, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x2}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:26 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) r4 = getpgrp(0x0) getpgid(r4) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0xf) 11:39:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 11:39:26 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x4c00, 0x0) r3 = socket$netlink(0x10, 0x3, 0xf) r4 = fcntl$dupfd(r3, 0x3, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000000)={0x4, 0x98c9, 0x5, 0x8001}, 0x10) r7 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r7, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r4, r6, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) r8 = getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000680)=0xe8) r10 = getegid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001840)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) fstat(r5, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = geteuid() stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000001a80)={&(0x7f0000000240)=@proc={0x10, 0x0, 0x25dfdbfb, 0x2080000}, 0xc, &(0x7f0000000500)=[{&(0x7f0000000280)={0xf8, 0x2f, 0x402, 0x70bd2c, 0x25dfdbff, "", [@typed={0xc, 0x48, @u64=0x9}, @nested={0x68, 0x31, [@generic="93d9d57ca61a9102d3390ee22205187d2b7f37ac7183777c3e0117c43203a82600da2d80943d94c2cc9155d2da20ecd0fe5d8748378ce9d81564d1030b0a0284a41d352a1fcda67df360f16b5c49271363572cf8efb6ad611e692c18358761bca8a9"]}, @generic="9c86864cb8b51617022a9c111e666a26dae4aad0c919cc7d5cc18f9b50a40f5f78bd4ff258fd1bacbd061474955cf3e7f7342a1df07ae99cdc186b67aa2aef953b4f359d024303d144101c5228b498ec9291cd298f717e950323b3ea5ee51960756333247512", @typed={0xc, 0x21, @u64=0xa3}]}, 0xf8}, {&(0x7f0000000380)={0x18, 0x1a, 0x200, 0x70bd2b, 0x25dfdbfd, "", [@typed={0x8, 0xe, @pid=r8}]}, 0x18}, {&(0x7f00000007c0)={0x1050, 0x25, 0x8, 0x70bd25, 0x25dfdbfb, "", [@generic="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", @nested={0x40, 0x48, [@generic="a3160664dfeadc24d18e820ed6d2762b81f32b033e41a61bc558306697142a38ca3f07d465bb8dcf57eb9f453204e0fe3122cd569620e83a46"]}]}, 0x1050}], 0x3, &(0x7f0000001a00)=[@cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r8, r11, r12}, @cred={0x20, 0x1, 0x2, r8, r13, r14}], 0x60, 0x90}, 0x1) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000f4"}, 0x1c) 11:39:26 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) r4 = getpgrp(0x0) getpgid(r4) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x14) 11:39:26 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1ced6b535ce32230}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r5, 0x100, 0x70bd2d, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x2}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') io_setup(0x51, &(0x7f0000000000)=0x0) io_pgetevents(r1, 0x5, 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000100), &(0x7f00000001c0)={&(0x7f0000000180)={0x7}, 0x8}) recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:26 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000000)=@netrom) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x1c) 11:39:26 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x4000) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) lsetxattr$security_evm(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='security.evm\x00', &(0x7f0000000340)=@v2={0x3, 0x3, 0xf, 0xd0, 0x15, "1e16c9144c299dbe45f91b1c9fa1b5b875089477d2"}, 0x1f, 0x2) gettid() r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000580)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2800000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r5, 0x304, 0x70bd27, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x44) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000200)={{0x7, 0xffffffffffff8001}, 'port1\x00', 0x85, 0x10, 0x9, 0x1, 0x3, 0x4, 0x0, 0x0, 0x0, 0x3}) 11:39:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x801) 11:39:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f00000001c0)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000200)=r2) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) 11:39:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b", 0x3}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) sendfile(r1, r2, 0x0, 0x2000006) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) r4 = request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000000)={r4, 0x5, 0x3}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'sha256-avx\x00'}}, &(0x7f00000001c0)="6706619ec43b0a4a9f0493161fb78fcfdc4d7bbf083a96cfa2c92db24296145ef759772015d3cc2ff3cae2ee047a2570558b3dc8a0ad02087e341d49b75360a37dbd", &(0x7f0000000240)="2951369ade334c034ec2719e550c50e7f232b5ae485b537edca060737d99bbceeb8c5112ed3123c19327cb199efd65ce0545301b39c0069e2ac908cd7edc75c35075beb6d5ff6dfa89c943188a876d3f39d1096403dd0293f2c9da86b8ff015fb6e2e94a30ab1d7eb6200f38f489a20bfc29d8432b36a61e1051c05197baf77e3b9df3cd82b37c74a9cbe0e55b4fe93bfe1c14ae75bf60cfce1d357311724ed45aef964ff6f3b5696dd117119d08e8aa5693176adfe8546fe9f0133d6f9a0b0ae048127abe4471f20e83cedb5a9f4895818cf465bcc6e411484ac40933e8bf9f29ac80b6449fb0") syz_read_part_table(0x1f, 0x1, &(0x7f0000000780)=[{0x0}]) 11:39:26 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000000)={0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @local}]}) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:27 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x20000050) 11:39:27 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)) r6 = getpid() getpgrp(r6) getpgid(r5) gettid() getpgid(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000002c0)={0x2b, @multicast1, 0x4e22, 0x4, 'sh\x00', 0x1, 0x4, 0x4}, 0x2c) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000018"}, 0x1c) 11:39:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0x0, 0x6, {0x5}}, 0x18) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)=[0x8, 0x200]) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:27 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet(0x2, 0x2, 0x0) connect(r1, &(0x7f0000000000)=@nl=@unspec, 0x80) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:27 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)) r6 = getpid() getpgrp(r6) getpgid(r5) gettid() getpgid(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000002c0)={0x2b, @multicast1, 0x4e22, 0x4, 'sh\x00', 0x1, 0x4, 0x4}, 0x2c) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:27 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f00000000c0)={0x45}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:27 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) r4 = request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="a638b8d46e10259d5882a9e608516b017cff109f5132ef5713a20ae294d42b6687c3af0fa9dfef3c851b9040593dd34a02f7098d4fc05da4bb237300a0f7bb8e9ccd8aa01ae134380762cf5e342ca552c6e45195ab6b7a5c956648d5a2e1d77d94de73e79690bdb565c9cb68cbdd0d1c2f68207ffef2b8508b35f35894ecee07b5c60dcf0f603121e97937ccf3bc2b7da13e7c2f0cf02544", 0x98, r4) keyctl$read(0xb, r4, 0x0, 0x285) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4000, 0x0) 11:39:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000140)={[{0xd1e, 0x1, 0x5, 0xfffffffffffffffa, 0x0, 0x80000001, 0x5, 0x6, 0x9, 0xfffffffffffffcbe, 0x2, 0x5}, {0x6, 0xdf, 0x3ff, 0x2, 0x1, 0x0, 0xf709, 0x2, 0x7fff, 0x6, 0x8, 0x697c, 0x8e3}, {0x3, 0x0, 0x27c7, 0xa423, 0x7f9, 0x710, 0x2, 0x9, 0x8, 0x7, 0xfffffffffffffff8, 0x1, 0x4}], 0x3}) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x2, 0x10082) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f00000001c0)={0x4953355, 0x2, {0x3, 0x1, 0x8001, 0x3, 0x9}}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x440080, 0x0) fcntl$notify(r2, 0x402, 0x8000002a) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 11:39:27 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000200)=0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)) r6 = getpid() getpgrp(r6) getpgid(r5) gettid() getpgid(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000002c0)={0x2b, @multicast1, 0x4e22, 0x4, 'sh\x00', 0x1, 0x4, 0x4}, 0x2c) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:28 executing program 4: socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x400008) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) 11:39:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x6c5, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) 11:39:28 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) socket$inet(0x2, 0x2, 0x0) connect(r1, &(0x7f0000000000)=@nl=@unspec, 0x80) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@'}, 0x1c) 11:39:28 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0xfffffffffffffffb, 0x3, 0x45b}) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$inet(0xa, 0x801, 0x84) 11:39:28 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@broute={'broute\x00', 0x20, 0x6, 0x1138, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200007c0], 0x0, &(0x7f0000000340), &(0x7f00000007c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x40, 0x88f9, 'ip6tnl0\x00', 'team_slave_1\x00', 'caif0\x00', 'vlan0\x00', @dev={[], 0x25}, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], @dev={[], 0x1e}, [0x0, 0xff, 0xff, 0x0, 0xff], 0x908, 0xa38, 0xa68, [@among={'among\x00', 0x840, {{0xbe7d, 0x6, 0x3, {[0x9, 0xf741, 0xff, 0x1, 0x200, 0x1ec000000000, 0xbf, 0x4, 0x4, 0x0, 0xdd69, 0x9, 0x7, 0x800, 0x10000, 0x4, 0xa29, 0x34, 0x5, 0x7f, 0x4, 0x0, 0x8, 0x2, 0xffffffff, 0x7, 0x1f, 0x3a9, 0x9, 0x20, 0x1, 0x1, 0x1, 0x3, 0x9, 0x1, 0x1, 0x0, 0xec8, 0x4, 0x2, 0x0, 0x1ff, 0x8, 0xffffffffffffff23, 0x400, 0x1, 0xffffffffffffffc1, 0x8, 0x0, 0x80000000, 0x2, 0x9, 0x5a, 0x8, 0x8001, 0x0, 0x3, 0x5, 0x3, 0x4, 0x100000001, 0x882f, 0xfeba, 0x8001, 0x401, 0x4, 0x5, 0x5, 0x3, 0x5, 0x8, 0x1, 0x6, 0x5, 0x3cc, 0x81, 0x8001, 0x58, 0x101, 0x8, 0x7, 0x2, 0x6, 0x7fff, 0x6, 0x10000, 0x100000000, 0x638, 0x1000, 0x9, 0x6, 0x1, 0x7, 0x1, 0x6, 0xff, 0x80000001, 0xfffffffffffffffa, 0xd4, 0x2, 0x0, 0xff, 0x20, 0x4, 0xac91, 0x7fff, 0x9e, 0x1000, 0x3, 0x8, 0x8, 0x4e4a, 0x1000, 0x1, 0x8, 0x10000, 0x6, 0xffff, 0x8, 0x7fff, 0x9, 0xc0, 0xc7a9, 0xffffffffffffffc1, 0x9, 0x6, 0x4, 0xfffffffffffffffd, 0x401, 0x9, 0x7fff, 0x6, 0x7fff, 0x1214cbb6, 0x6, 0x1ff, 0x0, 0x2, 0x4, 0x7, 0x5, 0x4, 0x1, 0xffff, 0x3, 0x800, 0xfffffffffffffffd, 0xfffffffffffff12b, 0x1, 0x5c, 0x5, 0xffff, 0x9b0, 0x9, 0xcb58, 0x100000000, 0xe4, 0x1, 0xfffffffffffff0be, 0x9c0c, 0x40000, 0x2000, 0x0, 0xff, 0x20, 0x4, 0x1000, 0x2, 0x5, 0x6, 0x6e479289, 0x100000001, 0x3, 0xffffffffffffffff, 0x0, 0x1, 0x2, 0x3, 0x100, 0x1, 0x7, 0x3a, 0x100000000, 0x100000001, 0x7ff, 0xcf, 0x5, 0x5, 0x7000000000000000, 0x3, 0xfef, 0x0, 0x3, 0x7, 0x8, 0xff, 0xdb4c, 0xe10, 0x8001, 0x3f, 0x8000, 0x3, 0xb0, 0x4, 0x401, 0x6, 0x2, 0x8001, 0x4, 0x3, 0xdf, 0x1, 0x5, 0x3, 0x2000000000000000, 0x80, 0x80000000, 0x1, 0x2cc00, 0x4, 0x8001, 0xffffffff, 0x81, 0x6, 0x3ff, 0x100000001, 0x7, 0x9, 0xfa, 0x4, 0x7fffffff, 0x2, 0x2, 0x2, 0x6, 0x3, 0x6, 0x8, 0x1, 0x5, 0x40, 0x40, 0x900c, 0x401, 0x8000, 0x3, 0x0, 0x8000, 0x100000000, 0x1, 0x1, 0x8, 0x3, 0x20, 0x7, 0xef5b], 0x2, [{[0x0, 0xd9], @empty}, {[0x3, 0x3ff], @initdev={0xac, 0x1e, 0x0, 0x0}}]}, {[0x20, 0x2, 0x401, 0xfe00000000000000, 0x1, 0x8, 0x100, 0x5, 0x1ff, 0x9, 0x9, 0x8001, 0x6, 0xc9a, 0x401, 0xd04, 0xaa9, 0x4, 0x6, 0x5, 0xffffffffffff8001, 0x6, 0x8000, 0x9, 0x9, 0x9, 0x6, 0x5, 0x9, 0x7, 0x3f, 0x5, 0x3, 0x1ff, 0x1, 0x5, 0x9, 0x3, 0x7, 0xe4, 0x6, 0x5, 0xff, 0x4, 0x1, 0x4, 0xcbb6, 0xfffffffffffffffd, 0x200, 0x2, 0x2, 0x87, 0x5, 0x200, 0x4, 0x100000001, 0x1, 0x100, 0x7, 0x7, 0xb0, 0x7, 0x9, 0x7f, 0x2, 0xb0, 0xff, 0x9, 0x1, 0x8, 0x5, 0x81, 0x10000, 0x80000001, 0x100000001, 0x0, 0x6, 0x7fff, 0x1, 0x80, 0x5, 0x5, 0x1, 0x7a54, 0xff, 0x2b, 0x1, 0x5, 0xfffffffffffffffd, 0x5, 0x9, 0x8, 0x6, 0x6, 0x4, 0x100, 0x101, 0x9, 0x1, 0x85, 0xfffffffffffff000, 0x1f, 0x1, 0x2f53, 0x3ff, 0x7f, 0x8ee5, 0x8, 0x10000, 0x4, 0x7, 0x6, 0x0, 0x7, 0x5, 0x7, 0x7, 0x2, 0x0, 0x401, 0xfffffffffffffa14, 0x3, 0x8, 0x8, 0x5c9, 0x4, 0xffffffffffffd200, 0x10001, 0x80, 0x2, 0x800, 0x2, 0x8, 0x9, 0x4, 0x200, 0x10000, 0x7f, 0x5, 0x0, 0x6, 0x2, 0x4a6f, 0x2, 0x3, 0x4, 0x32b, 0x7, 0x80, 0x9, 0xa2, 0x7, 0xb12, 0x6, 0xafe7, 0x1ff, 0x7fff, 0x1f, 0xffffffffffffff80, 0x7, 0x5, 0x2, 0x90, 0x20, 0x1, 0x3, 0x1000, 0x6, 0x8, 0xffffffffffffff7f, 0x1a, 0xa9, 0x1ff, 0x1f, 0xc7a, 0xa259, 0x80000001, 0x101, 0x401, 0x3000000000000, 0x4, 0x9, 0xfa, 0x80, 0x100000, 0x9, 0x3, 0x80000000, 0x0, 0x6, 0x9, 0x1, 0x9b6a, 0x3, 0x940, 0x1, 0x0, 0x6, 0x100000000, 0x8, 0xdc, 0x1000, 0x1, 0x7ff, 0xffffffffffff0000, 0x8, 0x20, 0x7fff, 0x9, 0x1, 0x3, 0x2400000000, 0x1, 0x3, 0x3, 0x1, 0xdc, 0x10001, 0x4, 0x13, 0x3, 0x3, 0x101, 0x8, 0x7fff, 0xfff, 0x7ff, 0x1f, 0x1cc, 0x0, 0x9, 0x8, 0x1, 0x6, 0x9, 0x6, 0x8, 0xfffffffffffffffc, 0xd7, 0x5032153a, 0x4, 0x1, 0xffffffff80000001, 0x5, 0x1, 0x4df, 0x2, 0x1ff, 0x3, 0x3c, 0x6, 0x790, 0x3, 0x7, 0x4, 0x9, 0x3], 0x1, [{[0x1, 0x80000000], @multicast2}]}}}}, @cgroup0={'cgroup\x00', 0x8, {{0x8a44, 0x1}}}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x2, 'system_u:object_r:dhcpd_var_run_t:s0\x00'}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7}}}}, {{{0x11, 0x4, 0xe6df, 'nr0\x00', 'ip6tnl0\x00', 'veth1_to_bridge\x00', 'irlan0\x00', @empty, [], @broadcast, [0xff, 0xff, 0xff, 0xff], 0x70, 0xd8, 0x150}, [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffb}}, @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xffffffffffffffff}}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x1, 0x8000, 0x0, 0x1, 0x0, "890874b623eda1ef7f8da6642d4adf369e1f228f74b45fee032e726157792640b8bae644f2e3a2c9e05149f9143fc002170703f2377e0b51bd32f5a34746215a"}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x3, 0x4, 0x8a47, 'gretap0\x00', 'lo\x00', 'lapb0\x00', 'bridge_slave_1\x00', @random="0ea31ea2d47a", [0x0, 0x0, 0xff], @remote, [0x0, 0x0, 0xff, 0xff, 0xff], 0xa0, 0x168, 0x1b0, [@cgroup0={'cgroup\x00', 0x8, {{0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x100000000, 0x2}}}, @common=@nflog={'nflog\x00', 0x50, {{0xc7, 0x800000000000000, 0x6, 0x0, 0x0, "ab11edfea24fe3b838775cffe65853fd8cfb9a909c424898c0cb765778f3046f3ab34309bd883360e0a18fc7f5743a90fb625abf607cd1685c1b3405554b43db"}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"a2fb000e2323edd18b963c5b4ec235167e5ec9d6000f93c3118b543c3248"}}}, {{{0x481b44c1f1cbf263, 0x5, 0x8884, 'netdevsim0\x00', 'bcsh0\x00', 'veth0_to_bridge\x00', 'netdevsim0\x00', @dev={[], 0x1b}, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffc}}}, @common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}]}, @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffe}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{{{0x1f, 0x4, 0x0, 'ipddp0\x00', 'bcsh0\x00', 'veth1_to_bridge\x00', 'bond0\x00', @link_local, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @local, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], 0x70, 0xa0, 0xf0}, [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffd}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x9, 0x80000000}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff, 0x1, [{{{0x0, 0x10, 0x9baf, 'ifb0\x00', 'ipddp0\x00', 'dummy0\x00', 'lapb0\x00', @random="dad6b96262ee", [0x0, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x120}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0xffffffff80000000}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x9}}}]}, @common=@log={'log\x00', 0x28, {{0x1, "3485d00737b8e9ba6d3c7896473e988f7868c2feacdfc882593d5555ddee", 0xd}}}}]}]}, 0x11b0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000000)={@ipv4={[], [], @dev}, 0x0}, &(0x7f0000000200)=0x14) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000240)={r6, 0x1, 0x6, @dev={[], 0x27}}, 0x10) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r4, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpeername$netrom(r3, &(0x7f0000000280)={{0x3, @null}, [@netrom, @remote, @default, @netrom, @null, @netrom, @default, @null]}, &(0x7f0000000500)=0x229) getpgid(0xffffffffffffffff) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x400) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:28 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in=@broadcast, @in6}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r4, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) r6 = getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(r6) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000340)=[@text64={0x40, &(0x7f0000000240)="440f20c03509000000440f22c026670fc7a9f9320000c744240091000000c7442402f6ffff7fff1c24b9800000c00f3235000100000f300f01c9c7442400a2000000c7442402a67e1b43ff2c240fbdea8f2818edc1a0360f01d166baf80cb82870128fef66bafc0c66b8040066ef", 0x6e}], 0x1, 0x26, &(0x7f0000000300), 0x0) r7 = request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x2, 0x3, 0x9}) keyctl$read(0xb, r7, 0x0, 0xfffffffffffffd01) getpeername$inet(r3, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000200)=0x10) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x4000) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:28 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x1000, 0x80) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000140)={0x0, @bt={0x5, 0x7, 0x1, 0x1, 0x6, 0x8001, 0x7fff, 0x2, 0x82a, 0xa2ed, 0x7, 0x2f400000000, 0x3, 0x5, 0x10, 0x8}}) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f00000000c0)={0x1, {0x77359400}, 0x1, 0x81}) r2 = socket$inet(0xa, 0x4000000000000803, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:28 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r5) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x4, 0x2, 0x3, 0xffff, 0x5, 0x93, 0x200, 0x3}, &(0x7f00000000c0)={0x0, 0xffff, 0x1, 0x7fff, 0x5f00000000, 0x2, 0x7, 0x400}, &(0x7f0000000100)={0x8, 0x7, 0x6, 0x10001, 0xff, 0x3, 0xf7, 0x5}, &(0x7f00000001c0)={r1, r2/1000+30000}) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:28 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000480)=[{&(0x7f0000000000)="2bd83b001012b079117d1313053f947d", 0x10}], 0x1, 0x81806) sendfile(r0, r1, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x400040, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f00000000c0)=""/125) ioctl$KVM_RUN(r0, 0xae80, 0x0) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:28 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = eventfd(0x0) read$eventfd(r4, &(0x7f0000000000), 0x8) r5 = fcntl$dupfd(r4, 0x0, r3) write$FUSE_INTERRUPT(r5, &(0x7f0000000040)={0x10}, 0x10) r6 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r8 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) fstat(r8, &(0x7f0000000200)) pwritev(r8, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r6, r7, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) r9 = getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000340)={[], 0x9, 0x80000000, 0x100, 0x0, 0x6, r9}) getpgid(0xffffffffffffffff) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000300)={0x52, 0x7ff, 0x4, 0x60, 0xfffffffffffffff9, 0x39}) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x6ea}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000002c0)=r10, 0x4) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:29 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpeername$unix(r2, &(0x7f0000000200), &(0x7f0000000000)=0x6e) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000380)=0xe8) sendmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x1d, r5}, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=@canfd={{0x4, 0x3, 0x3}, 0x27, 0x3, 0x0, 0x0, "fc7082d83eef1b58138a761aa0817b4bf4d8c88a951fd0b21e7f3a7ba1991df544b14456c00f68ac8661975852db999f05a1be7fff2670f90d5562f535ef5c5d"}, 0x48}, 0x1, 0x0, 0x0, 0x40004}, 0x40) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0x40007f) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x7f}, &(0x7f0000000100)=0x8) prctl$PR_SET_PDEATHSIG(0x1, 0x9) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={r2, 0x3, 0x3, 0x8, 0x4, 0x6}, 0xfffffffffffffd41) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:29 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r3 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) r5 = getpgrp(0x0) getpgid(r5) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000200)={0x5, 0x1, {0xffffffffffffffff, 0x2, 0x6, 0x0, 0x2}}) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:29 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = eventfd(0x0) read$eventfd(r4, &(0x7f0000000000), 0x8) r5 = fcntl$dupfd(r4, 0x0, r3) write$FUSE_INTERRUPT(r5, &(0x7f0000000040)={0x10}, 0x10) r6 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r8 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) fstat(r8, &(0x7f0000000200)) pwritev(r8, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r6, r7, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) r9 = getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000340)={[], 0x9, 0x80000000, 0x100, 0x0, 0x6, r9}) getpgid(0xffffffffffffffff) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000300)={0x52, 0x7ff, 0x4, 0x60, 0xfffffffffffffff9, 0x39}) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x6ea}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000002c0)=r10, 0x4) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:29 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2, 0x200000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa0, r1, 0x310, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x15}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x36}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x14}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x20}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x31}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @initdev}, 0xffffffffffffff74) [ 1036.644699][ C0] net_ratelimit: 8 callbacks suppressed [ 1036.644709][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000e8"}, 0x1c) 11:39:29 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = eventfd(0x0) read$eventfd(r4, &(0x7f0000000000), 0x8) r5 = fcntl$dupfd(r4, 0x0, r3) write$FUSE_INTERRUPT(r5, &(0x7f0000000040)={0x10}, 0x10) r6 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r8 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) fstat(r8, &(0x7f0000000200)) pwritev(r8, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r6, r7, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) r9 = getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000340)={[], 0x9, 0x80000000, 0x100, 0x0, 0x6, r9}) getpgid(0xffffffffffffffff) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000300)={0x52, 0x7ff, 0x4, 0x60, 0xfffffffffffffff9, 0x39}) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x6ea}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000002c0)=r10, 0x4) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000000), 0x0, 0x1000000000000000) 11:39:29 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x20000, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x805, 0x84) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000000c0)={0x91a, 0x0, 0x81, 0x4, 0x4, 0x6}) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}}, 0x6) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0xa8100, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e21, 0x3, @empty, 0x6}, 0x1c) setsockopt$inet_int(r0, 0x0, 0x36, &(0x7f0000000080)=0x9, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e21, 0x5, @mcast2, 0x7}], 0x1c) 11:39:29 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000000)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x6, 0x14000) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:29 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xe) r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e24, @multicast2}]}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000500)={r4, @in={{0x2, 0x4e20, @local}}}, 0x84) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, 0x0, &(0x7f0000000240)=0x265) r6 = getpgrp(0x0) getpgid(r6) gettid() getpgid(0xffffffffffffffff) keyctl$session_to_parent(0x12) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000280)) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x0, 0x3, 0x80000001, 0x1, 0xffcc}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e22, @broadcast}, 0x10) 11:39:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:30 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000000)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x6, 0x14000) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f129f4426501791e13fabb8b5366306c5738eac57e643034ed55281") r1 = socket$inet(0xa, 0x801, 0x84) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xbc, r3, 0xc01, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xe52}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8}]}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0xc0}, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x18}}}}, &(0x7f0000000340)=0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000380)={r4, 0x2}, &(0x7f00000003c0)=0x8) 11:39:30 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x11c, @time={0x0, 0x989680}, 0x7, {0x5, 0x7}, 0x8, 0x3, 0x10001}) write$FUSE_LSEEK(r0, &(0x7f0000000180)={0x59a33912d759b698, 0x798265da851b2d57, 0x1000000006, {0x1000000003}}, 0x184) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:30 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) ftruncate(r0, 0xffffffffffffff7f) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() chdir(&(0x7f0000000000)='./file0\x00') getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) [ 1037.690276][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000000)={0x2b89, 0x0, 0x400}) recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:30 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000000)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x6, 0x14000) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @local}, 0xc) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000180)={0x7a, 0xc93e, 0xb, 0x8, 0x1}) r2 = socket$inet(0xa, 0x801, 0x84) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f00000000c0)={0x8001, 0x9, 0x4655, 0x7, 0x321, 0x6, 0x16, "da573d1522363e7aebae999cc1018a8277ca20c0", "8df9f74aea3259ac9b500cfc99685c1c3956aca5"}) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x1) 11:39:30 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) [ 1037.874977][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:30 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpeername$unix(r2, &(0x7f0000000200), &(0x7f0000000000)=0x6e) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000380)=0xe8) sendmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x1d, r5}, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=@canfd={{0x4, 0x3, 0x3}, 0x27, 0x3, 0x0, 0x0, "fc7082d83eef1b58138a761aa0817b4bf4d8c88a951fd0b21e7f3a7ba1991df544b14456c00f68ac8661975852db999f05a1be7fff2670f90d5562f535ef5c5d"}, 0x48}, 0x1, 0x0, 0x0, 0x40004}, 0x40) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:30 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/softnet_stat\x00') ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000200)={0x1, 0x0, 0x2, 0x5, {0x5, 0x3, 0xe57, 0x8}}) recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000001c0)={0x16, @dev={0xac, 0x14, 0x14, 0x21}, 0x4e21, 0x1, 'dh\x00', 0x0, 0x1, 0x2e}, 0x2c) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x20, 0x5, 0xfffffffffffffff8}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x63) [ 1038.012129][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:30 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpeername$unix(r2, &(0x7f0000000200), &(0x7f0000000000)=0x6e) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000380)=0xe8) sendmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x1d, r5}, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=@canfd={{0x4, 0x3, 0x3}, 0x27, 0x3, 0x0, 0x0, "fc7082d83eef1b58138a761aa0817b4bf4d8c88a951fd0b21e7f3a7ba1991df544b14456c00f68ac8661975852db999f05a1be7fff2670f90d5562f535ef5c5d"}, 0x48}, 0x1, 0x0, 0x0, 0x40004}, 0x40) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:31 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:31 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000080)={0x2, 0x81}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:31 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) [ 1038.164323][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x60, &(0x7f00000000c0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}, 0x3f}], 0x1, 0x4000000000000000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:31 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpeername$unix(r2, &(0x7f0000000200), &(0x7f0000000000)=0x6e) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000380)=0xe8) sendmsg$can_raw(r0, &(0x7f0000000640)={&(0x7f0000000500)={0x1d, r5}, 0x10, &(0x7f0000000600)={&(0x7f0000000580)=@canfd={{0x4, 0x3, 0x3}, 0x27, 0x3, 0x0, 0x0, "fc7082d83eef1b58138a761aa0817b4bf4d8c88a951fd0b21e7f3a7ba1991df544b14456c00f68ac8661975852db999f05a1be7fff2670f90d5562f535ef5c5d"}, 0x48}, 0x1, 0x0, 0x0, 0x40004}, 0x40) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:31 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x4, 0x4000) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000000c0)) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000100)={0x1, {{0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0x3}}, {{0xa, 0x4e21, 0x4, @loopback, 0xef}}}, 0x108) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) [ 1038.324763][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'veth0_to_bond\x00', 0x2}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="31ff000000000000000000") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:31 executing program 0: r0 = syz_open_procfs(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) [ 1038.481153][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1038.496860][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:31 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:31 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:31 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0xa, 0x5, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) [ 1038.637856][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:31 executing program 0: r0 = syz_open_procfs(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000002"}, 0x1c) 11:39:31 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:31 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000000)=']^vmnet0&\x00'}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00), 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:31 executing program 0: r0 = syz_open_procfs(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:31 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:31 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000000c0)=0xffff) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:31 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000200)) getpgrp(0x0) getpgid(0xffffffffffffffff) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x5}, 0x10) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:31 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0xfcb5) 11:39:32 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) 11:39:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind(r0, &(0x7f00000000c0)=@tipc=@name={0x1e, 0x2, 0x3, {{0x43, 0x3}, 0x3}}, 0x80) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:32 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r0, r1, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xffffffffffffffe0, 0x40) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:32 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) 11:39:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00), 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) [ 1039.713314][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f0000000100)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f00000001c0)={0x0, {0x2, 0x4e20, @rand_addr=0x8000}, {0x2, 0x4e21, @local}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}, 0x204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x101, 0x5}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x4}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e20, @loopback}}, 0x0, 0x7fffffff, 0x7, 0x4, 0x9}, &(0x7f0000000380)=0x98) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$swradio(&(0x7f0000000400)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000500)={0x0, 0xbc, "143a46bc3430c88b7518dd7968c8cb0c252851da245c6b5b8d7d5accf0eaabeba39080d3313b2d8ea06201f3f5c4990c1a5da17d524c391337d8df708b0caf315f4e9a576ef38e89db2dae071c0d8220e2c6bbd9406b0d46f56b806de86d3a4fb76bf199c902633e3d91da485ebb754ad8570f8f48e7206ccdc7c20d882a408875138380c9d421a15efe1b8a0bbd1c64f431ae9509aea2dba135b7347b6e995fa2e0f1f07006be737e5c832ff1e767eb879be9dcac6f2dd54b9fd2a4"}, &(0x7f0000000600)=0xc4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000004c0)={r4, 0x3}, &(0x7f00000003c0)=0xfffffffffffffd5d) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000140)={r5, 0x1}, &(0x7f0000000180)=0x8) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000000c0)={0x20, 0x1, 0x9, 0x8, 0x8, 0xdaf}) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:32 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) 11:39:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00), 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:32 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x80000001, 0x40000) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f00000007c0)={0x1, 0x0, 0x2080, {0x110000, 0x1, 0x2}, [], "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", "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"}) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) write$binfmt_elf32(r3, &(0x7f0000002840)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0x7, 0x400, 0xb0, 0x100000001, 0x3, 0x3e, 0xe9f0, 0x214, 0x38, 0x26f, 0x400, 0x3, 0x20, 0x2, 0x8001, 0x7f, 0x1}, [{0x60000006, 0x20, 0x9, 0xfffffffffffffc01, 0x1, 0x7, 0x7, 0x7}], "301f5dcd0d99791ec5a87740501221d81b579ef27900e60828d4283d9bcdacae667ec82f929c2bfc18a60c5b52eb6b8fe4623bb4d3a197f6a2a77bb68611d6327c09c9adbb55eb76c8f476807213a5773889311e81447b764afec58b40a581a442d0ca5327f2693e546491f519961eabd081203436f65809027e90a347be149d964cde4e4b87", [[], [], [], [], [], [], [], []]}, 0x8de) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0x8, 0x0, 0x3ff, 0xeb, 0x100000001, 0x5, 0x256a, 0x0}, &(0x7f0000000300)=0x20) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000340)={r2, 0x100000001, 0x7ff}, 0x8) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) r3 = socket$inet(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e21, 0x7, @loopback, 0x710}}, 0x101, 0x401}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000380)={r4, 0x9, 0x10, 0xea96, 0xfffffffffffffff7}, &(0x7f0000000240)=0x18) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00), 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:32 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) 11:39:33 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='&\x02\xbf') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x0, 0x0) 11:39:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000002"}, 0x1c) 11:39:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @initdev}, 0x10) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x68) 11:39:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:33 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000180)=0xa815, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000080)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) 11:39:33 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:33 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x3}) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="850000002e0000003500000080ffffff950000000000b2c4a6027dd60000"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0x80010, r0, 0x0) r1 = socket$inet(0xa, 0x7ff, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:33 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x1, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x200, 0x3, 0x80000000}) r2 = socket$inet(0xa, 0x801, 0x84) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x1, @bcast, @rose={'rose', 0x0}, 0x1f, 'syz1\x00', @default, 0x1, 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) getitimer(0x400002, &(0x7f0000000200)) 11:39:33 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000240)='mounts\x00') ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x2, r1}) recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:33 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:33 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xf) r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x7}, 0x10) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x1010180}, 0xc) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r3, r4, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000240)=""/153) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) [ 1041.088367][ T4064] Unknown ioctl 22025 11:39:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) [ 1041.112076][ T4064] Unknown ioctl 22025 11:39:34 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0), 0xc4}}], 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCXONC(r0, 0x540a, 0x7fff) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f00000000c0)=0x8) preadv(r0, &(0x7f00000017c0), 0x100000000000035d, 0x0) 11:39:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x2) 11:39:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000dc"}, 0x1c) 11:39:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:34 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:34 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000200)="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", 0xfd) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0xfff) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @raw_data=[0x1, 0x2, 0x401, 0xd0, 0x6, 0x1ff, 0x6, 0x8, 0x20, 0x7fff, 0x82b, 0x1, 0x1000, 0x0, 0x7, 0x65ae5412, 0x3, 0x5, 0x9, 0x1ff, 0x0, 0x39b8, 0x8000, 0xfffffffffffffff8, 0x2, 0xfff, 0x6, 0x0, 0x2, 0x6, 0x200, 0x6]}) ioctl$UI_DEV_CREATE(r2, 0x5501) 11:39:34 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x100000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="120000001900010200000000000000001d0000008f195da1d7439c87aa0577a2d7e84e34c9c2e21f665758756b1ae3e7ff5221a6bd2e3627d5d12447e0201f9ff4318fbd85852d3af6c18afb488dedd92866b2dde599906d5c8fd135adb9dd876ea18916914b64b42ece44ac301c97976153decdeff8976c8d9897731452dc43d3958492ff90beb97406c1cadcf59fef8f95ad6d63030e84ac77dd2922230ad0b3aadf34e73f8d6b1da073aa26ea6d26f23d12e21af2166fa19563c4c3710b049c8e3ce2e5ef33c45cc2b47203f5020957ede729d376e55d2be1a092816bafcec918851c34997dbe8362"], 0x363}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket$inet(0xa, 0x801, 0x83) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x400240) statx(r3, &(0x7f0000000140)='./file0\x00', 0x4000, 0xa00, &(0x7f0000000300)) connect$inet(r2, &(0x7f0000000100)={0x2, 0x2000000, @initdev}, 0x1) syncfs(r1) 11:39:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:34 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000fe"}, 0x1c) 11:39:35 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:35 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x88) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:35 executing program 0: syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000000)) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:35 executing program 0: syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:35 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:35 executing program 0: syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x10000000) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xfc, r1, 0x93e, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2000000000}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x10}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x9f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4000}, 0x20000010) 11:39:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$inet(0x2, 0x6, 0x8001) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x40040, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x8, 0x7ff, 0x3, 0x3, 0x0, 0x47, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x9, 0x6, 0x80, 0x100000001, 0x100, 0xfffffffffffffff8, 0x20, 0x2, 0x1000, 0x401, 0xb0, 0x7, 0x3, 0x1ff, 0x3, 0x8, 0x88d, 0x0, 0x0, 0x2, 0xffffffffffffffff, 0x10000, 0x1, 0x0, 0x97, 0x0, @perf_config_ext={0x6, 0x9}, 0x7218, 0x40, 0x2, 0xe, 0x20, 0x5, 0x5}, 0x0, 0x2, r1, 0xa) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e21, @initdev}, 0xfefe) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x400, 0x0) 11:39:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x63) 11:39:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) 11:39:35 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:35 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="89e39e340d39baf375823c8c9700dd032b7028849213381e48536f934ab7f22293e66b0cb2de7ea94cd7a78868d1d405a9492b86c69fc51e3a9e03cbc1b40927ea29eae3c2d50f25ff8ef3b1e91a7a3aea301c701c6c24e5bd28fa21f2b7e043297e3b1c236bfc19b1a7a52dc9ea9f48d5cfba38516c553743af67fc319d818a1fb5e297462c964790153bc6e8de96e5e56f37993ce0d97a2455d20ee3e2e33c1512c5c5e1e565c1ae97958793d6c8268420fcc305be1e00c7a72d5fcb141fee87007c0714dc3c40f217a997c012b75b2f585c6c77c29d23d338ad167cdc6e2cb02f1013d4ea6d3d1b6a67afbaa8361e40d6ff9a32", 0xf5, 0xfffffffffffffff8) keyctl$assume_authority(0x10, r1) 11:39:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x63) 11:39:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x183000) write$9p(r1, &(0x7f0000000140)="095583444ff3c69df073bffb02749fa4af28ae5b8bb42de25002cb452430fe7976ba97cd5f99ad67a39326c1ee369eda6691cfd8c2426f516ca8d65c053f84c5a0dfefa336abd060e0bad95e4dfccbee51da733f4792cfc78588ca16b15fca22943f417ad0ff55a6df77ec9a5a61239c5fd56af74e8bf2c1b8f201fe81c3c649d14eed49df3756da4195e383a0c69be11cd9", 0x92) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:36 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x63) 11:39:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000001, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000640)=[{&(0x7f00000000c0)=""/109, 0x6d}, {&(0x7f0000000180)=""/157, 0x9d}, {&(0x7f0000000240)=""/162, 0xa2}, {&(0x7f0000000300)=""/244, 0xf4}, {&(0x7f0000000400)=""/218, 0xda}, {&(0x7f0000000500)=""/182, 0xb6}, {&(0x7f00000005c0)=""/114, 0x72}, {&(0x7f0000000000)=""/60, 0x3c}], 0x8, 0x0) 11:39:36 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000fe"}, 0x1c) 11:39:36 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x10202, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x81, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x101}) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f00000000c0)=""/51) 11:39:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:36 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x8b4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') r1 = shmget(0x0, 0x3000, 0x54001201, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000180)=""/137) recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x200, 0x5}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x7, 0x8, 0x8, 0x2, 0x80000000, 0x800, 0x2, 0x8, r3}, 0x20) 11:39:37 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/snmp\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)={0x12c, r1, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x8}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x100}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffffffffff0d}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffffffffffe3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x20}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x241cead43891d80f}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1ff}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2cb}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x8004}, 0x15) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000540)) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x10000, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000240)={0x9c0000, 0x531, 0x400, [], &(0x7f0000000200)={0x9d090d, 0x4ee7, [], @p_u8=&(0x7f00000001c0)=0x5}}) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f00000000c0)={0x3, 0x0, [{0x0, 0x0, 0xdb3f}, {0x0, 0x0, 0x8}, {0xeff, 0x0, 0x4}]}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x1a100, 0x0) fsetxattr$security_evm(r4, &(0x7f00000005c0)='security.evm\x00', &(0x7f0000000600)=@ng={0x4, 0x8, "6e25f1106fb87726e025dc86c08862a09f3997"}, 0x15, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r5 = socket$inet(0xa, 0x801, 0x84) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r6, 0x400454ce, r7) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x8101, 0x0) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0xfffffffffffffe34) 11:39:37 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x806, 0x7ffd) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:37 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:37 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='fdinfo/3\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x10000, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x20, 0x0) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="d700000007000000ec7675cb213049a4afc0a0bfe64404000044212e8026a87b2b5c5e6be37ea79ff88f5d63bf8b0d9943798ab707c569d5769753d4f7b5cf86cba789d181b466107d9285d4ab853ff417090056826667065672ffc5b579b1b094461c8ac79a7af1d5ac2d2dca2a295878379535f0a573b34eca82e3f4937502be5d766091c483410c27594700004df40600288911d13aef47c0fe9dacd6cb8b78cd00dbf8d8a5861e6f611b2008ce31100076ff4ada8ec6e2b5aca77f76d087e14ff14faf6dab1e68faa2647946a3cfa44a49ededec9fc6d1857e69ec3256c9cc42fa25ddf58d133c5941561296091093ed1ea20cfd4269dc86325a2416516e069fb915d8b1d2b92aefd3e0d94499b516998b58d9de871ee66c033c33c02fdb2ab42e368375b9e43573a956322d99d8328058cded1df570e32fe3a129950b0d0c1eefbb594b75464c78760fef4d79f3147ff75a2fb6ebc6a95a683e5c95e3d7763a86293adf148e2e1a5a7de5072edeb1d5768b9d16e7249cbdd002128eeafcef9888770107ede5b9aa841503ab8c230b09d2b5fe5c1d11c8f36986f7edc31cb7a3ef09b5d6e438f8b0c0e7a1c5dd26a15be61952107562cc245bd705c0d57b1435efe9af0874f6d928a34fcf89e2e8472a1d53ece56f43bf558f82f4aaba231136da8e991e9af6ee69246b7f6b0e41a6c9ddc416c04b0cebc0c21ab22492b2355df7830068b0c560e483af719e6743bf2825712a0acc8c137ae105fb9136906cef377043aace01ee85c1ae94ba3d75d00a26deeb5d7f1190ebfec7bd580af2c156a1409e377d8547c378c0ea7e135ba9862776d10af2fc43621be32a161880e88553ca9637b6f1148beef577e18576ad7905d90a1abb32c36a8ec0e1a3a2f3ef00565243440d0493782b628c510ab4"], &(0x7f00000002c0), 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1b06}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x4b, 0x794}], 0x1) 11:39:37 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:37 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x7fff, 0x8001, 0x0, 0xcc8d, 0x4}, &(0x7f0000000100)=0x14) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x10000, 0x0) mount(&(0x7f0000000200)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x0, &(0x7f00000002c0)='-[\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000140)={r3, 0xfffffffffffffff7, 0x30}, &(0x7f0000000180)=0xc) 11:39:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000000007f"}, 0x1c) 11:39:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x800, 0x3}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r2, @in6={{0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}, 0x5, 0xfffffffffffffffe, 0x800, 0x0, 0x7fffffff}, &(0x7f0000000200)=0xff1a) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:37 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:37 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:37 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') epoll_create(0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adcb37d3c123f0000b0707c381d40297febdfbaeb3863ddca0c7256ced79c155127f6dc6d2cda3baa42aad0056586747bdd398a77") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:38 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:38 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:38 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x511080, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000003"}, 0x1c) 11:39:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e21, @rand_addr=0x100000000}, 0x80) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:38 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:38 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:38 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) recvmmsg(r0, &(0x7f00000003c0), 0x400000000000165, 0x3ffffffe, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:38 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:38 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:38 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:38 executing program 4: r0 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000080)=@id, &(0x7f00000000c0)=0x10, 0x80000) fstat(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000005c0)=r8, 0x4) splice(r8, &(0x7f00000006c0), r8, &(0x7f0000000700), 0x50, 0x5) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000540)={0x0, 0x0, 0x9, 0x9}) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=r1, @ANYBLOB="02000500", @ANYRES32=r2, @ANYBLOB="040002000000000008000400", @ANYRES32=r3, @ANYBLOB="00004000d4964aa4cf2e47344c6c2e5b813da5a3dccc56f5abc3cc26c3d34a3b386fb7cc25eb8d024948c33281", @ANYRES32=r4, @ANYBLOB="08000600", @ANYRES32=r5, @ANYBLOB="08000600", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r7, @ANYBLOB="10000200000000002000010000000000"], 0x5c, 0x1) r9 = pkey_alloc(0x0, 0x0) pkey_free(r9) r10 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r10, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r11 = socket$inet(0xa, 0x801, 0x84) connect$inet(r11, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:38 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000001"}, 0x1c) 11:39:39 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:39 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = syz_open_dev$adsp(&(0x7f0000001240)='/dev/adsp#\x00', 0xaf2, 0x62000) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x9, r3, 0xf1b7) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x10000, 0x0) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000001200)={{&(0x7f00000001c0)=""/4096, 0x1000}, &(0x7f00000011c0), 0x1}, 0x20) getsockopt$inet6_int(r4, 0x29, 0xfe, &(0x7f0000000080), &(0x7f00000000c0)=0x221) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'team0\x00', {0x2, 0x4e21, @empty}}) 11:39:39 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/90}, {&(0x7f0000000000)=""/52, 0xffffffffffffff33}, {&(0x7f0000000180)=""/214}, {&(0x7f0000000280)=""/28}, {&(0x7f00000002c0)=""/190}, {&(0x7f0000000380)=""/35}, {0xfffffffffffffffe}, {&(0x7f00000003c0)=""/5}, {&(0x7f0000000400)=""/247}, {&(0x7f00000008c0)=""/4096}], 0x3a9, 0x0) 11:39:39 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:39 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xf) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:39 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) [ 1046.955864][ C0] net_ratelimit: 3 callbacks suppressed [ 1046.955875][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:39 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:40 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:40 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') accept4(r0, &(0x7f00000000c0)=@nfc_llcp, &(0x7f0000000000)=0x80, 0x80000) recvmmsg(r0, &(0x7f0000005a00), 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:40 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) [ 1047.235817][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xfff, 0x40) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000100)={0x16, 0x40, &(0x7f00000000c0)="393687bec2850e6b245b85320df815351a466bac7d3d7fadaad41704688daf27c82a31a90d6c7d690b2c02532f0d060016cb169316c971ec328328f86f350d71"}) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:40 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:40 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000080"}, 0x1c) 11:39:40 executing program 1: memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x1, 0xfffffffffffffffd) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@broadcast, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0xea) 11:39:40 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:40 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:40 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000080)='veth0_to_hsr\x00') sendmsg(r1, &(0x7f00000013c0)={&(0x7f00000000c0)=@generic={0x9, "5d518fdfb843fb6a04ed02d00c1dffce20629652e27d205cf301842ca3b5d1c0c8875fb142015ca88a37943a14d06e61fd5e502b4793ead75ac5cda56cd448b4e173c0404c0ba254412b1908efc7e02f76e232f38b486a922850eb052581c0dac717ce5b863f43a5f01ed3f7a3e02f28640a52f7cd65d1ab3a00992ab375"}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)="c51f44d235d814ce44ee7fb1d9395c3cbd91d6cc9fbccf89fa341e57b395f8c70cfc9187611aa9752d9a8463ade92e19583946eefbf811351384154c09b2b9fa1b6eb0238ded8248e55047757f714866fea1bda246b108e66e67bd228896a47511e8dcda7d697dcc80692cbba47e0d4d3eaec8b763af2c2147fe07db11f9c9dbc6c0e4b9cb14cdb680ec32b6880a56bf87a5ed571a41841a35897c1e0ba2f45e9b3d05d7ec2a8ad2d189cb34f665b8b4d8566073c68bc087c45c64a75d0721afd4363e62d08c32ffdeb525b5952eec95b998e8e14922c5cb08ab3cab9c22ecf8", 0xe0}], 0x1, &(0x7f0000000280)=[{0x80, 0x0, 0x40, "526e42b5e581b707a97153b2c0ed90222d1adfb08d075c493607ed24c67a65adcb960a7084aa9b311d9d81b26c6475161cacfefdca0d545d7e559765587adde6a3f1dc4117d7f20e98e6f4db45597ab151bbc97f02711fa4057db37d90414f5ce1c7001b857b3920034bb9d183ca"}, {0x1010, 0x11b, 0x1, "e8aea66ebb9e8b739a4e9c9cddae1ebdfe20848e41720ff198a9f80d8293fc35f993a1bdde659f05b1133a47a6ff5d7e50d62768100d0fd4b5b42f8b006721a091aa0eed3720944ae847adb4a0a6b1c99f22e8a635a0d669e3d129472ba0e387a4d3150e56754185a034adc57dbdf63fccd80ac4ae13e7becc4efd9353e5362495d825aa0bcbfeb93edbd83e9a6ca174bdc40b6c6ea118cd03b044128e0cee9be485232121eaee725861739a64612217db73c16c7b5cd86d0ce21513d8ecc64a268c49939bda58490f3846685d36a448837b19253341f4b5fe771c85bcc810e1908ad40a6ebd840349892e51adab1f3e2f3128acc1562f3da6e645eeba534eef483939835d04fab39e0f4b3dfcaf678ce41ccdfd225097528097df24fdf85793eb99a5e83b2ba02949d2efe6087aa532497da9edc7911f992120c45ed49381a563a11e9de8825675d25771d2d2b16f070ef8673175cec4095bd023873209247e4a084ea44ab3ad23a7929ae0aadacc04cea2dbf1204f3e1d4c61196690928aadc0b80ac04cb96aa745713b54ad946a515a1e5543b5adc05d547ce0b02bc4f6734646903f63d35acca55a10b7d919cc765f40eacb7f290c9d478fa0d56bf19421f690997702a9496e26a4caf75cfbb29252d1c9f42fbec750a32e76bf074dc7c59e1e28f3b6a19363f7b45d9d3cc3728235424ac19b90ea9ee3fa1636aef7e2272b54f7a3116e21c548176bf089eb71eb70fba59ef87320a7b29cda5891592dbd244a7548db08f4882ec1aeb7160b903e88c7defe62ed7c5cf2c9d46006ad7f23e5c70dea3d2473e69a3ca63f97f497cd5f3524e83b5f63d4ea43b4646ad69c58b6b46722cf00425f58f86c013550c7239ecf9790165aa546cc9f9f1c74a710c6977060ba57c055f03086a8bf66ed11db84e7211bce5b8d205b74fd3cbbcf34fbfb690c8c644af8a8a401308057dd8e96952eecc5df393c3e9ecfa13c58bca17149754f4041c0aeacd2f5541e93623060fa0054488be96715bc23371edc931f476a787cd5bf2e77062c7c6d102ba9c1848aa98b9695ce6f97133bc6ebaa2b5f560859646cac8903430056957b98d00fbd9aedc073ffeadb2da85e2b44dd4f359878b98e417851bc30e0f904378e35a2b1383e6fa989d0bdf3004b466b7f27ed20c85dd14cbce6f0c6e6211b820c26ebaf540e73cf406c611acde02b6093e6e4e00799b881ec361302e33580b014d262817584b289736753c2f6381c69f98de4b3bc43b7d3bbb783ef19bc86a79719d95943405d274b76597611f5e57c52e892747ca284099d25d16077cc47cfed2bd642f4639a815b29545378c889628a7b5bd99ee4d337788c5de3d039af4c1725c06f14246770907fddfb0eeb5ce4b01d0ff01905c1a101f591ad87f878e5b247e57a66bfbc32827f8ccb820c2c98d5221c07cb1ae8ee69f09b15f124f39f0576a1bf97f224e395b8274bd3a12c016d2cf2054e3464c31c495902d17355883f8fe2886942adbeff40a1605e57b80c8455fb40cf6131254b1d33b5a75de9832ef1a92263121f6cdda785d4c1fd57c97aee4d16034cb1843e6232a93139d0b44b05d154dbac37b1f50ddec59ebe8d120a428f87cbebcc8e9268ef8283a5ef33758acb6c7a9b4119c0381476b8ee1c8d54173cbe20512b9b4bbe5df4b3b7357c71eab5f2aaa18bc06801f9bba32c31b1a58a848df75b866a829d88ac4be4c9bfb3529ffaa83674ea911ed32983705524f328eb58e074debe30e6700e81b7aac3d1c1f993d83b208ffc8e15ec21843434b4e642e0e3724c217c7a2830cdb38c837664b8b136b8dfc728a62e3ae493614b5ba6e7eb35e73366a34465f94127bfbf639d8dec06a37cf0ac845e15260991321c5fd74c01e6176ded7746cddccb67e4b546da85ea5bf7c7f4bab447f06e4993ae8e48b17cc77fcbf6e1eb852b5678ef9989ace804c4bfb16f1a8fda075d7dae04819d4a0e6aeeb003b13dbfbea2f51c48acf3c8c53b94565e505befcdca106f5b62ab94c94ce8fe00b1fefa98d37128b33fc691cc93216c07add82bd4de17c86355cabc8b632278f67b03ddf124dd4584080bf912aae5fad1d5607fe5684ec34c97055c3d60092fa1150dede50a17ec3ecc812e993d9c2a358a5c82036633fdab643675355c44beb4ceee8db9695322608b2937447ef4a84ad0cea0f8561617fed23d579609ef58548589ff7494e078701c16fc109c57c4e5813f73e59e0c6fdd738ea7f1c7447de53d31e50d9eee447901d93d0cbd189aed7943c8da08643d06d14da69fd34a61b790d0a66be40d4f0a504ee0a4a1ab14841d2cbe275758e51c8b8ffa1c6987dcfac91c604e5de5bc3de609078cbc28eef0a4119b1677ae7a7243edc329f761df739205024db64e3f6105850fa6e9b9c5a58586c0f7ef9ceb170156cadd7d185fce3a570a64a59263ce35aaa669c2151885d441a19b7e36e7881390d7e5de387762c057e324d59bc34d17037ff77f79ca67b58bc6db02976b037b8ba280c4d9e8e9937e103939e3a5e76056e016c01dadbfae8992b9ea1bf9ace4182192cae87646d37d1a85c215c9699ecce58d0af3817628af0d6fc9b8d3a05b74f670ef5b87aa5690c12a8f61de31d60766e21257410cfb2a536942d3a32abce1bdb059de951515aa107c678cdaa1be83835f7e9b7207e6cbb43acc2f69f6f23c83c7d8074e58e9176ee6e616bc83aa78959e9959346059de436adf8f011b14330aeea32a15653672ee667d5b63c04dc8d81e21be569a28d9f670964afdceaab602d725b4afa7900bb11770df3675c3e95b8e9c2f88795d155f68e15397e46b7fb910577318c9c2930044909b7e947bdb5612793496c7bdb025ae3545f726f9abcdcbe07d797b66af23994c2b4babca0c5736a131e096c1be53ee510147fbb21ce24439381329c38b7ab797309f02b8de2acb78c4b94ba6526382d48661606efa0a45973a95968315951787b6f6a0228a0d340d19901207d894285e8d0c42674c3cc327d00c0ffb88e3bdbd64332e54f3263ca4022966e3b6a366927e8badde15198d4fd6f0f891e63f491a45a0850cee4c201f9cedd0975dfc0cf256f42f11516a5de3173f72923eece258230803f55140c8063d178fa8ff4df7cbbb61340df367ab688276e66ace45da7ee6544d1c8a5ba3823a39cdd34e32086f56fbc105be06c41679295196be63bc4e9d907dee730c75384663bddb5ea977f20b0dc1823f044d7459a829cdc0fedbfd74a6fcac0852b684a622ff0126a7133638424c0294ead54f01ff1bedcc22f981b5d07ca55886a55951bee86a6527f9ee7fb8b2928fc30903ef277aa38a77381e98d47964eef289bf61a24a224af197aff3ba722bc50bd10df60223901712cd0b03746d994863fde0d490ba998e42cdd8b71018477586f0241b48fce4fd3c667b5be8297ac4a32481d04d18a89e550902eee5fcf9035f3b7ba646436158888b6dd087cb3678347cb424233a9ce6a82eb5fc4ec4e5b20299a79c522d3ab87cb483a65c20b79152e546db8a5db11f09110ae8dc4689a05233aad19223e44235191f2bdaa63a9a5c9f1e4bd98330d929434b4fb9a5b0f961afa04eab9a30cac527d255cb5b8a5a5d250ccaf4d002c3319525fa4251b3aedf786b344db30ab23d17f26dae05355e238704d87b5d304d34034c199a3cfc5f68dd18711b807c6aa9b8956c13348ee8a23d3e9ab7e52bc839ad7d15bfcd2531b9d20739dc08fa46e33ec2fa9f857e83fcad03ee8cc4e2e40664cf53ff27897b8c9d36f3fd54461445d9fe77b9c9f67241feb5de67ef4f478010ecddbc5623850a3a5e1766d12e3db6ddbff98f088707386d550cb94d1cf580e7187a13ef17733b5b4cc1341ec380a36692e82aa3b70beea79bd00236e4dd1f0e330e533b36d11fa1bc37d31c43f1682356ab6de934d6c071cf97a12a80e04e276f135bebf8a4f73fb65dbd6cc21cbb82675353aef6f0c268edb7de549a7dc190e2348ad94ef106c6a883b05e9f479eb07b79485fdb0e5261b2a50121023dbaad6dee2eb3c33c2239002e2a111c930982a1dd9688af08d5a1237c2ff7df26e29cc3a32e967393361697e6c485a629a4362124116bd578e83e782a38de2fa1591a760546a11968594bae020a7a9104dd88199fcfa4800f20e6eff4dc68b96d0d3358b72a4b59ba7b45eedc580a79c7809fa8c0562045150eca9b0061891b1fd565d07a6bbbcd93d94663573049652fc38ceb8de7ac377b711b2fdd7ccdac054e7b1da30172193efb13c2e4cde73320439b6a1b37ce00d9f5a072094f7bbb99fa6a123ca867ed94113c1816db0383096cbcf8f7de92642c20ac64da985a526a4a707eb5183861f98a69043fe5180d163144363f54426aa1d74da133e0627ea859a99857c0d2ff2d42fc3345c8e5633756dad84795694e20dc4085dab25aea45d755d25b82478211b875f0cf175fc1a44db4f18efeb9f1d1b943e18bb6c648d7beca306475c51ab5f05472c5dd43906cb94c87250a7cff3def5e2429603ac8c5082aa1b3dbcc03e8ed39580b7558d36325a3a06cecb934fbf8bae0a5c183d3b274feb4678d7c52fee8160378085ccfff5d98606fffe93ec940dc35f01c122e6b9392e0eab57127c418a80f2d31c2e1f2df4cf3d66cf7e45a3cb0f129d31c2fb430307826725b530b1453b7d8da7db97176ba64a1442f6e25016648d163f7f903f084360be6f606a0876d6d99f85bdbf6d1dd59a858d04350a0263a0775c9f52d2464528a7b8a138a439384754f2354e7ccaf540641f5a8bf9f1194d56f49c6b15fc5ed34338d0d4560939e43467477a6c83ea9260979374479a52dce24b1dc823430e97c674caaf89761c692ea550ee788394478c351d36d17a3f974e6e0804b19273bb6d8ceb92277ef8d4e3b7dced248aa08373c8bd4d88a11b68702547eb5ffe946cf025f4c6b128fa0a42a67ad78e99622c6d363f43b3d61403c5638fe2819d49da71119529815efdf3f6bad170cf3ad32af8f358148aa089cec96ea30ef2537041e22c5b260a02a8d49344de4af53d9f0cf46b77162d5af531961f69d8fd74735cf5c12c2476b64be781bc827bc90dc121db71e7277bcb74ae966a5612972ee805a1a720e3f63630a07eea9ea39c88e808a597b64092ab59dd4f00abd4e51deecfc6e2e89b9fbb7286fd8f252326d57bdccc798b92df2c56d369d99dec21646f3c15e6b73c2ae7ee512e632c70ec76b703dbed2ee81453895a7f468fe67902191044ac27f16694ae8c25a4a18d625f26fd02026ef9563fcca3fa925c3a5271b058a7ebf9c8c4e7ae1cde6c4f9cc6af1774488f43105aef31b576b733f6b4219fa988bee19e590b0271e7fe7a4b875a1f9a824115742f63a193f7933731f3694610e7b931e6e8202131244694e5692c5a4f0d757c1aa1a80d04ecd080058ae08417e4b99b55978d9285c7630f5fb2738b634b89bdc0324a054da8b4934bb4f70c6c78edfe38b1fcbe47bac4897407665c5ed52ffcc4af0558dde241d5e1a6940b5f2e5ac86785ce28d7852aa7c3308b680312cdd538a2044888b67d1f643b7a463a4c3cd38419b605e66917990b09f70ef4c92a2bb13e8e8855bdcdc5fec7319f6ebc8d25c3115caade5ca494fca17e427d2f9f3821e27fd1f570b20fb779c1327a35d2d6c4f28013f10b320cb8be3d1410f04b60416327b49057ec3462dfd536ddf9132ecc967758605ad795ac7a58692bee95f5b30898a240eff0032bedfb058d176dd34ce32"}, {0xb0, 0x0, 0x9be, "506ba880388a1667c31e4d3fd895a65023c2d439bb25fbb67a80e9efd1ce15e240d4f3bab9167e9475590ecfc4dfc84e0b33f2f303e0c088a2552768822056fd0f288d93bcb87a66dd38bd787a83e8b2045f6c757d9fc12c08cdb1f45a0ffca9560f5c28b0fcef6eef39547b3d85dc44ef25bfeedfbda4548e8e871fcac21ac23544f4f8e549c50cf3a2029e20ca0abea0e11f76f3f07405c616"}], 0x1140}, 0x40) 11:39:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:40 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:40 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x200, 0x410000) fcntl$notify(r1, 0x402, 0x80000024) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 11:39:40 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x989680}) 11:39:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000c0"}, 0x1c) 11:39:41 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:41 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xf) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r0, 0x50, &(0x7f0000000180)}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x7, 0x0, 0x0, 0x12000000}) io_setup(0x6, &(0x7f00000000c0)) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000200)={0x5, r1, 0x10001, 0x20}) 11:39:41 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x989680}) 11:39:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1, 0x400202) recvfrom$netrom(r2, &(0x7f00000000c0)=""/4096, 0x1000, 0x12060, &(0x7f00000010c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:41 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x989680}) 11:39:41 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:41 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000140)="0adc1f1203003f3188b07066392dcfb0c86c04daa54d2d2c0c4359f3fbc28cbcca909ce91b7eaa90a7cefce4b433cb831c6a742bf0016a5b3f74ae7aed46cb6cca2c617bb936d85b955faf8835500d732063ea608c32723e7820f2496043ba48ed8849ddf8e692e755a5c064c0dd61f60ea3331868640d1d098beb0d73540dcdc15edbd4c940a10b0e32fea2bb7358f6be72fcc9") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x1, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}]}) 11:39:41 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:41 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000000), 0x0, 0xfffffffffffffffd) 11:39:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188a664b59b98090d7653460cd1fe19dfcd01614d10356b678434208e8ddcac96ae50874a90e64e5abf09c9bd8b4996a853ba602cafeec8f0d89599f80d7f099ae3e10e747fadb56100a1f9b88ccb88682aed55c3fee31abd36c0030272a418c3ba7e0248e835124182e74b15514c884bbb9c7a72ba256cfac149ab13e54c400442eb43b0b25f183c8f60233354207858c7d34661ac93ec4cbf2168f8604e14c5fd1d6014d5da782d8fdf0a49cde8666499e082c137dedd0679fc9914fcac7f") socket$inet(0xa, 0x801, 0x84) getsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000040), &(0x7f00000001c0)=0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x3, @local}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101000, 0x0) 11:39:42 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:42 executing program 2: syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:42 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:42 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:42 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x4082) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:42 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2b}}, 0x10) socket$nl_route(0x10, 0x3, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0xf) [ 1049.262875][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:42 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)='net/softnet_stat\x00'}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000280)='uid_map\x00') recvmmsg(r1, &(0x7f0000005a00)=[{{0x0, 0xfffffffffffffe95, &(0x7f0000001cc0)}}], 0x1, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 11:39:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000000000f"}, 0x1c) 11:39:42 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x47bb, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x78, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x8001, @loopback, 0x80}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e22, 0xffffffff, @dev={0xfe, 0x80, [], 0x23}, 0x3ff}]}, &(0x7f0000000180)=0x10) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000280), &(0x7f00000002c0)=0x40) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r1, 0xfffffffffffffbff}, 0x8) utime(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x1, 0x6}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r3 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000300)=0x7f, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:42 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xf) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:42 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:42 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x10000, 0x63a9e15de1408bbc) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000180)={0x0, 0x9, [{r2, 0x0, 0x10000, 0x4000}, {r3, 0x0, 0x10000, 0xfffffffff0010000}, {r1, 0x0, 0xfffffffffffff000, 0x4000}, {r2, 0x0, 0x0, 0x1000001014000}, {r1, 0x0, 0x1000}, {r3, 0x0, 0x100000000}, {r2, 0x0, 0x0, 0x1000}, {r3, 0x0, 0xfffff000, 0x2000}, {r1, 0x0, 0x14000, 0x2000}]}) 11:39:42 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$unix(r0, &(0x7f00000006c0)="853c5dc0cf77aa27e804387bc2009bf5ff8d71fa4c1842792f6136c9d383992e75238b0db7229bc75737fe4bebb3bcd06c2195f4c2b7aa316edf6a78ae939d1d15c1dd", 0x43, 0x40000, &(0x7f0000000740)=@abs={0x1, 0x0, 0x4e24}, 0x6e) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x7, &(0x7f00000005c0)=[{&(0x7f0000000180)="4cd7d77270ee712d11cbd9c2b3edc147cff6ccec5523495b1dc40d3097f4350cf911ef1fa159676f7efdf03b918a1a457d4c77cf0c84f4fdaf6dc65193d46d78f062a13ab53856167cc0b1fe8b6c8fa4a4fa64059642aedd801b4b4ea244977972c81c450d27383c34ffe95d11a3b90e0bd62d1a82b300e30efa67273943422f5674f8", 0x83, 0x9}, {&(0x7f0000000240)="63faec627f608451f4062d90b75b2d271a0767c7a0d80fc7b507feafed30c26e9b5ecc4bc52df35c9d08b1907d3031630c75e6eb7113fcd747066da6fa9b5af12bab84be254183883680235221cec645561c7502aab81ae6bd4da3fa679b47cb7c42bd1f7fc0ab5d6efe990dacea508913478d2bd4a83804f316ce282e3343e79bcaef03bdc7cbbd97d4e0f9eedd10b4012b4eabb8d7373bbdbe3e70ca53663ea94982e041cfecd4fb4e510ddf68f08c4efaadb6f79020ded202912968274e257ee2dcf4423688514114406958b1fe97fe841c8136013d675b5370f10a1ac1d84af9e560994e774e365ff0a666e610832cb59536fef5cb22ec", 0xf9, 0x27f}, {&(0x7f0000000340)="faddb720e217527c7bf74b252008c60176577480a5b3e51a31aaa03d4627ee12f9767b9a309168289e4bb1617249da52ffc4fd88d9d972a575a6782e616a7624c85836a246dcd487898ce92fc57ffcc3172dc8a0b65c5c9741f0911e11a69dea0fa0b3a9eea68a9dcb8b1702f85bd84182af8cf0edcec99612687e95a8caebb980861e670a36423f", 0x88, 0x5}, {&(0x7f0000000400)="4a1c110621a46c296ea71cd6c3a3accb810870204cb2ad90423f2e4b75ad83e4669205b94253738a0c93dc9bf6dda5f934fbafa8a5c611ba7c0279288865f827c2ab778f0e60c4b102b296697cd759b272ddc805f80954b077ba4c27dfcf08e1ed1b6d935f676dd7b858", 0x6a, 0x5}, {&(0x7f0000000100)="af7c7b4243f1f830bd8a1adbe513bf69f672cd1ac21dcd8bd392740bd71f9332911afb6ee5aa4927c90e2abb8894c933aa73e944b7769e9060db80b14acf5a", 0x3f}, {&(0x7f0000000480)="5c26a559b4739588a4ba67f7afab9a29f1edcc8808e292c06b5f4378b21995bd8aec4e9d1eb939180d658be8b07b5ff5a43a8bfc4d869d57272307afa2e88ef58059144399e1a11db0d62b9482f6ae11a4e9395c473726d8b0296f5e958e57258f7b9076e31c1abf22ce2cc18a0709ff518aa9db7616f1ef4103e552b117b0520c97b97d2c250a25322408a3e8ad99dce0e3aa36bc0f2430e82a8073434ca534a4abf08fa71e7e02a75e2bb4ff40b5c79221410eb26689188bc22feb59675bb5bfe597c0067031fb6c7437409d5a1545832198e5d84059c7efb3ab2dfa1f5bd75d36e384900b0a5b3b1569935862c9381a3a32", 0xf3}, {&(0x7f0000000580)="cdf8ea387a166645f647eb03de0065907c01d9f1c062bbe8911378759e2a109e971f1892c2eda66ce5", 0x29, 0x4}], 0x2000, &(0x7f0000000680)={[{@map_normal='map=normal'}], [{@measure='measure'}, {@dont_measure='dont_measure'}, {@appraise_type='appraise_type=imasig'}]}) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 11:39:42 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:42 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:42 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:42 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x989680}) 11:39:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000b8"}, 0x1c) 11:39:43 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:43 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x101000) connect$rose(r0, &(0x7f0000000100)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000140)={0x6, @pix_mp={0x8, 0x1, 0x3032344d, 0x4, 0x1, [{0x80000000, 0x3}, {0x8001, 0x20}, {0x3}, {0xa6d, 0x80000000}, {0xfb, 0x7}, {0x0, 0x1}, {0x7074, 0x1}, {0x3ff, 0xfffffffffffff559}], 0x8102, 0x2, 0x2, 0x2, 0x4}}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="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", 0x1000, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000001500)='keyring\x00', &(0x7f0000001540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r2, &(0x7f00000014c0)=[{&(0x7f00000012c0)="7da4e1ad7a392d3304b867d0514702cad0fa13ec0911051f74b88bc22f1ea0346443cf5d8b3b4aecc7ba69f82e7e4ccf350769d1fe0491b91d63af45e06b", 0x3e}, {&(0x7f0000001300)="8877d3618cdcbdc36d97c37c957f4493358c3daf68ff55288b0d84c8642f02d7da4e03498184acb5083194c9e4f719fac7b17cb81dd87b7f8c771d686afc1878ea8bb0a11b4bcc974f5cfce24d196b63b566b4805cd895964a6d7d96772b94cbeaf502710674854d015886a3014b462b829146c852debd2e19156431c1cd3b9488d1052d010c1519d8182c6311c79b", 0x8f}, {&(0x7f00000013c0)="c3008afca811bfdb2688f784207a1f98af1a8b4ff71f844b4f0d675802e599be4cd4d9cd2b5cfca4df9c0b3389e87f57fec0f95cb259bc9cb453dd52ba7bac0edb4912828aaaf7b0728b4b50e6e423405e6d41c48efaf4a92388169beeb4ed8e4bde284c0c6008589f023eff2f258a9641d49dac8c3cd1f6a059081689b81441c84523edf83357c4e5bc635f723f67336b138a17aa0b97940b7bfed496fabc0d573e8e6f038140ae189645a7ab166ba6be48", 0xb2}, {&(0x7f0000001480)="68c89828ca1623", 0x7}], 0x4, r3) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r4 = socket$inet(0xa, 0x801, 0x84) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:43 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x0, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:43 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x989680}) 11:39:43 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x280, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x20000001}) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000100), &(0x7f0000000180)=0x4) 11:39:43 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x0, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:43 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x989680}) 11:39:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x804, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:43 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) fcntl$addseals(r1, 0x409, 0xc) pread64(r0, &(0x7f0000000180)=""/133, 0x85, 0x0) 11:39:43 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x0, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:44 executing program 0: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x989680}) 11:39:44 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:44 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc17123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r2 = dup(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x0, 0x53, 0x61, &(0x7f00000000c0)="52513d7cd1299653a8b99ab9d742e25946aa443b082a6fd12bb7e3816e73e1c30992abfaea0e625951d0efa964a8b777a0ee85020fbf54c4b04a46e74305bb71d06fdbc579c8331b88c8934837c3515293a102", &(0x7f0000000140)=""/97, 0x7}, 0x28) 11:39:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:44 executing program 5: syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/96, 0x70}, {&(0x7f0000000180)=""/166}], 0x2a4, 0x0) 11:39:44 executing program 0: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x989680}) 11:39:44 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:39:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f00000000c0), 0x4) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:44 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) [ 1051.381723][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00p'}, 0x1c) 11:39:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000000)={0x2, 0x101, 0x0, 0x6, 0x4, 0x100000001}) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) preadv(r0, &(0x7f0000000000), 0x10000000000000b0, 0x10000) 11:39:44 executing program 0: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x989680}) 11:39:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x4, 0xb9b9, 0x401}) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000000c0)={'tunl0\x00', {0x2, 0x4e22, @multicast1}}) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:44 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:44 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x2, 0x2) accept$nfc_llcp(r1, &(0x7f00000002c0), &(0x7f0000000340)=0x60) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket$inet(0xa, 0x1, 0xffffffffffff7ffc) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000180)="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") r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x200, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000000c0)="4443307f4579a7620b6516c1cc1709a3b14edcb9f84720ac9e63a2f11e4e27c3304d16766c3f251e50d50bb43c8f4fd215426879bd91881829c2f982b4f61a3d612be8e787ea4ebf0e7f3c8585afd9b4e9cdcbf746948fcd701d71e26513b43b34a1c6c0c50f4e3f23278c65777a6ad5b983b6085d1b3b23658c4bf60d990706456e78819ba19f512a9fa843b2e1e7dddda18ac187fccc6ed4a9008f241280fccb23375a75ea577d", 0xa8) 11:39:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="d1f3c47165b67d061ecd2381", 0xc) 11:39:44 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:45 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:39:45 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008910, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x6, 0x6) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:45 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:45 executing program 5: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x0, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:45 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x1, 0x100) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x800}}, 0x0, 0x2, 0x0, "a6b62aa3d5ec5ff759935db5345677eda0eeceed9946fe3f13b521547a8ba2da13af7c1dac21a6ab063fd17607ff85417e32dfa1844672366ac011f4a9ac0ef07e2c5a597edcbb0b6df295b2d328e5cb"}, 0xd8) 11:39:45 executing program 5: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:45 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) [ 1052.460097][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:45 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) [ 1052.626647][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:46 executing program 1: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:39:46 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x0, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:46 executing program 5: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b000000000d449b3654d13809d0b0e4b3e5654c0fc651a02c0c9e36ec2d031f4dca5dfe025f0f6f2fb85ca54ed504db5e11374709c49268e3c18cfc6ac9fa5a5c2e8325f88361c8bcbe55421f9c302f9c18a7ceae495f082a8fe0a877482c9aea81611f7306dcc905b81685e8fd47975477a3d3cef8f32e2658a9725d26f9e8d") openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000180)=0xffffffffffffffff) connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x10000000000, @loopback}, 0xfffffffffffffe38) recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)=""/229, 0xe5}, {&(0x7f00000002c0)=""/65, 0x41}, {&(0x7f0000000340)=""/4, 0x4}, {&(0x7f0000000380)=""/99, 0x63}, {&(0x7f0000000400)=""/107, 0x6b}, {&(0x7f0000000480)=""/127, 0x7f}], 0x6, &(0x7f0000000580)=""/213, 0xd5}, 0x3}], 0x1, 0x1, &(0x7f00000006c0)={0x0, 0x1c9c380}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000140)=0x14) 11:39:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:46 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:46 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x0, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) [ 1053.278222][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:46 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{}], 0x1, &(0x7f0000000280)={0x0, 0x989680}) 11:39:46 executing program 5: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:46 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x0, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:46 executing program 5: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) [ 1053.439445][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:46 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x0, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:46 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x0, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:47 executing program 5: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0xef, 0xfffffffffffff78c, 0x94, 'queue0\x00', 0x5}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x604000, 0x0) write$selinux_attr(r2, &(0x7f00000000c0)='system_u:object_r:fonts_cache_t:s0\x00', 0x23) 11:39:47 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:47 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x0, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:47 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) [ 1054.183034][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:47 executing program 5: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x2, 0x202) symlinkat(&(0x7f0000000080)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00') connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:47 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) [ 1054.366177][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:47 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:47 executing program 5: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000200)="0647ff48bdb770d64f860fa27fae5029e9a309cbcb0cea09aeee190d6502514ae7cd0b2f6a63f62b0c21518d2edb5582c99d503decede8970f2c96d0023f1da63a7dd840a252d5abe64005159781714ae855ca01ed230f6128a5740b3639ca1f14a0b71124379a45b71f4f6953efc9096c93b78900d21a9335218cd9e78f60949786b24f4e437485e0b38d0dbb3f2f89a64a1acd95121291543047084a5b37365a4617a12e92ae8592127266ce222fd70c2d365a4f30bdb77cafc16fa4d423542dd94f159fc2fd5cd7d3209a0aa54b4ef55bd228f499d2f7963e22c11b70cf35196a1e43bce203395aa3d3aefef3ea155201a3473c937ab22eda893708", 0xfd) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:47 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:39:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = socket(0x3, 0x5, 0x6) recvfrom$netrom(r2, &(0x7f0000000080)=""/23, 0x17, 0x2000, &(0x7f00000000c0)={{0x3, @default}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default]}, 0x48) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:47 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:39:47 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) [ 1054.551783][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:47 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:47 executing program 5: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000200)="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", 0xfd) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) [ 1054.790912][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:47 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) [ 1054.983551][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x500, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffff9c, 0xc058565d, &(0x7f00000000c0)={0x1ff, 0x0, 0x4, 0x200000, {0x77359400}, {0x5, 0xd, 0x5, 0xff, 0x47b, 0xfffffffffffffffa, "089f0b27"}, 0x6, 0x2, @fd=0xffffffffffffffff, 0x4}) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000140)={0x4, 0xa2d6762840a8f0d8, 0x4, 0x80000000, {0x77359400}, {0x3, 0x0, 0x4, 0x400, 0x7, 0xffffffffffff14ac, "d4a97dba"}, 0x3, 0x3, @fd=r3, 0x4}) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) 11:39:48 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:39:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 1055.421752][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:48 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:39:48 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xf) r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0x10, 0x0, 0x7}, 0x10) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x1010180}, 0xc) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r3, r4, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000240)=""/153) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:48 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) kexec_load(0x20, 0x6, &(0x7f0000000500)=[{&(0x7f00000000c0)="161e7859f0d1f7c55fbb7212efa27b39457f0f9d14e038e3fb6e7c2160e7b053e16ed72545d2f5efa477ae8273bf32f51686e427edecb9cb17cb2f07ee3f9db810b988f53e3037e967d935d16de1df88fff3c8217b541ce2d84d912003d44760b07838283dca19771c58db32a4c126ae1e2194e68fc40564298f60597cdd8799da9e22656e05644915f0d94cdce40ca859cee1780f4396b49f88e12b758b02e8ad0e5486b8cd03c45c718c58493e242669fd71e18de88fe708b1f6230f01a06fa2ba836de7ea39fb0537366547771ac81b84fe927a21447c122243473f685d19eac7e5b261bbcd8253", 0xe9, 0xa1a, 0x8}, {&(0x7f00000001c0)="e045813655bbfba4a486ac63b74878def1baa962c3b28a1017854c1b3eff865b", 0x20, 0xe20e, 0x1}, {&(0x7f0000000200)="5a79d6bb0240470dba9753cc34b936da4d0ddf4af98b81e52bd93f1d87872a4266642abb328ce8480042bb222f1cb01400c079143d3f26d4b7bf0af2c41e5064a4dd1e49fe50ae0700b79271991a283a730a6ac5bffe2482d2b0ad8c38b3444bed4720a0f850f1e11a5ea5eae11c85ca8f87cca03f19ceda8a373e0d9a7e3c86f52ec5f31fd6809e5fac666846398dc7a935728a49fe1a50ccda133d0d63f94e3cfe90f6974a5838b5e55324ec93313f679c3b8641181c477b15", 0xba, 0x3, 0xf0c3}, {&(0x7f00000002c0)="749d20912cfe048d41b0988e1c3e6ba897f16bc180aa1f822d01674724348e8f6282ee4dc538b00bfcc4944b2f62ba1aaa3cd5622c7716b92f4d09c4b7b8595cb31b815bc0a56ee90ad656477b598fb551804c7a861833535d", 0x59, 0x0, 0xfffffffffffffff8}, {&(0x7f0000000340)="3d25c84ddb1ab9195127321760347c20eea7d95f7bec272ce2a10efc3f1990d8ff89489f4c9b6b5f385f5be1266996dfec1e2a1881184732bd5778e83692b326a0fd17041350a7e68f8e992a172ee0204cbdb3f7600271adfbad62892b062e16d35869cd7b561422aac7fe10259e918303a63ec68d4ebcedc040ffebfca8249d28ffb3668ef1501328dfd1908476895a9896887c8c14d21efd28efd4e446", 0x9e, 0x100, 0x4}, {&(0x7f0000000400)="0783f2a74af901c8e9b23cf0d75a63911195634c4f693a078adef88b5726d4fd321d065c35b072ab1134fbf992a67d83362f3b67dd4dbc92cc51915104201572467a0134bd7b72f03cda247959e757f91773f4cf5a69391498df4aa6547618ac52c7adee16171b1683f73edd6ba4613fb7637c727ca74a36f952289a7afc3d9a19ebeadae69359021f5b4edbb26cf2f6aeae5b23cdb93a2b09627ba4c918e930b706be1add68066241c045dc902f90d1544d474b91344c7d2d0c9e429882b36c6d7cef257f7b7736871779a7c329aa7f9182beb8b9bd77b1", 0xd8, 0x0, 0xfffffffffffffff9}], 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f0000000080)={@rand_addr=0x400, @multicast1, @rand_addr=0x800000000000}, 0xc) connect$inet(r1, &(0x7f0000000640)={0x2, 0x0, @local}, 0xffffffffffffffb4) r2 = semget$private(0x0, 0x7, 0x140) semctl$IPC_INFO(r2, 0x4, 0x3, &(0x7f00000005c0)=""/126) 11:39:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000080)={0x1, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}}, 0x108) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000097"}, 0x1c) 11:39:48 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:48 executing program 5: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:48 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:49 executing program 2: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:39:49 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) 11:39:49 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:39:49 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x80000001, 0x40000) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f00000007c0)={0x1, 0x0, 0x2080, {0x110000, 0x1, 0x2}, [], "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", "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"}) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) write$binfmt_elf32(r3, &(0x7f0000002840)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0x7, 0x400, 0xb0, 0x100000001, 0x3, 0x3e, 0xe9f0, 0x214, 0x38, 0x26f, 0x400, 0x3, 0x20, 0x2, 0x8001, 0x7f, 0x1}, [{0x60000006, 0x20, 0x9, 0xfffffffffffffc01, 0x1, 0x7, 0x7, 0x7}], "301f5dcd0d99791ec5a87740501221d81b579ef27900e60828d4283d9bcdacae667ec82f929c2bfc18a60c5b52eb6b8fe4623bb4d3a197f6a2a77bb68611d6327c09c9adbb55eb76c8f476807213a5773889311e81447b764afec58b40a581a442d0ca5327f2693e546491f519961eabd081203436f65809027e90a347be149d964cde4e4b87", [[], [], [], [], [], [], [], []]}, 0x8de) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80000001, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x347d, 0x1) 11:39:49 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) 11:39:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x6, 0x7}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={r2, 0xffffffffffffff58, 0x3}, &(0x7f0000000200)=0x8) r3 = socket$inet(0xa, 0x801, 0x84) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:49 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) 11:39:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0xb, 0x87) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x100}, &(0x7f00000000c0)=0x8) socket$unix(0x1, 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000100)={r2, 0xcf, "8e6d55a55b85dfccd81f7f588f7a294d5c118b341094996f784b06448ded6d4b4fe30edd014c2fdb4f6ac58930e9fc4c27133a4e7440ee45500cc788d1886cc3606c3ec7e0643224fd959bfa6a95113ec9f676307430098a78b68c8aa840ecc7cd810d030e5627338af365dec6409b1b56a1844dcf84ddb48176440e8b7f96afe03998359d4a239972344dd610d513bda9f53bb7f5a3f5a6252dcb15541b0069459e6bb6ce0426f145b83dfdeffcb18d3c39b66bca834a7415a5778a004f6d307e37ca27ddec737219b44c7c39e503"}, &(0x7f0000000200)=0xd7) 11:39:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:49 executing program 5: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r0, r1, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:49 executing program 5: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r0, r1, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:49 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) 11:39:50 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) 11:39:50 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) prctl$PR_GET_DUMPABLE(0x3) getsockopt$bt_hci(r0, 0x0, 0x2003, &(0x7f00000001c0)=""/226, &(0x7f0000000080)=0xe2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x40400, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="68000000c35afbf02714152183ed18f7b9526e0e72693290a1cf2bbe3ca858ccc3eb26af3550928ee33722f42786c3d25a8edf107af3560577e300c630a4e68ea63ea7c0407c26bbebe044fd35db2ba59ff9da3274abad78df9a8bf5cc8fea790bc29b73a6d256e4d8000000"], &(0x7f0000000180)=0x70) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={r3, @in6={{0xa, 0x4e20, 0x6, @loopback, 0xfff}}, [0x4a60, 0x1ff, 0x4, 0x20, 0x9, 0x38000000000000, 0x7, 0xffffffff80000000, 0x1, 0x3, 0x3, 0x1800, 0xdd9d, 0x7, 0x80000001]}, &(0x7f00000003c0)=0x100) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r4 = socket$inet(0xa, 0x801, 0x87) setsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000400)=@assoc_value={r3}, 0x8) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:50 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000200)) getpgrp(0x0) getpgid(0xffffffffffffffff) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x5}, 0x10) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:50 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) 11:39:50 executing program 5: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r0, r1, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:50 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) epoll_create1(0x80000) getpgrp(0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r4) getpgid(0xffffffffffffffff) gettid() r5 = semget(0x2, 0x0, 0x101) semtimedop(r5, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, &(0x7f0000000280)={0x0, 0x989680}) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="31ff000000000000000000") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) getgroups(0x3, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00, 0xffffffffffffffff]) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000bc0)=@broute={'broute\x00', 0x20, 0x6, 0x7f0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f0000000080), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{{{0x3, 0x40, 0x8917, 'bcsh0\x00', 'veth1_to_team\x00', 'veth1_to_hsr\x00', 'hsr0\x00', @dev={[], 0x1d}, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0x0, 0xff], 0xe0, 0xe0, 0x130, [@realm={'realm\x00', 0x10, {{0x4, 0x5, 0x1}}}, @mac={'mac\x00', 0x10, {{@link_local, 0x1}}}]}}, @common=@log={'log\x00', 0x28, {{0x2, "8d911fe147124bc0b4a1ccfcf8e62bcefe09efcd4b3e13aeedb4c10b6d44", 0x8}}}}, {{{0x11, 0x10, 0xedff, 'caif0\x00', 'veth0_to_bridge\x00', 'syz_tun\x00', 'veth1\x00', @remote, [0xff, 0x0, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x138, 0x168}, [@common=@nflog={'nflog\x00', 0x50, {{0xa1, 0x4, 0x6, 0x0, 0x0, "80af2e06abaf2a4223a9a3a55a646205f4429205e896a2016bdbbf6d3347c64c54608e5c920e85ad7c41e695057103bcb88e54c9c2d20e6b9aa72d3958eaedd8"}}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x7f, 0x6}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x5, 0x12, 0x9b2f, 'syzkaller0\x00', 'netdevsim0\x00', 'bridge0\x00', 'veth1_to_bond\x00', @empty, [0x0, 0xff, 0xff, 0x0, 0xff], @dev={[], 0x23}, [0x0, 0xff, 0x0, 0xff], 0xa0, 0xa0, 0xd0, [@cpu={'cpu\x00', 0x8, {{0x2}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x5, 0x8, 0x88ca, 'ip6tnl0\x00', 'bcsh0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @remote, [0x921ad914b2dea065, 0x0, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0x70, 0xa0, 0xd8}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x5}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@empty, 0x10}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffc}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x1a, 0x60ff, 'ipddp0\x00', 'vxcan1\x00', 'ifb0\x00', 'erspan0\x00', @local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0x130, 0x178, 0x1a8, [@helper={'helper\x00', 0x28, {{0x1, 'amanda\x00'}}}, @stp={'stp\x00', 0x48, {{0x8, {0xfffffffffffff7c1, 0x3, 0x7, @local, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], 0x3, 0x40a, 0xf43c, 0x5, @link_local, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0x4e22, 0x4e20, 0x7, 0x1ff, 0x2, 0xa2, 0x7, 0x101, 0x6, 0x10001}, 0x10, 0x4}}}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9a2a, 0x8001}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x9}}}}, {{{0x11, 0x4b, 0xedff, 'bond_slave_0\x00', 'sit0\x00', 'syzkaller0\x00', 'ip6tnl0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0xff], @random="a10d43c6eced", [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0xe0, 0x110, 0x148, [@owner={'owner\x00', 0x18, {{r2, r3, r4, r5, 0x4, 0x2}}}, @m802_3={'802_3\x00', 0x8, {{0x4e, 0x6, 0x7, 0x2}}}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffc}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}}]}]}, 0x868) 11:39:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0xc0104307, &(0x7f0000000000)=0x7ffffffc) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r3}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) r5 = memfd_create(0x0, 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2ad83b", 0x36f}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r5) sendfile(r2, r4, 0x0, 0x2000006) r6 = socket$inet(0x2, 0x3, 0x3f) getpgid(0xffffffffffffffff) gettid() r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x5, 0x1ff, 0x7, 0x9, 0x8, r2}, 0x2c) r8 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x100000001, 0x0, r7}, 0x2c) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000340)={0x4, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r8, @ANYBLOB="00ffffffff000000000000020000df00000000800000"], &(0x7f0000000140)='GPL\x00', 0x4, 0xfe5b, &(0x7f0000000240)=""/221}, 0x48) r9 = socket$xdp(0x2c, 0x3, 0x0) bind(r9, &(0x7f0000000240)=@l2, 0x80) syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x0, 0xd0d7993bd6bb34a7) ioctl$KVM_SET_NESTED_STATE(r6, 0x4080aebf, &(0x7f00000007c0)={0x0, 0x0, 0x2080, {0x100000, 0x116002, 0x2}, [], "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", "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"}) getpgid(0xffffffffffffffff) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000200)={0x101, 0x401}) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f00000002c0)=@netrom={'nr', 0x0}, 0x10) syz_read_part_table(0x1f, 0x1, &(0x7f0000000780)=[{0x0}]) [ 1057.662194][ C1] net_ratelimit: 4 callbacks suppressed [ 1057.662205][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0xc0104307, &(0x7f0000000000)=0x7ffffffc) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r3}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) r5 = memfd_create(0x0, 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2ad83b", 0x36f}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r5) sendfile(r2, r4, 0x0, 0x2000006) r6 = socket$inet(0x2, 0x3, 0x3f) getpgid(0xffffffffffffffff) gettid() r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x5, 0x1ff, 0x7, 0x9, 0x8, r2}, 0x2c) r8 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x100000001, 0x0, r7}, 0x2c) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000340)={0x4, 0x6}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r8, @ANYBLOB="00ffffffff000000000000020000df00000000800000"], &(0x7f0000000140)='GPL\x00', 0x4, 0xfe5b, &(0x7f0000000240)=""/221}, 0x48) r9 = socket$xdp(0x2c, 0x3, 0x0) bind(r9, &(0x7f0000000240)=@l2, 0x80) syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x0, 0xd0d7993bd6bb34a7) ioctl$KVM_SET_NESTED_STATE(r6, 0x4080aebf, &(0x7f00000007c0)={0x0, 0x0, 0x2080, {0x100000, 0x116002, 0x2}, [], "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", "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"}) getpgid(0xffffffffffffffff) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000200)={0x101, 0x401}) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r2, 0x101, 0x19, &(0x7f00000002c0)=@netrom={'nr', 0x0}, 0x10) syz_read_part_table(0x1f, 0x1, &(0x7f0000000780)=[{0x0}]) [ 1057.746711][ T7571] kernel msg: ebtables bug: please report to author: bad policy 11:39:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:50 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x17, &(0x7f0000000000)=0x2, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSBRK(r3, 0x5427) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r4, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000240)={0xffffffffffffffff}, 0x3, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e20, 0xfffffffffffffffa, @mcast2, 0x401}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000200), r6}}, 0x18) [ 1057.821443][ T7621] kernel msg: ebtables bug: please report to author: bad policy 11:39:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f00000000c0)=0x6) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) [ 1057.938477][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:50 executing program 5: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x7fffffffffffffff) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:50 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x17, &(0x7f0000000000)=0x2, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSBRK(r3, 0x5427) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r4, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000240)={0xffffffffffffffff}, 0x3, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e20, 0xfffffffffffffffa, @mcast2, 0x401}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000200), r6}}, 0x18) 11:39:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e21, @remote}, 0xffffffb3) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x10000, 0x0) 11:39:51 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet(0x2, 0x2, 0x0) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect(r2, &(0x7f0000000000)=@nl=@unspec, 0x80) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r6) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r6) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:51 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet(0x2, 0x2, 0x0) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect(r2, &(0x7f0000000000)=@nl=@unspec, 0x80) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r6) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r6) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000280)) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1058.149726][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:51 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x17, &(0x7f0000000000)=0x2, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSBRK(r3, 0x5427) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r2, r4, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000240)={0xffffffffffffffff}, 0x3, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e20, 0xfffffffffffffffa, @mcast2, 0x401}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000200), r6}}, 0x18) 11:39:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/sockcreate\x00') setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0)={0x8}, 0x4) r2 = socket$inet(0xa, 0x100000000801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:51 executing program 5: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x7fffffffffffffff) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) [ 1058.379034][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:51 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet(0x2, 0x2, 0x0) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect(r2, &(0x7f0000000000)=@nl=@unspec, 0x80) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r6) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r6) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x10000004000) r3 = memfd_create(0x0, 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b", 0x3}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) sendfile(r1, r2, 0x0, 0x2000006) getpgid(0xffffffffffffffff) gettid() ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000000)) getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) accept4$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', r4}) syz_read_part_table(0x1f, 0x1, &(0x7f0000000780)=[{0x0}]) 11:39:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x200) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x7, 0x6}) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_TSC(0x19, &(0x7f0000000180)) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000080)={0x0, 0x6, 0x6, 0x0, 0x0, [{r0}, {r0, 0x0, 0x3f}, {r0, 0x0, 0x5}, {r0, 0x0, 0x3}, {r0, 0x0, 0x2}, {r0, 0x0, 0x1}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:51 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000010) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:51 executing program 1: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000010) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) [ 1058.608688][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:51 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet(0x2, 0x2, 0x0) connect$inet(r5, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect(r2, &(0x7f0000000000)=@nl=@unspec, 0x80) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r6) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r6) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:39:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:51 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0xcb02) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x200, 0xff}, &(0x7f0000000180)=0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000200)=0x7) r4 = socket$inet(0xa, 0x801, 0x84) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:51 executing program 5 (fault-call:0 fault-nth:0): semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:39:51 executing program 1 (fault-call:2 fault-nth:0): syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) [ 1058.848038][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:51 executing program 0 (fault-call:1 fault-nth:0): memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:39:51 executing program 2: open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947d", 0x7}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x2000010) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000540)) getpgrp(0x0) getpgid(0xffffffffffffffff) gettid() getpgid(0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0xfffffffffffffff9) keyctl$read(0xb, 0x0, 0x0, 0x0) syz_read_part_table(0x1f, 0x2, &(0x7f0000000780)=[{&(0x7f00000003c0)="3c7c259365184cca1ca1529736940edd8efac492148830d23657eedf416e2b46dbed61d9b16c18afb58d3fdbddf634fc7fd4d8ac4a9274fafe3e7443be85db1bcd9badf72de2943570b36c03318ad49fa15936db7b2c301eddd5a3bf779ed4e5cdd2e0a4898978019f668847d437411c33243d2c63856744f47c0478e60c7f2e96ea016adcd75db2bdc58e5c0eed637930ce", 0x92, 0x2000000000007}, {0x0, 0x0, 0x4}]) 11:39:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:51 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:39:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000080)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast1, 0x4e21, 0x5, 0x4e21, 0x2, 0xa, 0xa0, 0x20, 0x3f, r1, r2}, {0x1f, 0x7, 0x0, 0x1, 0x2, 0x6, 0xff, 0xffffffff}, {0x5, 0x10000, 0x7, 0x6e}, 0x4, 0x6e6bbc, 0x0, 0x0, 0x2, 0x3}, {{@in=@broadcast, 0x4d2, 0xff}, 0xa, @in6=@remote, 0x0, 0x2, 0x3, 0x3, 0x0, 0x40, 0xfffffffffffffffe}}, 0xe8) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:51 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) [ 1059.063399][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:52 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x2, 0x3ff}, {}], 0x2, 0x0) 11:39:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) 11:39:52 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:52 executing program 2 (fault-call:2 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:52 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x3f00, 0x3ff}, {}], 0x2, 0x0) [ 1059.342190][ T7723] FAULT_INJECTION: forcing a failure. [ 1059.342190][ T7723] name failslab, interval 1, probability 0, space 0, times 0 [ 1059.368979][ T7723] CPU: 0 PID: 7723 Comm: syz-executor.2 Not tainted 5.0.0-rc7-next-20190225 #42 [ 1059.378053][ T7723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1059.388116][ T7723] Call Trace: [ 1059.391424][ T7723] dump_stack+0x172/0x1f0 [ 1059.395775][ T7723] should_fail.cold+0xa/0x15 [ 1059.400382][ T7723] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1059.406204][ T7723] ? ___might_sleep+0x163/0x280 [ 1059.411082][ T7723] __should_failslab+0x121/0x190 [ 1059.416130][ T7723] should_failslab+0x9/0x14 [ 1059.420645][ T7723] __kmalloc+0x2dc/0x740 [ 1059.424895][ T7723] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1059.431135][ T7723] ? _kstrtoull+0x14c/0x200 [ 1059.431151][ T7723] ? _parse_integer+0x190/0x190 [ 1059.431167][ T7723] ? rw_copy_check_uvector+0x28c/0x330 [ 1059.431190][ T7723] rw_copy_check_uvector+0x28c/0x330 [ 1059.440545][ T7723] ? mark_held_locks+0xf0/0xf0 [ 1059.440563][ T7723] ? debug_smp_processor_id+0x3c/0x280 [ 1059.440589][ T7723] import_iovec+0xbf/0x200 [ 1059.466091][ T7723] ? dup_iter+0x260/0x260 [ 1059.470430][ T7723] ? __fget+0x35a/0x550 [ 1059.474595][ T7723] vfs_readv+0xc6/0x160 [ 1059.478751][ T7723] ? lock_downgrade+0x880/0x880 [ 1059.483608][ T7723] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 1059.489680][ T7723] ? kasan_check_read+0x11/0x20 [ 1059.494534][ T7723] ? __fget+0x381/0x550 [ 1059.498708][ T7723] ? ksys_dup3+0x3e0/0x3e0 [ 1059.503146][ T7723] ? wait_for_completion+0x440/0x440 [ 1059.508875][ T7723] ? __fget_light+0x1a9/0x230 [ 1059.513563][ T7723] do_preadv+0x1c4/0x280 [ 1059.517810][ T7723] ? do_readv+0x290/0x290 [ 1059.522146][ T7723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1059.527608][ T7723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1059.533066][ T7723] ? do_syscall_64+0x26/0x610 [ 1059.537742][ T7723] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1059.543839][ T7723] ? do_syscall_64+0x26/0x610 [ 1059.548528][ T7723] __x64_sys_preadv+0x9a/0xf0 [ 1059.553224][ T7723] do_syscall_64+0x103/0x610 [ 1059.557827][ T7723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1059.563716][ T7723] RIP: 0033:0x457e29 [ 1059.567611][ T7723] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1059.587226][ T7723] RSP: 002b:00007f31c64dbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1059.595635][ T7723] RAX: ffffffffffffffda RBX: 00007f31c64dbc90 RCX: 0000000000457e29 [ 1059.603607][ T7723] RDX: 00000000000001fe RSI: 00000000200017c0 RDI: 0000000000000003 [ 1059.611575][ T7723] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1059.619544][ T7723] R10: 0000000000000063 R11: 0000000000000246 R12: 00007f31c64dc6d4 [ 1059.627516][ T7723] R13: 00000000004c4933 R14: 00000000004d8210 R15: 0000000000000004 [ 1059.836639][ T7702] FAULT_INJECTION: forcing a failure. [ 1059.836639][ T7702] name failslab, interval 1, probability 0, space 0, times 0 [ 1059.856988][ T7702] CPU: 1 PID: 7702 Comm: syz-executor.0 Not tainted 5.0.0-rc7-next-20190225 #42 [ 1059.866022][ T7702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1059.876066][ T7702] Call Trace: [ 1059.879368][ T7702] dump_stack+0x172/0x1f0 [ 1059.883787][ T7702] should_fail.cold+0xa/0x15 [ 1059.888388][ T7702] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1059.894203][ T7702] ? ___might_sleep+0x163/0x280 [ 1059.899057][ T7702] __should_failslab+0x121/0x190 [ 1059.903992][ T7702] should_failslab+0x9/0x14 [ 1059.908493][ T7702] kmem_cache_alloc+0x2b2/0x6f0 [ 1059.913344][ T7702] ? kasan_check_write+0x14/0x20 [ 1059.918286][ T7702] taskstats_exit+0x6c8/0xcf0 [ 1059.922963][ T7702] ? taskstats_user_cmd+0xce0/0xce0 [ 1059.928161][ T7702] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1059.933374][ T7702] ? acct_collect+0x699/0x860 [ 1059.938052][ T7702] do_exit+0x3d4/0x2fa0 [ 1059.942215][ T7702] ? get_signal+0x331/0x1d50 [ 1059.946802][ T7702] ? find_held_lock+0x35/0x130 [ 1059.951565][ T7702] ? mm_update_next_owner+0x640/0x640 [ 1059.956935][ T7702] ? kasan_check_write+0x14/0x20 [ 1059.961871][ T7702] ? _raw_spin_unlock_irq+0x28/0x90 [ 1059.967072][ T7702] ? get_signal+0x331/0x1d50 [ 1059.971693][ T7702] ? _raw_spin_unlock_irq+0x28/0x90 [ 1059.976891][ T7702] do_group_exit+0x135/0x370 [ 1059.981483][ T7702] get_signal+0x399/0x1d50 [ 1059.985900][ T7702] ? lock_downgrade+0x880/0x880 [ 1059.990760][ T7702] do_signal+0x87/0x1940 [ 1059.995001][ T7702] ? wait_for_completion+0x440/0x440 [ 1060.000288][ T7702] ? setup_sigcontext+0x7d0/0x7d0 [ 1060.005312][ T7702] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1060.011555][ T7702] ? ksys_semtimedop+0x11a/0x130 [ 1060.016490][ T7702] ? exit_to_usermode_loop+0x43/0x2c0 [ 1060.021854][ T7702] ? do_syscall_64+0x52d/0x610 [ 1060.026614][ T7702] ? exit_to_usermode_loop+0x43/0x2c0 [ 1060.031986][ T7702] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1060.037267][ T7702] ? trace_hardirqs_on+0x67/0x230 [ 1060.042295][ T7702] exit_to_usermode_loop+0x244/0x2c0 [ 1060.047672][ T7702] do_syscall_64+0x52d/0x610 [ 1060.052272][ T7702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1060.058157][ T7702] RIP: 0033:0x457e29 [ 1060.062057][ T7702] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1060.082013][ T7702] RSP: 002b:00007f5ea5b7cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000dc [ 1060.090425][ T7702] RAX: fffffffffffffffc RBX: 00007f5ea5b7cc90 RCX: 0000000000457e29 [ 1060.098397][ T7702] RDX: 0000000000000002 RSI: 0000000020000240 RDI: 0000000000000000 [ 1060.106363][ T7702] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1060.114328][ T7702] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5ea5b7d6d4 [ 1060.122297][ T7702] R13: 00000000004c4dc3 R14: 00000000004d8ae0 R15: 0000000000000003 11:39:53 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:39:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x2938}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={r2, 0x6}, &(0x7f0000000180)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r3 = socket$inet(0xa, 0x801, 0x84) mq_timedsend(r1, &(0x7f00000001c0)="d101cd638734addf341547284fdd91e9abfad81f349cc3f7068f105e331d7e37eb64023fa246e0aedc1555171e59aa6d5222c25ad83ab35b6b7dffd84e575b9f343c369dd380d30aa4cbfa724aa032c9c9523ec871ddaac2979ae9af5a2a5a4de1ccb417a284be2fbdfb8396305a8d77f3c10eb87bf57a64bcf6329d927f5585ad29745ae3f5340c3551fddb53ce", 0x8e, 0x8001, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:53 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x2000000, 0x3ff}, {}], 0x2, 0x0) 11:39:53 executing program 2 (fault-call:2 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:53 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x7, 0x3ff}, {}], 0x2, 0x0) 11:39:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) 11:39:53 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x3f000000, 0x3ff}, {}], 0x2, 0x0) [ 1060.252220][ T7735] FAULT_INJECTION: forcing a failure. [ 1060.252220][ T7735] name failslab, interval 1, probability 0, space 0, times 0 [ 1060.306698][ T7735] CPU: 1 PID: 7735 Comm: syz-executor.2 Not tainted 5.0.0-rc7-next-20190225 #42 [ 1060.315853][ T7735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1060.325998][ T7735] Call Trace: [ 1060.329300][ T7735] dump_stack+0x172/0x1f0 [ 1060.333647][ T7735] should_fail.cold+0xa/0x15 [ 1060.338638][ T7735] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1060.344455][ T7735] ? ___might_sleep+0x163/0x280 [ 1060.349312][ T7735] __should_failslab+0x121/0x190 [ 1060.354349][ T7735] should_failslab+0x9/0x14 [ 1060.358858][ T7735] kmem_cache_alloc_node_trace+0x270/0x720 [ 1060.364674][ T7735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1060.370928][ T7735] __kmalloc_node+0x3d/0x70 [ 1060.375436][ T7735] kvmalloc_node+0x68/0x100 [ 1060.379944][ T7735] traverse+0x401/0x760 [ 1060.384107][ T7735] ? seq_dentry+0x2d0/0x2d0 [ 1060.388611][ T7735] seq_read+0x8f8/0x1130 [ 1060.392867][ T7735] ? seq_dentry+0x2d0/0x2d0 [ 1060.397375][ T7735] proc_reg_read+0x1fe/0x2c0 [ 1060.401967][ T7735] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 1060.407431][ T7735] ? rw_verify_area+0x118/0x360 [ 1060.412291][ T7735] do_iter_read+0x4a9/0x660 [ 1060.416794][ T7735] ? dup_iter+0x260/0x260 [ 1060.421220][ T7735] vfs_readv+0xf0/0x160 [ 1060.425377][ T7735] ? lock_downgrade+0x880/0x880 [ 1060.430240][ T7735] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 1060.436306][ T7735] ? kasan_check_read+0x11/0x20 [ 1060.441181][ T7735] ? ksys_dup3+0x3e0/0x3e0 [ 1060.445608][ T7735] ? wait_for_completion+0x440/0x440 [ 1060.450904][ T7735] ? __fget_light+0x1a9/0x230 [ 1060.455590][ T7735] do_preadv+0x1c4/0x280 [ 1060.459842][ T7735] ? do_readv+0x290/0x290 [ 1060.464177][ T7735] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1060.469634][ T7735] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1060.475093][ T7735] ? do_syscall_64+0x26/0x610 [ 1060.479769][ T7735] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1060.485836][ T7735] ? do_syscall_64+0x26/0x610 [ 1060.490522][ T7735] __x64_sys_preadv+0x9a/0xf0 [ 1060.495205][ T7735] do_syscall_64+0x103/0x610 [ 1060.499887][ T7735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1060.506281][ T7735] RIP: 0033:0x457e29 [ 1060.510182][ T7735] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1060.529782][ T7735] RSP: 002b:00007f31c64dbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1060.538194][ T7735] RAX: ffffffffffffffda RBX: 00007f31c64dbc90 RCX: 0000000000457e29 [ 1060.546172][ T7735] RDX: 00000000000001fe RSI: 00000000200017c0 RDI: 0000000000000003 11:39:53 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x700, 0x3ff}, {}], 0x2, 0x0) 11:39:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') connect$bt_rfcomm(r1, &(0x7f00000000c0)={0x1f, {0x8, 0x80000001, 0x100, 0xfffffffffffffffc, 0x1, 0x5}, 0x7fffffff}, 0xa) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket$inet(0xa, 0x801, 0x84) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f0000000240)={0x32, "9df32488a7a341b7448a0df0e212a90a74be977c8a40e9a7e338d3a86baaa9e85cba8efe0a2333a9f7f3888f753a0f124ad4be8e2fe11b2c9a618cd8f3802591e42e2c9fccc662a8164da6e4907e180583d00c2d21bd063c2088df2a2d4d9474893d37f72483c5c178470e8caf1ec495e0238d63b7e87128e10cd1e92bcd114a"}) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800008a}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="000027bd7000fbdbdf250e000000200005001c000200080004003f000000080001000c0000000800010001000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000004}, 0x24044040) [ 1060.554151][ T7735] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1060.562122][ T7735] R10: 0000000000000063 R11: 0000000000000246 R12: 00007f31c64dc6d4 [ 1060.570100][ T7735] R13: 00000000004c4933 R14: 00000000004d8210 R15: 0000000000000004 11:39:53 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x200000000000000, 0x3ff}, {}], 0x2, 0x0) 11:39:53 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x3f00, 0x3ff}, {}], 0x2, 0x0) 11:39:53 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x1, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000000c0), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:53 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x3, 0x3ff}, {}], 0x2, 0x0) 11:39:53 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x3f00000000000000, 0x3ff}, {}], 0x2, 0x0) 11:39:53 executing program 2 (fault-call:2 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:53 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x538, 0x0) write$cgroup_pid(r0, &(0x7f0000000240)=r1, 0x12) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x40, 0x0, &(0x7f0000000100), 0x800000, &(0x7f0000000140)={[{@overriderock='overriderockperm'}, {@cruft='cruft'}, {@session={'session', 0x3d, 0x3a}}], [{@appraise_type='appraise_type=imasig'}, {@smackfsroot={'smackfsroot', 0x3d, '!-'}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @initdev}, 0x10) 11:39:53 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x7000000, 0x3ff}, {}], 0x2, 0x0) 11:39:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r'}, 0x1c) [ 1061.175434][ T8079] FAULT_INJECTION: forcing a failure. [ 1061.175434][ T8079] name failslab, interval 1, probability 0, space 0, times 0 [ 1061.223883][ T8079] CPU: 1 PID: 8079 Comm: syz-executor.2 Not tainted 5.0.0-rc7-next-20190225 #42 [ 1061.233029][ T8079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1061.243085][ T8079] Call Trace: [ 1061.246395][ T8079] dump_stack+0x172/0x1f0 [ 1061.250738][ T8079] should_fail.cold+0xa/0x15 [ 1061.255335][ T8079] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 1061.260891][ T8079] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1061.266701][ T8079] ? find_held_lock+0x35/0x130 [ 1061.271469][ T8079] ? rcu_read_unlock+0x16/0x60 [ 1061.276338][ T8079] __should_failslab+0x121/0x190 [ 1061.281281][ T8079] should_failslab+0x9/0x14 [ 1061.285789][ T8079] kmem_cache_alloc_trace+0x4b/0x760 [ 1061.291076][ T8079] ? kasan_check_read+0x11/0x20 [ 1061.295941][ T8079] memcg_kmem_get_cache+0x244/0x5f0 [ 1061.301144][ T8079] kmem_cache_alloc_node_trace+0x1b5/0x720 [ 1061.306951][ T8079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1061.313313][ T8079] __kmalloc_node+0x3d/0x70 [ 1061.317817][ T8079] kvmalloc_node+0x68/0x100 [ 1061.322328][ T8079] traverse+0x401/0x760 [ 1061.326488][ T8079] ? seq_dentry+0x2d0/0x2d0 [ 1061.330995][ T8079] seq_read+0x8f8/0x1130 [ 1061.335269][ T8079] ? seq_dentry+0x2d0/0x2d0 [ 1061.339780][ T8079] proc_reg_read+0x1fe/0x2c0 [ 1061.344373][ T8079] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 1061.349835][ T8079] ? rw_verify_area+0x118/0x360 [ 1061.354701][ T8079] do_iter_read+0x4a9/0x660 [ 1061.359209][ T8079] ? dup_iter+0x260/0x260 [ 1061.363550][ T8079] vfs_readv+0xf0/0x160 [ 1061.367792][ T8079] ? lock_downgrade+0x880/0x880 [ 1061.372646][ T8079] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 1061.378713][ T8079] ? kasan_check_read+0x11/0x20 [ 1061.383583][ T8079] ? ksys_dup3+0x3e0/0x3e0 [ 1061.388004][ T8079] ? wait_for_completion+0x440/0x440 [ 1061.393297][ T8079] ? __fget_light+0x1a9/0x230 [ 1061.397979][ T8079] do_preadv+0x1c4/0x280 [ 1061.402222][ T8079] ? do_readv+0x290/0x290 [ 1061.406551][ T8079] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1061.412010][ T8079] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1061.417467][ T8079] ? do_syscall_64+0x26/0x610 [ 1061.422141][ T8079] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1061.428208][ T8079] ? do_syscall_64+0x26/0x610 [ 1061.432889][ T8079] __x64_sys_preadv+0x9a/0xf0 [ 1061.437568][ T8079] do_syscall_64+0x103/0x610 [ 1061.442167][ T8079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1061.448057][ T8079] RIP: 0033:0x457e29 [ 1061.451977][ T8079] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:39:54 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x300, 0x3ff}, {}], 0x2, 0x0) 11:39:54 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x2}, {}], 0x2, 0x0) [ 1061.471854][ T8079] RSP: 002b:00007f31c64dbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1061.480271][ T8079] RAX: ffffffffffffffda RBX: 00007f31c64dbc90 RCX: 0000000000457e29 [ 1061.488248][ T8079] RDX: 00000000000001fe RSI: 00000000200017c0 RDI: 0000000000000003 [ 1061.496224][ T8079] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1061.504673][ T8079] R10: 0000000000000063 R11: 0000000000000246 R12: 00007f31c64dc6d4 [ 1061.512647][ T8079] R13: 00000000004c4933 R14: 00000000004d8210 R15: 0000000000000004 11:39:54 executing program 2 (fault-call:2 fault-nth:3): r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:54 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x3f00, 0x3ff}, {}], 0x2, 0x0) 11:39:54 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x3f00}, {}], 0x2, 0x0) [ 1061.663980][ T8096] FAULT_INJECTION: forcing a failure. [ 1061.663980][ T8096] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1061.677223][ T8096] CPU: 0 PID: 8096 Comm: syz-executor.2 Not tainted 5.0.0-rc7-next-20190225 #42 [ 1061.686249][ T8096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1061.696310][ T8096] Call Trace: [ 1061.699616][ T8096] dump_stack+0x172/0x1f0 [ 1061.703965][ T8096] should_fail.cold+0xa/0x15 [ 1061.708574][ T8096] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1061.714413][ T8096] ? mark_held_locks+0xf0/0xf0 [ 1061.719193][ T8096] ? debug_smp_processor_id+0x3c/0x280 [ 1061.724675][ T8096] ? perf_trace_lock_acquire+0xf5/0x580 [ 1061.730294][ T8096] should_fail_alloc_page+0x50/0x60 [ 1061.735521][ T8096] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1061.741720][ T8096] ? find_held_lock+0x35/0x130 [ 1061.746959][ T8096] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1061.752693][ T8096] ? mark_held_locks+0xa4/0xf0 [ 1061.757485][ T8096] cache_grow_begin+0x9c/0x860 [ 1061.762257][ T8096] ? __kmalloc_node+0x3d/0x70 [ 1061.766934][ T8096] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1061.766957][ T8096] kmem_cache_alloc_node_trace+0x658/0x720 [ 1061.766973][ T8096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1061.766997][ T8096] __kmalloc_node+0x3d/0x70 [ 1061.767013][ T8096] kvmalloc_node+0x68/0x100 [ 1061.767029][ T8096] traverse+0x401/0x760 [ 1061.767047][ T8096] ? seq_dentry+0x2d0/0x2d0 [ 1061.767065][ T8096] seq_read+0x8f8/0x1130 [ 1061.767105][ T8096] ? seq_dentry+0x2d0/0x2d0 [ 1061.767121][ T8096] proc_reg_read+0x1fe/0x2c0 [ 1061.767144][ T8096] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 1061.821713][ T8096] ? rw_verify_area+0x118/0x360 [ 1061.826582][ T8096] do_iter_read+0x4a9/0x660 [ 1061.831103][ T8096] ? dup_iter+0x260/0x260 [ 1061.835449][ T8096] vfs_readv+0xf0/0x160 [ 1061.839610][ T8096] ? lock_downgrade+0x880/0x880 [ 1061.844469][ T8096] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 1061.850539][ T8096] ? kasan_check_read+0x11/0x20 [ 1061.855410][ T8096] ? ksys_dup3+0x3e0/0x3e0 [ 1061.859837][ T8096] ? wait_for_completion+0x440/0x440 [ 1061.865243][ T8096] ? __fget_light+0x1a9/0x230 [ 1061.869975][ T8096] do_preadv+0x1c4/0x280 [ 1061.869995][ T8096] ? do_readv+0x290/0x290 [ 1061.870012][ T8096] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1061.870027][ T8096] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1061.870042][ T8096] ? do_syscall_64+0x26/0x610 [ 1061.870055][ T8096] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1061.870086][ T8096] ? do_syscall_64+0x26/0x610 [ 1061.884088][ T8096] __x64_sys_preadv+0x9a/0xf0 [ 1061.909567][ T8096] do_syscall_64+0x103/0x610 11:39:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x80) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e20, 0x4, @mcast1, 0x945}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e23, 0x0, @empty, 0x4}, @in={0x2, 0x4e22, @rand_addr=0x9}], 0x78) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:54 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x2000000}, {}], 0x2, 0x0) 11:39:54 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x3000000, 0x3ff}, {}], 0x2, 0x0) [ 1061.914179][ T8096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1061.920080][ T8096] RIP: 0033:0x457e29 [ 1061.920096][ T8096] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1061.920104][ T8096] RSP: 002b:00007f31c64dbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1061.920119][ T8096] RAX: ffffffffffffffda RBX: 00007f31c64dbc90 RCX: 0000000000457e29 11:39:54 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x3f000000}, {}], 0x2, 0x0) [ 1061.920147][ T8096] RDX: 00000000000001fe RSI: 00000000200017c0 RDI: 0000000000000003 [ 1061.920155][ T8096] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1061.920169][ T8096] R10: 0000000000000063 R11: 0000000000000246 R12: 00007f31c64dc6d4 [ 1061.943648][ T8096] R13: 00000000004c4933 R14: 00000000004d8210 R15: 0000000000000004 11:39:54 executing program 2 (fault-call:2 fault-nth:4): r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:54 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x3f000000, 0x3ff}, {}], 0x2, 0x0) 11:39:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:54 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x200000000000000}, {}], 0x2, 0x0) 11:39:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0xffffffffffffffff, @rand_addr=0x7}, 0x10) 11:39:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x63) 11:39:55 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x3f00000000000000}, {}], 0x2, 0x0) [ 1062.186000][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) 11:39:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000000c0)={0x51, 0x9, 0x3, {0x5, 0xfffffffffffffffc}, {0x8, 0x4}, @cond=[{0x9, 0x6, 0x7, 0x4, 0x9, 0x7}, {0x9, 0x1, 0xd4, 0x100000001, 0x100000000, 0x80}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x1, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2, 0x63) [ 1062.365795][ T8249] QAT: Invalid ioctl [ 1062.383321][ T8250] QAT: Invalid ioctl 11:39:55 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x3f000000, 0x3ff}, {}], 0x2, 0x0) 11:39:55 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x2}], 0x2, 0x0) 11:39:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3, 0x63) 11:39:55 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x700000000000000, 0x3ff}, {}], 0x2, 0x0) 11:39:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = dup(r0) getdents(r1, &(0x7f0000000080)=""/137, 0x89) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:55 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x3f00}], 0x2, 0x0) 11:39:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x4, 0x63) 11:39:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x5, 0x63) 11:39:55 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x2000000}], 0x2, 0x0) 11:39:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x1, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000000c0)=0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:56 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x3f000000}], 0x2, 0x0) [ 1063.257552][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:56 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x300000000000000, 0x3ff}, {}], 0x2, 0x0) 11:39:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x6, 0x63) 11:39:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x80000, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f00000000c0)={'mangle\x00', 0xbb, "fab1c16de69d71f8b65528c99a16bcd4ec208098564ff2e99fd970f9c777c8b8cd043816fd6d8b4cbeea3bb05c4a25bd83acdd783a730f884c2149b75b1fc98c261e191ccb6340e4a36696a967118923bc0320b4a46d14549363894d811de67a6a5ed4600c5c800e577dfa2ad1c2690c53bbd38fb0a2e967f68dc88e9aa4c816e1f6bea1c2a645ca74f4e98d8a2dc32d6bd73d532b04008e3331d3622a5d3a341cb3c571068b4b952bd78b1b954511f1f7036c8005a049269eb270"}, &(0x7f00000001c0)=0xdf) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:56 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x3f00000000000000, 0x3ff}, {}], 0x2, 0x0) 11:39:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:56 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x200000000000000}], 0x2, 0x0) 11:39:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000080)={0x5, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x0, 0x1, [{{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}}]}, 0x110) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x7, 0x63) [ 1063.990758][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:56 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x3f00000000000000}], 0x2, 0x0) 11:39:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) 11:39:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x8, 0x63) 11:39:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000b40)={0x2, 0x4e21, @multicast2}, 0xb3) write$binfmt_elf64(r1, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x8, 0x9, 0xe6c8, 0x80000001, 0x0, 0x6, 0x4, 0x2b9, 0x40, 0x1d4, 0x4, 0x30000000000000, 0x38, 0x1, 0x9, 0x8}, [{0x0, 0xb7, 0x10000, 0x9, 0x8, 0x2, 0xef66, 0x8}, {0x7, 0xf21, 0x9, 0xffffffff, 0x127, 0x5, 0x0, 0xea7}], "3f581d03c8aff2ef9fa61e5e79f987bec3dbbbe9d7ce681588d72ce8feb097afa227d31cb052b4b2b52f875c60997db6a37fd18227cbcf3563cbf71b113845705af8d8617dd9e78e9427951c6ea9a7fd8e676dbbd4bbdf992bc26c0a565984022caf7629348a78e92575041b61a36fbdcf49a53fdf57c33a8bea81a611fbf80748d00b97b15a7d64be8b70e4cdbf2f67f35e6e1768aa8d2d328a06e2c0e9b643c423197c67b407ba53cea414391451998f0ae417f14a6296", [[], [], [], [], [], [], [], [], []]}, 0xa68) rt_sigpending(&(0x7f0000000b00), 0x8) 11:39:57 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x3f00000000000000, 0x3ff}, {}], 0x2, 0x0) 11:39:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) 11:39:57 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x2}], 0x2, 0x0) 11:39:57 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x7}, {}], 0x2, 0x0) 11:39:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x9, 0x63) 11:39:57 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x3f00}], 0x2, 0x0) 11:39:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) r3 = socket$inet(0xa, 0x801, 0x81) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000100)={0x0, @motion_det}) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4, 0x20200) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000001c0)) 11:39:57 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x2000000}], 0x2, 0x0) 11:39:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:39:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xa, 0x63) 11:39:57 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x3f000000}], 0x2, 0x0) [ 1064.999995][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:39:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x460b00, 0x0) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000100)) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f00000000c0)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x400880, 0x0) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000140)) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000200)={0x1b, 0x4, 0x0, [{0x778, 0x80, 0x4, 0xb3, 0x1000, 0x1f, 0x1}, {0x4525, 0x2, 0x6, 0xfffffffffffffffe, 0x5, 0x2, 0x7}, {0x336, 0xe39a, 0x2, 0x9, 0x0, 0x1, 0x8}, {0x81, 0x81, 0x4, 0x5, 0xfffffffffffffffa, 0x10001, 0xa5}]}) fcntl$addseals(r0, 0x409, 0x1) connect$netlink(r2, &(0x7f0000000180)=@unspec, 0xc) 11:39:58 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x3}, {}], 0x2, 0x0) 11:39:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000ff"}, 0x1c) 11:39:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xb, 0x63) 11:39:58 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x700}, {}], 0x2, 0x0) 11:39:58 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x200000000000000}], 0x2, 0x0) 11:39:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x4080, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000400}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="080800bd4e00ffdbdf2502000000d7f0f62f8aa2f4f14a9da7cf33ac8db8e336d144c9ba123e42faab04fd7f242206781e15e37116a1061a12d843fdb56d61f687ded36fb43c2a4b4d806663b95a96b0a728dbf4528e11d47acf024b117eecc324bbf045571c02"], 0x14}, 0x1, 0x0, 0x0, 0x4000801}, 0x4048081) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) r4 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f00000000c0)) 11:39:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xc, 0x63) 11:39:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xd, 0x63) 11:39:58 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x3f00000000000000}], 0x2, 0x0) 11:39:58 executing program 4: 11:39:58 executing program 4: 11:39:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xe, 0x63) 11:39:59 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x300}, {}], 0x2, 0x0) 11:39:59 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x2}], 0x2, 0x0) 11:39:59 executing program 4: 11:39:59 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x3f00}, {}], 0x2, 0x0) 11:39:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xf, 0x63) 11:39:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000fd"}, 0x1c) 11:39:59 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x3f00}], 0x2, 0x0) 11:39:59 executing program 4: 11:39:59 executing program 4: 11:39:59 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x2000000}], 0x2, 0x0) 11:39:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x10, 0x63) 11:39:59 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x3f000000}], 0x2, 0x0) 11:40:00 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x3f00}, {}], 0x2, 0x0) 11:40:00 executing program 4: 11:40:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x11, 0x63) 11:40:00 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x7000000}, {}], 0x2, 0x0) 11:40:00 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x200000000000000}], 0x2, 0x0) 11:40:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x12, 0x63) 11:40:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:00 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x3f00000000000000}], 0x2, 0x0) 11:40:00 executing program 4 (fault-call:11 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1067.728848][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1067.732160][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x13, 0x63) 11:40:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000fa"}, 0x1c) [ 1067.888095][ T9087] FAULT_INJECTION: forcing a failure. [ 1067.888095][ T9087] name failslab, interval 1, probability 0, space 0, times 0 [ 1067.925575][ T9087] CPU: 1 PID: 9087 Comm: syz-executor.4 Not tainted 5.0.0-rc7-next-20190225 #42 [ 1067.934640][ T9087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1067.944705][ T9087] Call Trace: [ 1067.948007][ T9087] dump_stack+0x172/0x1f0 [ 1067.952458][ T9087] should_fail.cold+0xa/0x15 [ 1067.957074][ T9087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1067.962906][ T9087] ? ___might_sleep+0x163/0x280 [ 1067.967781][ T9087] __should_failslab+0x121/0x190 [ 1067.972735][ T9087] should_failslab+0x9/0x14 [ 1067.977248][ T9087] kmem_cache_alloc_trace+0x2d1/0x760 [ 1067.982625][ T9087] ? kasan_check_read+0x11/0x20 [ 1067.987485][ T9087] alloc_pipe_info+0xb9/0x430 [ 1067.992168][ T9087] splice_direct_to_actor+0x775/0x970 [ 1067.997675][ T9087] ? common_file_perm+0x238/0x720 [ 1068.002719][ T9087] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1068.008277][ T9087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1068.014519][ T9087] ? do_splice_to+0x190/0x190 [ 1068.019211][ T9087] ? rw_verify_area+0x118/0x360 [ 1068.024154][ T9087] do_splice_direct+0x1da/0x2a0 [ 1068.029010][ T9087] ? splice_direct_to_actor+0x970/0x970 [ 1068.034567][ T9087] ? rw_verify_area+0x118/0x360 [ 1068.039423][ T9087] do_sendfile+0x597/0xd00 [ 1068.043852][ T9087] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1068.049144][ T9087] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1068.055387][ T9087] ? fput+0x1b/0x20 [ 1068.059372][ T9087] __x64_sys_sendfile64+0x1dd/0x220 [ 1068.064625][ T9087] ? __ia32_sys_sendfile+0x230/0x230 [ 1068.069920][ T9087] ? do_syscall_64+0x26/0x610 [ 1068.074596][ T9087] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1068.079884][ T9087] ? trace_hardirqs_on+0x67/0x230 [ 1068.084919][ T9087] do_syscall_64+0x103/0x610 [ 1068.089522][ T9087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1068.095411][ T9087] RIP: 0033:0x457e29 [ 1068.099302][ T9087] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1068.118908][ T9087] RSP: 002b:00007f665af3ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1068.127313][ T9087] RAX: ffffffffffffffda RBX: 00007f665af3ec90 RCX: 0000000000457e29 11:40:01 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x3000000}, {}], 0x2, 0x0) 11:40:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x14, 0x63) 11:40:01 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x1f4, 0x0) [ 1068.127323][ T9087] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000002 [ 1068.127333][ T9087] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1068.127343][ T9087] R10: 0000000002000006 R11: 0000000000000246 R12: 00007f665af3f6d4 [ 1068.127352][ T9087] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 0000000000000008 11:40:01 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x3f000000}, {}], 0x2, 0x0) 11:40:01 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='wlan1em0GPLGPLkeyring-!vmnet0keyring\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x7ffffffff000, 0x0, 0x10, r0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1, 0x104) socket$packet(0x11, 0x3, 0x300) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f0000000000)={0x0, {0x800, 0x20}}) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x9, 0x7112000, 0x41d3d77b, 0x9ae}, {0xfffffffffffffffd, 0x1, 0x9, 0xde89a02}]}, 0x10) 11:40:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x15, 0x63) 11:40:01 executing program 4 (fault-call:11 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x16, 0x63) 11:40:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 1068.749890][ T9268] FAULT_INJECTION: forcing a failure. [ 1068.749890][ T9268] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.793818][ T9268] CPU: 1 PID: 9268 Comm: syz-executor.4 Not tainted 5.0.0-rc7-next-20190225 #42 [ 1068.802888][ T9268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1068.806644][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1068.813056][ T9268] Call Trace: [ 1068.813083][ T9268] dump_stack+0x172/0x1f0 [ 1068.813105][ T9268] should_fail.cold+0xa/0x15 [ 1068.836304][ T9268] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1068.842119][ T9268] ? ___might_sleep+0x163/0x280 [ 1068.846981][ T9268] __should_failslab+0x121/0x190 [ 1068.851926][ T9268] should_failslab+0x9/0x14 [ 1068.856430][ T9268] __kmalloc+0x2dc/0x740 [ 1068.860679][ T9268] ? kmem_cache_alloc_trace+0x354/0x760 [ 1068.866227][ T9268] ? alloc_pipe_info+0x199/0x430 [ 1068.871174][ T9268] alloc_pipe_info+0x199/0x430 [ 1068.875958][ T9268] splice_direct_to_actor+0x775/0x970 [ 1068.881331][ T9268] ? common_file_perm+0x238/0x720 [ 1068.886362][ T9268] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1068.891909][ T9268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1068.898173][ T9268] ? do_splice_to+0x190/0x190 [ 1068.902873][ T9268] ? rw_verify_area+0x118/0x360 [ 1068.907729][ T9268] do_splice_direct+0x1da/0x2a0 [ 1068.912680][ T9268] ? splice_direct_to_actor+0x970/0x970 [ 1068.918237][ T9268] ? rw_verify_area+0x118/0x360 [ 1068.923092][ T9268] do_sendfile+0x597/0xd00 [ 1068.927525][ T9268] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1068.932824][ T9268] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1068.939062][ T9268] ? fput+0x1b/0x20 [ 1068.942879][ T9268] __x64_sys_sendfile64+0x1dd/0x220 [ 1068.948183][ T9268] ? __ia32_sys_sendfile+0x230/0x230 [ 1068.953559][ T9268] ? do_syscall_64+0x26/0x610 [ 1068.958248][ T9268] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1068.963553][ T9268] ? trace_hardirqs_on+0x67/0x230 [ 1068.968684][ T9268] do_syscall_64+0x103/0x610 [ 1068.973283][ T9268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1068.979174][ T9268] RIP: 0033:0x457e29 [ 1068.983067][ T9268] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1069.002672][ T9268] RSP: 002b:00007f665af3ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1069.011187][ T9268] RAX: ffffffffffffffda RBX: 00007f665af3ec90 RCX: 0000000000457e29 [ 1069.019166][ T9268] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000002 [ 1069.027139][ T9268] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1069.035117][ T9268] R10: 0000000002000006 R11: 0000000000000246 R12: 00007f665af3f6d4 11:40:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:01 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x3f000000}, {}], 0x2, 0x0) 11:40:01 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4080, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2d, 0x4, 0x0, {0x3, 0x32, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) [ 1069.043092][ T9268] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 0000000000000008 11:40:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x17, 0x63) [ 1069.098662][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:02 executing program 4 (fault-call:11 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1069.229409][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1069.312651][ T9439] FAULT_INJECTION: forcing a failure. [ 1069.312651][ T9439] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1069.325899][ T9439] CPU: 1 PID: 9439 Comm: syz-executor.4 Not tainted 5.0.0-rc7-next-20190225 #42 [ 1069.334910][ T9439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.344958][ T9439] Call Trace: [ 1069.348254][ T9439] dump_stack+0x172/0x1f0 [ 1069.352588][ T9439] should_fail.cold+0xa/0x15 [ 1069.357279][ T9439] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1069.363093][ T9439] ? mark_held_locks+0xf0/0xf0 [ 1069.367861][ T9439] ? debug_smp_processor_id+0x3c/0x280 [ 1069.373413][ T9439] should_fail_alloc_page+0x50/0x60 [ 1069.378620][ T9439] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1069.384002][ T9439] ? find_held_lock+0x35/0x130 [ 1069.388875][ T9439] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1069.394619][ T9439] cache_grow_begin+0x9c/0x860 [ 1069.399389][ T9439] ? alloc_pipe_info+0x199/0x430 [ 1069.404335][ T9439] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1069.410581][ T9439] __kmalloc+0x67f/0x740 [ 1069.414838][ T9439] ? kmem_cache_alloc_trace+0x354/0x760 [ 1069.420387][ T9439] ? alloc_pipe_info+0x199/0x430 [ 1069.425326][ T9439] alloc_pipe_info+0x199/0x430 [ 1069.430093][ T9439] splice_direct_to_actor+0x775/0x970 [ 1069.435469][ T9439] ? common_file_perm+0x238/0x720 [ 1069.440491][ T9439] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1069.446044][ T9439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1069.452286][ T9439] ? do_splice_to+0x190/0x190 [ 1069.456973][ T9439] ? rw_verify_area+0x118/0x360 [ 1069.461824][ T9439] do_splice_direct+0x1da/0x2a0 [ 1069.466683][ T9439] ? splice_direct_to_actor+0x970/0x970 [ 1069.472245][ T9439] ? rw_verify_area+0x118/0x360 [ 1069.477104][ T9439] do_sendfile+0x597/0xd00 [ 1069.481569][ T9439] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1069.486876][ T9439] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1069.493140][ T9439] ? fput+0x1b/0x20 [ 1069.497227][ T9439] __x64_sys_sendfile64+0x1dd/0x220 [ 1069.502516][ T9439] ? __ia32_sys_sendfile+0x230/0x230 [ 1069.508287][ T9439] ? do_syscall_64+0x26/0x610 [ 1069.512971][ T9439] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1069.518256][ T9439] ? trace_hardirqs_on+0x67/0x230 [ 1069.523283][ T9439] do_syscall_64+0x103/0x610 [ 1069.527878][ T9439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1069.533765][ T9439] RIP: 0033:0x457e29 [ 1069.537660][ T9439] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1069.557347][ T9439] RSP: 002b:00007f665af5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1069.565759][ T9439] RAX: ffffffffffffffda RBX: 00007f665af5fc90 RCX: 0000000000457e29 [ 1069.573727][ T9439] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000002 [ 1069.581698][ T9439] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1069.589669][ T9439] R10: 0000000002000006 R11: 0000000000000246 R12: 00007f665af606d4 [ 1069.597637][ T9439] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 0000000000000008 11:40:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x18, 0x63) 11:40:02 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x700000000000000}, {}], 0x2, 0x0) 11:40:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:02 executing program 5: r0 = semget(0x1, 0x3, 0x10) semtimedop(r0, &(0x7f0000000240)=[{0x0, 0x3fd}, {0x0, 0xfffffffffffffffc}], 0x2, 0x0) socketpair(0x4, 0x0, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f0000000300)={{0x9, 0x3, 0x9, 0x1bf9, 'syz1\x00'}, 0x1, [0x6, 0x41a32569, 0x2, 0xa8, 0xfffffffffffffff8, 0x6, 0x1, 0xffffffffffff11c9, 0x6, 0x1, 0x7, 0x200, 0x1, 0x81, 0xffffffff00000001, 0x8, 0x5, 0x82, 0x800, 0x2, 0x1, 0x8, 0x80000000, 0x49, 0x1, 0x48775c0e, 0x5, 0x23e, 0xbd, 0x62d0, 0x5, 0xb9, 0xfffffffffffffff9, 0x1ff, 0x8000, 0x2, 0x2, 0x9, 0x6, 0x10000, 0x100, 0x1ff, 0x100000000, 0x3, 0x785a, 0x7, 0x401, 0x0, 0x616a, 0xaa, 0x8001, 0x1000, 0x7ff, 0x1, 0x6, 0x3, 0x1, 0x3, 0x1, 0x100, 0x4, 0x7fffffff, 0x3ff, 0xfffffffffffffffe, 0xfffffffeffffffff, 0x6, 0x10001, 0x3, 0x1, 0x3ff, 0x9, 0xfffffffffffffff7, 0x100000001, 0x2f2a, 0x7, 0xfffffffffffffffa, 0xab9, 0x3f91, 0x80000000, 0x3, 0x0, 0x5a, 0xffffffff, 0x80000000, 0x1, 0x8, 0x3, 0x8, 0x401, 0x5, 0x8, 0x8, 0x4, 0x3f68, 0x1, 0x4, 0xfffffffffffffff7, 0xff, 0x6, 0xffffffffffffff08, 0x7, 0x9, 0x4, 0x535a, 0x3, 0x9, 0x6, 0x4, 0xbd36, 0x9, 0x6d, 0xfffffffffffeffff, 0x1, 0x9, 0x9, 0x800, 0x8001, 0x3ff, 0x80, 0xffff, 0x1, 0xffffffffffffffff, 0x2, 0x259e, 0x800, 0x80, 0x2, 0x1], {r3, r4+10000000}}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x0, 0x4e23, 0x1, 0xa, 0x80, 0x80, 0x32, r5, r6}, {0x100000001, 0xfffffffffffffeff, 0x8, 0x0, 0x0, 0x1, 0x16}, {0x1, 0x8, 0x0, 0xffffffffffffffe1}, 0x7, 0x6e6bb1, 0x2, 0x1, 0x2, 0x3}, {{@in6=@rand_addr="9938456287189835573c0dbe2922eb75", 0x4d5, 0x2b}, 0xa, @in=@rand_addr=0x1, 0x3505, 0x0, 0x1, 0xff, 0x10, 0x8001, 0x1}}, 0xe8) [ 1069.679723][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x19, 0x63) 11:40:02 executing program 4 (fault-call:11 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000ef"}, 0x1c) [ 1069.870692][ T9667] FAULT_INJECTION: forcing a failure. [ 1069.870692][ T9667] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1069.885998][ T9667] CPU: 1 PID: 9667 Comm: syz-executor.4 Not tainted 5.0.0-rc7-next-20190225 #42 [ 1069.895057][ T9667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.905120][ T9667] Call Trace: [ 1069.908430][ T9667] dump_stack+0x172/0x1f0 [ 1069.912775][ T9667] should_fail.cold+0xa/0x15 [ 1069.917375][ T9667] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1069.923172][ T9667] ? ___might_sleep+0x163/0x280 [ 1069.928018][ T9667] should_fail_alloc_page+0x50/0x60 [ 1069.933201][ T9667] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1069.938564][ T9667] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1069.944276][ T9667] ? save_stack+0x45/0xd0 [ 1069.948598][ T9667] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1069.954393][ T9667] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1069.960618][ T9667] alloc_pages_current+0x107/0x210 [ 1069.965740][ T9667] push_pipe+0x3fc/0x7a0 [ 1069.969976][ T9667] ? sanity+0x236/0x330 [ 1069.974228][ T9667] iov_iter_get_pages+0x5a6/0xf80 [ 1069.979241][ T9667] ? csum_and_copy_to_iter+0x1650/0x1650 [ 1069.984873][ T9667] ? bio_associate_blkg+0x11c/0x390 [ 1069.990057][ T9667] ? find_held_lock+0x35/0x130 [ 1069.994820][ T9667] bio_iov_iter_get_pages+0x1e9/0x770 [ 1070.000183][ T9667] ? bio_phys_segments+0xc0/0xc0 [ 1070.005106][ T9667] ? kasan_check_read+0x11/0x20 [ 1070.009951][ T9667] __blkdev_direct_IO_simple+0x3e2/0xd10 [ 1070.015674][ T9667] ? kernel_text_address+0x73/0xf0 [ 1070.020879][ T9667] ? blkdev_bio_end_io+0x870/0x870 [ 1070.025978][ T9667] ? mark_held_locks+0xf0/0xf0 [ 1070.030730][ T9667] ? debug_smp_processor_id+0x3c/0x280 [ 1070.036177][ T9667] ? perf_trace_lock_acquire+0xf5/0x580 [ 1070.041729][ T9667] ? bdev_evict_inode+0x5d0/0x5d0 [ 1070.046748][ T9667] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1070.052973][ T9667] ? iov_iter_npages+0x211/0xae0 [ 1070.057895][ T9667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1070.064125][ T9667] blkdev_direct_IO+0xc12/0x1400 [ 1070.069045][ T9667] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 1070.074926][ T9667] ? current_time+0xd8/0x140 [ 1070.079499][ T9667] ? timespec64_trunc+0x180/0x180 [ 1070.084514][ T9667] ? __blkdev_direct_IO_simple+0xd10/0xd10 [ 1070.090317][ T9667] ? atime_needs_update+0x491/0x5f0 [ 1070.095623][ T9667] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1070.101844][ T9667] ? touch_atime+0xe9/0x2a0 [ 1070.106331][ T9667] ? atime_needs_update+0x5f0/0x5f0 [ 1070.111521][ T9667] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1070.117746][ T9667] ? filemap_check_errors+0xd8/0x110 [ 1070.123019][ T9667] generic_file_read_iter+0x349/0x2870 [ 1070.128460][ T9667] ? find_held_lock+0x35/0x130 [ 1070.133208][ T9667] ? aa_file_perm+0x40b/0xeb0 [ 1070.137875][ T9667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1070.144120][ T9667] ? filemap_write_and_wait_range+0xd0/0xd0 [ 1070.150012][ T9667] ? aa_file_perm+0x432/0xeb0 [ 1070.154686][ T9667] ? debug_smp_processor_id+0x3c/0x280 [ 1070.160144][ T9667] ? perf_trace_lock_acquire+0xf5/0x580 [ 1070.165677][ T9667] ? aa_path_link+0x460/0x460 [ 1070.170356][ T9667] ? percpu_ref_put_many+0x94/0x190 [ 1070.175553][ T9667] ? find_held_lock+0x35/0x130 [ 1070.180314][ T9667] blkdev_read_iter+0x120/0x190 [ 1070.185153][ T9667] generic_file_splice_read+0x4b4/0x800 [ 1070.190681][ T9667] ? add_to_pipe+0x350/0x350 [ 1070.195363][ T9667] ? rw_verify_area+0x118/0x360 [ 1070.200200][ T9667] ? add_to_pipe+0x350/0x350 [ 1070.204796][ T9667] do_splice_to+0x12a/0x190 [ 1070.209287][ T9667] splice_direct_to_actor+0x2d2/0x970 [ 1070.214646][ T9667] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1070.220180][ T9667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1070.226401][ T9667] ? do_splice_to+0x190/0x190 [ 1070.231081][ T9667] ? rw_verify_area+0x118/0x360 [ 1070.235922][ T9667] do_splice_direct+0x1da/0x2a0 [ 1070.240776][ T9667] ? splice_direct_to_actor+0x970/0x970 [ 1070.246315][ T9667] ? rw_verify_area+0x118/0x360 [ 1070.251155][ T9667] do_sendfile+0x597/0xd00 [ 1070.255569][ T9667] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1070.260839][ T9667] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1070.267062][ T9667] ? fput+0x1b/0x20 [ 1070.270866][ T9667] __x64_sys_sendfile64+0x1dd/0x220 [ 1070.276136][ T9667] ? __ia32_sys_sendfile+0x230/0x230 [ 1070.281423][ T9667] ? do_syscall_64+0x26/0x610 [ 1070.286090][ T9667] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1070.291358][ T9667] ? trace_hardirqs_on+0x67/0x230 [ 1070.296370][ T9667] do_syscall_64+0x103/0x610 [ 1070.300948][ T9667] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1070.306833][ T9667] RIP: 0033:0x457e29 [ 1070.310714][ T9667] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1070.330300][ T9667] RSP: 002b:00007f665af5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1070.339265][ T9667] RAX: ffffffffffffffda RBX: 00007f665af5fc90 RCX: 0000000000457e29 [ 1070.347234][ T9667] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000002 [ 1070.355188][ T9667] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1070.363143][ T9667] R10: 0000000002000006 R11: 0000000000000246 R12: 00007f665af606d4 11:40:03 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x300000000000000}, {}], 0x2, 0x0) 11:40:03 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_EVENT_PKT={0x4, "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"}, 0xfc) 11:40:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a, 0x63) [ 1070.371098][ T9667] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 0000000000000008 11:40:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1b, 0x63) 11:40:03 executing program 4 (fault-call:11 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:03 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x408000, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @dev}, &(0x7f0000000080)=0xc) sendmsg$xdp(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x2c, 0x2, r1, 0x3}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000100)="554c8b8c2d0234ce3a1ba671b11e1522c2b7e14be1782b81fbf331f3727880bb28187d7bae282c27fd27f5c49235726fe3b88a98d86d44b110b2a21e27000914de79213a38ed14e5562ff74b56b42f02ebc4efafe290c3afc9b6b7f9b36b91d4d1e3d2e0eed6ce7e555548e67f34e58613bb8ba9a805d05b716a70e05864ccaef1de06beb7eddd2aecdbc618641ba6bebc6617afd58684d5fe539989c05d0b8c181c569e4cf7b5f7e8241610c469291d7445acc1fd5aa07705fb1061bf9987645c496e3f27a25980fa3d00b3dc08f9", 0xcf}, {&(0x7f0000000200)="b0160433e6bcdd25e0a38003d8b3", 0xe}], 0x2, 0x0, 0x0, 0x20040001}, 0x40840) 11:40:03 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x3f00000000000000}, {}], 0x2, 0x0) 11:40:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1c, 0x63) 11:40:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="0000000000000000000000000000008d"}, 0x1c) 11:40:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1d, 0x63) 11:40:03 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80000, 0x0) ioctl$TIOCCONS(r0, 0x541d) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:04 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x3f00000000000000}, {}], 0x2, 0x0) 11:40:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1e, 0x63) 11:40:04 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0xfffffffffffffffd, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000140)) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x36c, r1, 0x500, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xb9b}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3b}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_LINK={0x164, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbb5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4b9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xee28}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9be}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0xc0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa38}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xeb7c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @remote}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6599}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7, @local, 0x10001}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @rand_addr="e368b961c13f51e6e287f7b5dd4e0b4f", 0x97f}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}, @TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6erspan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}]}, 0x36c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) 11:40:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000010) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x21, 0x63) 11:40:04 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='*:!\x19-eth0wlan1keyringbdev\x00', 0xfffffffffffffffd) r1 = request_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\x00', 0xfffffffffffffffd) keyctl$negate(0xd, r0, 0x80000000, r1) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x1, 0x10000) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000001280)={0x0, 0xffffffffffffff53}, &(0x7f00000012c0)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000001300)={r3, 0x7166}, 0x8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@loopback, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@dev}}, &(0x7f00000014c0)=0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000001500)={@rand_addr="beceb76d0028a1be20e44fb200cba44a", @empty, @mcast1, 0x40, 0x54b8, 0x0, 0x100, 0x1, 0x2000000, r4}) sendto$unix(r2, &(0x7f0000000280)="a3cb410f0f7c23086cd093bad4c72ceb60307c1ff554a768eed20f7b74d1c96ebeeacc3740077f56d0dec55f421dfd5b44779b04aa4247e6f2a334a8b54a3e1fd6df184c878a037787497b9d6503e2e69842f5708469955bdfaaf0f51caf652a47aa17af648a82979bb4deb21e281bec74f9ee21cfcea3176982499f43024017f544b8753f2dc685a5dc6e3125f7ce9a45df18a2eb3df7e0b4294768fb450bcd1fb9bbfb6d338915f224c1a6158be2cdb9553859938142a75b3bff6d636e17c384d2f5ef8cf520e847f7143a13ca90d440cd401b82da967e5394811c2432b3ff36e9609e9b21bc1106809ae1222229b421c97f47642145dc3b02daab9d70f4d0e06d8f0659bc6274d638580fcbcd015e0ca0ca643085770ce4fce7e94952b00926b36e5f594053394d7b8ed66e151b94d251c44342dfd01e473ee7e465350d3069ad6308b66b6fe9b69b7f52b082bf89931ac28105e94c43c96e2c03951be030f1e85e2ade6b995994458335ab14b8a16b50126ef4e59316fb5a1cba53f2897d191b7d8c874522f84626c2bedfe74b34afab8191fdcef84aee913856c45be16d60448db332a73d2ce83dbc2bba87ddcd88c69defc6a90952d9131fa064093f14fb9b8f56287e0638179330d63553ccccb0cf4884f0fa3cbc171b5d96a13017cb9d5fba5d8e589ec386a56c7c6e9323b526ab8e616f5ea5664b5e47e102361fa0678bead3be60d09ed46432317a8b4c69b5f90ab3cdbe0559bd3f1d629edfca03bca0cb3c5f364e0509ee7946a12476f74f8a52cc20ece80e4541156d3127801b47fcb5c6fc0a721dd920e1ac96dfd7db390eb25cf3ef81da7dbc636af26c836255d429d1fe29f1b8135d2801cac20641616e07547e86d3872ca3c0f7067583778b37885376733c64f4c0b95ed7514ecdf5b42028cece2b149c7bce77091e072213c8f8091b00457f936a2f9e5aa7417ab055b4121dc8021cd6d933d8db20b125779f7502794941a407b8c53ec980f5b30eeabd5f25cc9570bb613373d9756ac211684587b2b67fe298854d828e70cb5dabb502a69a863953edcd0d67c17a61426fe2a6fb95f873988a0c055c6de404d8f6a0e57e5400072cdad4d295a0914ed13cabe996a9eea74d50d279312d2eb30ad0fcbb4e16f6b5a2998b0a9e795524ade1b028ededddfeef8edf22388f5adba1e5c64319e841e7ad1fb4cc7e1c8bafb748c8150c1855635812d6cb2e37f4ca90031f3959577535d5b4fa4672547acb2cf5d0ce6194d2c02103ba792f0d210955c8507bca33469283a2dba51e94e481b77b59bdd6943eb8e2b01bcd7efac8a89a3cd54afdf268430fedc06dc5b93bd833620e80937db62296615a0edeed93c11c75890e6ae80d5f3cff2372193052fe0fcf8c7744a448c4dc967d20125b24a9196e92fa4256aa006e73d1dc11dd6fdd2ba13968354dd8b22291a9f9c8ef9e47e9080cd26da59e4a4dabaaad6a65adf9ff7486f60dfd5b391fc00aaa07e96c5effa18430d991e5aabe69ae681b6244f9516a8a594aa6b5b93b47060879319c0a4b586f11974b9243494ed6c1256eaefb432dd0990279b8e0bb1252e5470a69f565b1537ce3ca1eae219730386a0e02f78630ce5c9990a67b3fc42e41e796ca721bb7479cee4d7de105631828ab568d3d51527e1777d5a5646ba484873bfe6bbfbac62db5b0c51618359e1386c0ea7d2bfd6f66a74827e420576c16c13787bf7c39a16a63ff19513e4e3a22511553710b4d54fddd85dd247153fdb882496a7f20f3c3efb54513d05d615764f529316347bce2669b15439c2a94d8a26f36b91fea8d80554b86fd50f589fbc482d4e9a0c4be897e0f4bb6e643520570e876ea5b6007ea32e51bd992cbf480f37e847d532e6f67e60ce29011c74244b730f78b2da1a5066d31f4d0e009a609546ec9f393de792dff6aa790be2bce5653322e0a7287f1e4124eee0281e5bb90e5e885d9583a31109bea25d1726cfff311626598c20dc883ec1c738f464815caceccba3cbb7753cbdf348acb4b6c70e58651b705322f22179697ffb9bd5384207003a4c7ae230882db39ce06286e2b0c6a42bdb4b50e2e1da8c0febe5cbad452b28815b253ec710a70cbf8d1d9734109b4515e375dc7d49ecfc810cb70a8142ea2d7172eeb369b4d81c64983cbb30d7d24e3eff2d9fd83912c648d7e87ab18544568297191524c9c00e9c93c20e657e30aa36f68abbd394898e8f75915234275778a19c8e96a309361778a649e6e6171a105daa9266d9d016229628d90803b1420c90e66685843de6fa37fcc83029a50021d5d683a7de786ff6c0f46da0bd67803bd98db0372fc77da204b493ba0a5c53aecd1f23758dcb640757c0a7b30d6ad5c2cc4aa92137853dc37c32949828f1bd247fe564706cfc3dd777f1d0f94ba46a7acbf6600765cf2b09811b89a7966d606b80d0dbc13d45cfebf04ecb549065c44d450c0ac3c3efd794150a4399b7e03939a1fe0246ea3b8a65f1975b3dfd75a315fa7eb74ae1952b5469eb630db4c98b5ded682eea5fcc802328b609c01522003e5ce6d1ed66ce938748b719ede182e157defe8eecbf4b6ff00021b7a6e2179341ff6e073f81137251dc61cca6821fbf8c1f498e8dc2e2048a78a5bc1ffc5c667ca373df0e34f039d786cffb82458dd8457822d51f5d9982af5a0cfc10cfe5fd2d606fe2cf90666964b22f68a2c11476179a8f33c0a5d2f5df6f9de152f209944bf692421a6c0c2c323058dd1be758dde53b8f24c371ae584d008a332ef8be48a9c3b9135c133ce2d84073d48ddeb0e79d5b632eef25a6f419f9b939e55094bbe8c916648ee24704624907758b53d18beaa6d13cd74bf2b1aedd197ed4f664ccf4dd6da57783a83ec302a64e223c55dabe964da1b97c6b0eab4005c0ab4fbbd9b59a584a6f728d802d038b4cfc70dbc62c199837b4df315a93733e72c7330cab72b2f43d55fd56582f8d1dc8ebb77d5cb935654a84796e10036e936c4de97c3d30fefdfce8329afe6922b560ece7ceaaa57bd103b73757c672bf6f3aad0799e46adc813809e91da82f431c1b618f00802413fb1bc66419f4f8ea4381acca288d17a42915e6d9ebfa6e85a984d76a1c29f1e689092bea822ec25b1960d0cd39556ecba204a8f168988039d8ba6cd3f8d02e705760f1d48333b3dcbe2491f56eecc11b1b9a5ea69358f8de8d633431b44388f7ec8be24a464e5c22e0ca72f6399458355ff2645c79c63de161a197c6a3994cea41ee1273b17fb6c4e3af99d6a6c096a4f6550788a7748fc6d9ad5708b0275a86762987b53279707bdedfed5245291b38145c0ba4b6d57fadb6d83aa76c365d70b54b278177bc49b6d85bb6615a934737fcb03c1994c289fec191211764da2a991de85cb4c2ce172f3c75860ee7fd078c5dce7a85daef1f29d94d2c3ff8f1b3595b6de755591da840fac2fd7922528f822b2aace9e67bd15aa6fa13bc79a4ac5122b6e8c8de76631441b97133d098cd65b5873e2c1459a582569bb66ea57ecd91a0c162328407f29d25f98a52c116408e6326f1683de7e5e33550f5a66b7687405eec4021ac72b896bfe0654dc6003a1b4a06f7ee76788ea5000ca1dbc41edfd75a236402b4b6d6b82480aa461f4d6d060d9df14f6699c02aa9617e5abe442c09d3e57aae7cb16e48f0bf0debc498e070eaf50bceb994b277e16a23beee2fdffc74eba7fe6665a2891c8bce9f646113bb263cdecfc04acef0050a881c3c092994d9a62c971840028fbf6ce0ecf12a6472d37d5aea34ffd1927c28f661d514069fb4029dbbd07e524dac908038db7ba4b786a16b4dad789ac619e67a7ac5db87e4dcafa41af9e9da64c6f4d38ff9ba93aa5e1af983c7479918852e914fde7604ae696cce95e2971904cd03a34053004b5ed9aaaa8feaa34b1ea897889ad2e53a3baa298b0b5d26c22964e22b1e33831ab06635b62c1c0af8621b874a8167b7e6c31465e17a0d38d39815e0d9db3132ea81ec0314ccab34f0af72916493263dcdb466ff6284831a768e5f3b56ed377f5f3794228c1df7758ffbac24f0b22f4d90ccfccd3f421d05c7a33264505d5336652feed94811c49447042aa4527238b14b55a938b0904f770fa29faed13edcd2be1fe9e12ec40ba806ec2d067591045ba0ea9c6b328d63a56ba072598b3b9af05c2afbcfb74481401c1915e737fc7f28ec69f2be32d2f9e72f7311d047d50e0d0374a518c948dd73d8ac05f80c485a1443b182bacfbc51de76c59e1b3d894cd5f2526cd3f2a974f1c0e251f9339c320669a6ccc0fff39d82f435d1a600aaed52776566570361772e817913789ea4b2efe44d675f0e84a28f2f3a2b9cbb2b1a252dac5a529205d3b2cb2a33cc4f8f49fed48b434e45a8d49dd22698fce425b966cc30db5857a06c68fdbbdf44e1c253cecfbe13e4542880b01c3fdc1162c6c26958ead3e4bba5caabbac7afe430147c231dcf5352ebfcc89b5c6b94c4fa61cf95b748e3aa88172a0fa1a9141df98f7308dc81f5648f9b7579e0f7ab3af23a39e4cc9bdfa839ec22162d4d0aa618696b6aecc11693be2dba33c938a4d486ac5d82e402a6c17e032dc8d7347da9ec83de27a1dd1ac1afe188eff39818f6d4fd62ce97273edd9504ac2370f2fe847d12ad4375b6650a8fc317d73f7d72d2220f17e6bdf058280e9d6c38491e2c4c10d676654754151a61fd5b5193586df6f8885f568a426850e2c5dc3b97a468bcdc99a12ed3871918f874acecb7882dd70ca29f955dae25edce205c1fac7abe1187b71af3a2665a6653a4d73e92629e0a5325456e7f35f3ca107033891227c72692ca8ea92c7d50b56eb8ee9e33c0a879cf615756a4f9c2782f9731c94acf0d096810af8d4a1e48562f0b31a09df0e46afb210ed23070b48182871105659d1c9bfd1187dab1c9590eea46f1e9b96fb15b036b9fd09adbaa5eb582c1f147f3ed0746bf6da8d88d3b5751bd7a2d7b76d34ee8c9569c478bbe4995bb898fcc209e9e87e94913a93382616b08aa17c3f34c79c00802f97e71762c4f111333f05554bace9137f440b0ae9b0b08849bab6aee64211ee389e9ec6cee533f71340da9407a4f52ac93080cfd281d34a4430135bf9646297f9371306b0bb27d666ddf097151734ea9094c1a6f25d15ba350558e10becc7519826918bd6dd7dad358a7b5db2caf160539bbe694f25eb2ff52b33dc48241bcffac5576dfe2cb326ba9c8678cf80919602bd1e8380810f43503efe3cbe13f21876bbe256690068b643f5c7d35c63d4effce90545518ba13472d4531ae8f52bf7ae0b585ae04b4b4e2acb16943e16f7f9ead9fee2e965b7e1e1e6cecb8d779164514f1cc27c37e8bcd2bd68f84dcde5bc2231e3cf04de51b257a77675b80c8c1de15af78dbbc4d8d1ed764ce9964d33b72ffca8515344a0954ec6ca529db572c242bf6f7822c9e28d16bd02914cae7ff46856704be1ccfdc2f64cc26901567a21143ba36ea923cc9681545ffba3cb8e36cf559d63afadeda44a5db51eba3608b2566f994327dc34d83fc6e81ca318542ea60d68e232f5b233c76a105bcd3b4fe6c8f7c143777b83afe97071bfaa12be2dbd3336e8fc857682f2331f64e999a98aebdca07d5f6287d13d17e9e0553984a1529d2189bca44ddba0691ea7798fb82bd6f04842e6588fd9c69550c584149e168a75e164b1ccda353266d69e30352c6d633a752664e2d8d3768dd69e620e818939f333a2246ceb02c5b1cbafa800ddd3e0293d2ce82d4f61", 0x1000, 0xc0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) 11:40:04 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x7}], 0x2, 0x0) 11:40:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x7fffffffffffffff) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="00000000000000000000000000000091"}, 0x1c) 11:40:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x22, 0x63) 11:40:04 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2aaaaaaaaaaaac84, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) 11:40:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x23, 0x63) 11:40:05 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x3}], 0x2, 0x0) 11:40:05 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) fdatasync(r0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000040)={0xf, 0x102, 0x6, {0x8, 0x4, 0x100000001, 0xfffffffffffffffb}}) 11:40:05 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x700}], 0x2, 0x0) 11:40:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000080)=0x7c) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={r6, 0x7}, 0x8) ioctl$CAPI_INSTALLED(r1, 0x80024322) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x24, 0x63) 11:40:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x25, 0x63) 11:40:05 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x3f00}], 0x2, 0x0) 11:40:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) r5 = fcntl$getown(r4, 0x9) syz_open_procfs(r5, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000000)={@empty}, &(0x7f0000000040)=0x14) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000c4"}, 0x1c) 11:40:05 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x300}], 0x2, 0x0) 11:40:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x26, 0x63) 11:40:05 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x7000000}], 0x2, 0x0) 11:40:05 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000000)={0xfffffffffffff433, 0x400, 0x1}) 11:40:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000040)=0x1) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000000)={0x3f, 0xffff, 0x8b}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000100)={0x0, 0x0, [], @raw_data=[0x1, 0x1, 0x7, 0xbe7d, 0x8, 0x1, 0x6, 0xfffffffffffffffb, 0x8000, 0x6, 0xfffffffffffffe00, 0x3, 0x20, 0xa4e2, 0x1000, 0x24, 0x200, 0x3ec, 0x8000, 0x2, 0x2, 0x1293, 0x8, 0x7f, 0x5, 0x5, 0x80000000, 0x6, 0x5, 0x6a2, 0x0, 0x400]}) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:05 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x3f00}], 0x2, 0x0) 11:40:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x27, 0x63) 11:40:05 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x3000000}], 0x2, 0x0) 11:40:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x28, 0x63) 11:40:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x2) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:05 executing program 5: r0 = shmget(0x2, 0x4000, 0x800, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)=""/176) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000f5"}, 0x1c) 11:40:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x29, 0x63) 11:40:06 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000040)={0x7b, 0x0, [0x2, 0x0, 0x8, 0x100000001]}) 11:40:06 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x3f000000}], 0x2, 0x0) 11:40:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) sysfs$1(0x1, &(0x7f0000000040)='\x00') connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000080)) sendfile(r3, r2, 0x0, 0x100) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000000)={0x3, 0x400, 0x3, 0x5bae}) syz_open_procfs(0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000100)={0x77359400}, 0x10) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:06 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x3f000000}], 0x2, 0x0) 11:40:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2a, 0x63) 11:40:06 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000040)=0x7f) 11:40:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000000)={0x4, 0x0, 0x3f, 0x0, 0x400}) r4 = socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x400, 0x121c0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_EDIT(r4, 0x0, 0x483, &(0x7f0000000040)={0x62, @remote, 0x4e24, 0x2, 'lblcr\x00', 0x0, 0x10000, 0x6}, 0x2c) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) sysfs$3(0x3) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2b, 0x63) 11:40:06 executing program 5: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x319000, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x7f, 0x10000) kcmp(r0, r1, 0x7, r2, r3) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000180)={0x4, 0x1, 0x5, 0x3a, 0x2}, 0xc) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2c, 0x63) 11:40:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr="000000000000000000000000000000cf"}, 0x1c) 11:40:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) fchdir(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000000)=0x401) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:07 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x400, 0x20000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffff5, 0x7}, 0x10) 11:40:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2d, 0x63) 11:40:07 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x700000000000000}], 0x2, 0x0) 11:40:07 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x300000000000000}], 0x2, 0x0) 11:40:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2e, 0x63) 11:40:07 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) 11:40:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x389) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2f, 0x63) 11:40:07 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', '{\x98ppp1({\x00'}, 0xe) 11:40:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x30, 0x63) 11:40:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x31, 0x63) 11:40:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) r5 = syz_open_procfs(0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x3) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000040)={r6, 0x80000, r5}) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:08 executing program 5: semget(0x2, 0x3, 0x200000000000004) r0 = semget$private(0x0, 0x3, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400000, 0x0) ioctl$int_out(r1, 0x5462, &(0x7f0000000200)) semtimedop(r0, &(0x7f0000000080)=[{0x0, 0x2, 0x800}, {0x0, 0x40, 0x4000000001800}, {0x2, 0x7fff, 0x800}, {0x4, 0x40, 0x1800}], 0x4, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r2, 0xab08) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x117, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r3, 0x3c, 0x0, @in={0x2, 0x4e24, @remote}}}, 0x90) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000240), 0x4) [ 1075.564160][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:08 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x3f00000000000000}], 0x2, 0x0) 11:40:08 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8002, 0x85) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000000040)) 11:40:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x32, 0x63) 11:40:08 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x3f00000000000000}], 0x2, 0x0) 11:40:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x440000, 0x0) [ 1075.717628][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x33, 0x63) 11:40:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:08 executing program 5: semtimedop(0x0, &(0x7f0000000240), 0x0, 0x0) 11:40:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000000)="20a718b0c95ccb89065e865033752dcc1dcc543925db89ad2eac798e636bff3fb4a2bb0d09") ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x36, @multicast1, 0x4e22, 0x3, 'none\x00', 0x20, 0x9, 0x4c}, 0x2c) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1075.902256][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x34, 0x63) 11:40:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 1076.075857][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:09 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x7}], 0x2, 0x0) 11:40:09 executing program 5: socket$bt_rfcomm(0x1f, 0x1, 0x3) r0 = semget(0x0, 0x2, 0x10) semtimedop(r0, &(0x7f0000000240), 0x0, 0x0) semget$private(0x0, 0x0, 0x2) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 11:40:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x35, 0x63) 11:40:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000080)={r4, &(0x7f0000000100)=""/88}) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:09 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x3}], 0x2, 0x0) 11:40:09 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x300}], 0x2, 0x0) [ 1076.687228][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x36, 0x63) 11:40:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) r5 = syz_open_procfs(0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r5, 0xc058534b, &(0x7f0000000000)={0x81, 0xfff, 0x9, 0x80000000, 0x11c5, 0x28c}) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:09 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000001c0)={0x0, @speck128, 0x2, "e0d270dcacd7fe43"}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = semget(0x2, 0x1, 0x8) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)="80ebded5da9983c43a930403ffe6ab716e1deda66c51f635996632789483ae127e57b1a3a7b93bc59a524444d9f151922f12752384f2456f098ad6ef8f1f3714", 0x40, 0xfffffffffffffffc) r5 = add_key(&(0x7f0000000440)='asymmetric\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, r4, r5) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000140)) semctl$IPC_INFO(r3, 0x0, 0x3, &(0x7f0000000300)=""/169) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) ppoll(&(0x7f00000004c0)=[{r0, 0xa0}, {r0, 0x10}, {r0, 0xc1}, {r0, 0xc200}, {r0}, {r0, 0x1}, {r0}, {r0, 0x401}], 0x8, &(0x7f0000000540)={r6, r7+10000000}, &(0x7f0000000580)={0x5}, 0x8) fstat(r0, &(0x7f0000000280)) chown(&(0x7f0000000000)='./file0\x00', r1, r2) 11:40:09 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x700}], 0x2, 0x0) 11:40:09 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x3f00}], 0x2, 0x0) 11:40:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x37, 0x63) [ 1076.897079][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1076.960942][T12589] Unknown ioctl -2146671085 11:40:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:09 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x3000000}], 0x2, 0x0) [ 1077.004666][T12589] Unknown ioctl -2143244641 [ 1077.043440][T12589] Unknown ioctl 21591 11:40:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x38, 0x63) 11:40:09 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x3f00}], 0x2, 0x0) 11:40:09 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x3, 0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) r4 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0x8, 0x4002) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x8000}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000100)={r5, 0x8}, 0xc) sendfile(r0, r1, 0x0, 0x6) r6 = syz_open_procfs(0x0, 0x0) ioctl$UI_SET_SNDBIT(r6, 0x4004556a, 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000240)={r5, @in={{0x2, 0x4e22, @local}}, 0xc, 0x2a1e, 0x800, 0x7, 0x1}, &(0x7f0000000300)=0x98) ioctl$KVM_INTERRUPT(r6, 0x4004ae86, &(0x7f0000000340)=0xff) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xda2, @rand_addr="0fbbad312633a6824fc60fe9fd64006d", 0x8000}, r7}}, 0x30) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000380)=""/253) [ 1077.112099][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:10 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) getsockopt$rose(r0, 0x104, 0x6, &(0x7f0000000040), &(0x7f0000000080)=0x4) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x200, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x39, 0x63) 11:40:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10100, 0x0) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) keyctl$read(0xb, 0x0, 0x0, 0x0) r5 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="f09f0bd31f9dd38d9cfbe10a77fbe29843659953f89698", 0x17, 0xffffffffffffffff) keyctl$invalidate(0x15, r5) 11:40:10 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x7000000}], 0x2, 0x0) 11:40:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:10 executing program 5: semtimedop(0x0, &(0x7f0000000240), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20200, 0x80) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r1 = getpgid(0xffffffffffffffff) ptrace$setsig(0x4203, r1, 0x40, &(0x7f0000000080)={0x10, 0x10000, 0x10000}) 11:40:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a, 0x63) [ 1077.442318][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:10 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x3f000000}], 0x2, 0x0) 11:40:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3b, 0x63) 11:40:10 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) getitimer(0x1, &(0x7f0000000000)) 11:40:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000000)={0xde9, 0x34565559, 0x8, 0x3, 0x3, @stepwise={{0x9, 0x5}, {0xfffffffffffffffc, 0x6}, {0x101, 0x5}}}) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3c, 0x63) [ 1078.001396][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:10 executing program 5: r0 = semget$private(0x0, 0x3, 0x80) semtimedop(r0, &(0x7f0000000000)=[{0x2, 0x3ff}, {0x2}], 0x2aaaab2f, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000200000000003cd7bc7f000000000000fafffffffffffffffdffffffffffffff00f0fa040000000000000000000000000000000000000000000000000000000000000000000000000101000000000000ef0c000000000000fcffffffffffffff204ec91f000000dcb7edd7292da33b5ce030000000000000000000000000000000000000000000000945efceae0676f86f89e30790f83389c511b048ad99a5dd4e3a0424985f98d0118b8467bb3261d4d5fcffecf190870ff1"]) 11:40:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 1078.243304][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:11 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x3f000000}], 0x2, 0x0) 11:40:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3d, 0x63) 11:40:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x0, 0x0) connect(r4, 0x0, 0xffffffffffffffc4) r5 = request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='/delo\xff\a\x00', 0xffffffffffffffff) keyctl$invalidate(0x15, r5) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:getty_log_t:s0\x00', 0x21, 0x2) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000180), &(0x7f0000000200)=0x4) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r6) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000500)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) connect$packet(r1, &(0x7f0000000400)={0x11, 0x19, r7, 0x1, 0x2}, 0x14) r8 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x10000, 0x0) sendfile(r1, r2, 0x0, 0x2000006) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$UDMABUF_CREATE(r8, 0x40187542, &(0x7f00000003c0)={0xffffffffffffffff, 0x1, 0xfffff000, 0xfffffffffffff000}) ioctl$TIOCGSID(r8, 0x5429, &(0x7f0000000240)=0x0) rt_sigqueueinfo(r9, 0x0, &(0x7f0000000280)={0x10, 0x4, 0x40}) 11:40:11 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x7d, 0x10, r0, &(0x7f00000000c0)='.\x00') semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:11 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x300000000000000}], 0x2, 0x0) 11:40:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3e, 0x63) 11:40:11 executing program 5: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @local}}, 0xfff, 0x7fffffff, 0x5, 0x3, 0x6}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e20, 0x1ff, @local, 0x7fff}}}, 0x84) 11:40:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0xe3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r1, r2, 0x0, 0x2000006) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee1, &(0x7f0000000040)={0x0, 0x4fa, 0x0, &(0x7f0000000000)=0xbde}) r6 = syz_open_procfs(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r6, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x3, r7, 0x30, 0x1, @ib={0x1b, 0xfff, 0x2, {"76f21ceaeef69077c6c877ca50e47645"}, 0x3, 0x7, 0x7}}}, 0xa0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000100)={0xa, 0x1, 0x2011, 0x3}, 0xa) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x41, 0x63) 11:40:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:11 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) socketpair(0x17, 0xa, 0x25, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000040)={0x6, 0x6, 0x20a, 0x3f, 0x8, 0xff, 0x7fff, 0x1000, 0x0}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e24, @loopback}}, 0x100, 0x3ff}, &(0x7f0000000180)=0x90) 11:40:12 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x700000000000000}], 0x2, 0x0) 11:40:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x42, 0x63) 11:40:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) ioctl$RTC_AIE_OFF(r1, 0x7002) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:12 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x3f00000000000000}], 0x2, 0x0) 11:40:12 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2040, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000040)) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x43, 0x63) 11:40:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) seccomp(0x1, 0x0, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xd9, 0x10001, 0xab, 0x9}, {0x8, 0x10000, 0x7f, 0x9}, {0xffffffffffffff80, 0x10, 0x100000001, 0xfffffffffffffffb}]}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000100)={r5, &(0x7f0000000040)=""/70}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x44, 0x63) 11:40:12 executing program 5: r0 = semget(0x2, 0x0, 0x60) semtimedop(r0, &(0x7f0000000080)=[{0xfffffffffffffffe, 0x7e, 0x2800}, {0x8000000002, 0x2002000000000000, 0x1000}], 0x2aaaaaaaaaaaaac4, 0x0) 11:40:13 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x3f00000000000000}], 0x2, 0x0) 11:40:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='/delo\xff\a\x00', 0xfffffffffffffffe) r5 = add_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000200)="6a20825f4f45add8010f2620b0898eb062710e33ca033dc63c4d9fdf4b84f2e66d2f84b9ebb0e8bfd824c784cef56baff0d43d9575c2ec72b5dc2bbe2856ba230125d8cf271a63dfb2a224cb5e", 0x4d, 0xfffffffffffffffe) keyctl$read(0xb, r5, 0x0, 0xfde5) 11:40:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x45, 0x63) 11:40:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:13 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x3}], 0x2, 0x0) 11:40:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x100000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x20000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f0000000740)={0x40, r1, 0x300, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="77177277c39d08e2c154004a47170713"}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x8800}, 0x8000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0xfffffffffffffeae) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x301000) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') accept4$alg(r2, 0x0, 0x0, 0x800) lstat(&(0x7f0000000600)='./file0//ile0\x00', &(0x7f0000000640)) lsetxattr$trusted_overlay_origin(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x0) rename(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file1\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e20, 0x0, @remote, 0x1}}, 0x400, 0x7, 0xa53, 0x7, 0x2}, &(0x7f00000009c0)=0x98) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x2, 0x840) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000100)={0x146, 0xc, 0x4, 0x0, {0x0, 0x7530}, {0x7, 0x9, 0x0, 0x1ff, 0x80f, 0x9, "3f281779"}, 0x5, 0x3, @userptr=0x1, 0x4}) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x208000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000040)={0x48, @time, 0xfffffffffffffffc, {0x3, 0x401}, 0xfff, 0x1, 0xb249}) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x1800}, {}], 0x2, 0x0) 11:40:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x46, 0x63) 11:40:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0xffffffff) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r1, r3, 0x0, 0x2000003) openat(r1, &(0x7f0000000040)='./file0\x00', 0x40000, 0x80) syz_open_procfs(0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000200)="371e4e17cacf86c92ab5ea139f525c8aad6d8773cca1446bb293071d22afa03be0f1485bc73b3b12835eaa7e3fc3a28cbece76942ed02764735ceedb1f3a79ce7cc851fc00bae6e2a87df126f502027981478eae008ca35cd3817bdab43eb74cd6d72604ffc6f4060f8f0a04eb03ce36474abd935715ee6117da0f14bf750ca6c680d83c82287f5431fc78b61441e44ba6923280ad2f544d0a18597694cc31747d1967f1c35099115863e3e5accb03b4a71bfeae0f", 0xb5, 0xfffffffffffffffb) r6 = request_key(&(0x7f0000000140)='.dead\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000002c0)='/dev/loop#\x00', 0xfffffffffffffffb) keyctl$read(0xb, r6, 0x0, 0x73c) [ 1080.907273][ C0] net_ratelimit: 6 callbacks suppressed [ 1080.907284][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x47, 0x63) 11:40:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x0, 0x20}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000300)={r5, 0xffff, 0x20}, 0xc) r6 = socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000340)={0x3e, 0x0, 0x4, 0x8, 0x4, 0xffff, 0xfffffffffffffff7}, 0xc) r7 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r7, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r7) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x8, 0x20, 0x0, 0xffff, 0x4}) sendfile(r1, r2, 0x0, 0x2000006) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000080)) gettid() ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r1, 0x0, 0x8, &(0x7f0000000140)='/delo\xff\a\x00'}, 0x30) fcntl$getownex(r6, 0x10, &(0x7f0000000200)) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) syz_open_procfs(r8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1081.097504][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:14 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x7c38) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4000000004e20, 0xff, @mcast2, 0x8003}, 0xffffffffffffff98) close(r2) accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x48, 0x63) 11:40:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:14 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x7}], 0x2, 0x0) [ 1081.279714][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:14 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x300}], 0x2, 0x0) 11:40:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x49, 0x63) 11:40:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000140)='/delo\xff\a\x00', 0x4) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) r5 = syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r5, 0x40046411, &(0x7f0000000100)) recvfrom$inet(r1, &(0x7f0000000040)=""/103, 0x67, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_PARM(r5, 0xc0cc5615, &(0x7f0000000380)={0xb, @capture={0x1000, 0x1, {0x200, 0x2}, 0x3de, 0x3ff}}) keyctl$read(0xb, 0x0, 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000180)=0x5, 0x4) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) 11:40:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x8000000100079) r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0xfffffffffffffffc}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) [ 1081.845613][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x4a, 0x63) 11:40:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x4b, 0x63) 11:40:14 executing program 5: clone(0x900, &(0x7f0000000000)="3dfffb6f3d99eeb60729cbdf5ac6d15c064213d55a58c4701417900f67b843ff42ea484593dd4ea04ffce497b7e11cc2e735edecbcd2881f2580a835253bf332b2f5d2546a1d34eaaccb89eda56dedaf8aa750d8140ec89c2ebc72e5ea75ea9b927ab876936977cd3c90249788bd3d55071b149d691cc55816e62c31da8d9a7ea0dc3d2ee3cde692ed", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x800000000000000, 0x2000) write$FUSE_STATFS(r0, &(0x7f0000000280)={0x60, 0xffffffffffffffda, 0x1, {{0x5, 0xfffffffffffffffb, 0x8, 0x0, 0x0, 0xffffffff, 0x101, 0x7fff}}}, 0x60) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1020880}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="e50100002ec5ece3be954bfe17a620840720", @ANYRES16=r1, @ANYBLOB="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"], 0x16c}, 0x1, 0x0, 0x0, 0x1}, 0x4000001) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e21, 0x8, @mcast1, 0x1}}, [0x9eaf, 0x3, 0x101, 0x3f, 0x1, 0x8001, 0x4, 0x20, 0x2d, 0x10001, 0x0, 0x9, 0x19, 0xa9c6, 0x8]}, &(0x7f0000000540)=0x100) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000580)={r2, 0x3f, 0x3, 0xffffffff00000000, 0xfffffffffffffff9, 0x6}, 0x14) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x3) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) [ 1082.023274][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:15 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x700}], 0x2, 0x0) 11:40:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x4c, 0x63) [ 1082.193085][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:15 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x3f00}], 0x2, 0x0) 11:40:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:15 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = socket$inet(0x2, 0x0, 0xca1) r1 = gettid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) sync() r3 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x80) perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x8000, 0x4, 0x8, 0x4, 0x0, 0x8, 0x2000, 0x2, 0x8000, 0x10001, 0x1, 0x7f88, 0x4, 0x9, 0x774, 0x8, 0xff, 0xdf0, 0xff, 0x40, 0x0, 0x91, 0x2, 0x5, 0x401, 0x9, 0x1000, 0xbac, 0x80, 0x5, 0x101, 0x8000, 0x8001, 0xffffffffffffffff, 0x10001, 0x34d, 0x0, 0x6, 0x3, @perf_bp={&(0x7f0000000100), 0x2}, 0x2, 0x5ea540be, 0x4, 0x1, 0x0, 0x9c5, 0x6}, r1, 0x5, r3, 0x8) r4 = getgid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={r1, r2, r4}, 0xc) 11:40:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x4d, 0x63) 11:40:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x2000000000) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) r5 = syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x4, &(0x7f0000000340)=[{&(0x7f0000000080)="111548d7e8b2a927509a17d886ba11702b", 0x11, 0x100000000}, {&(0x7f0000000200)="82597a9971278b74e3549e3d2c3eb103f41515a12f47defc6f10e494b26f23c5070a10317a555cd82fcc6801c86385c1f36a63ed11c75e938436704aa0cc2ec0c23b3d0c4e20943390204b68b6b4389c5e886e9b015e706df0e7a9739418189435ed17dfa87878feb5b1a96d7913e7c6e76ba0b33928c0cafec5079af41892ced05672fcbafd7ab9d1ef7c2f24564a35f11de6bdf957b8e8e39ae7cb9916afa3ca22c27be9fdf291f67be3fb451f4028ca5b60d32e1e0a27df570ad951995ccb22b9", 0xc2, 0x8000}, {&(0x7f0000000100)="2fa813f97e981cbea3d11a58947c368dfa1fb6a84ef7b3d2cfc1d0bc3eda3fffda340452d12ad88a2b9d7dea824c4a71339b037efc8266006594c4e042c33bbe61c0e195db120131fb480c626799151e3e6a8ed7d22aaa56eacbef1decafa9911ad546ef658662ee35824259729bc0a1079ae6db263d115ed7c318cad9d5088664cacef3b1df84e152d701b1d0d4c3b64fc5562ca27b749ffbaa7f5259cd79c39f217cadbc50ec00b3576c747ad70a8850138361", 0xb4, 0x1000}, {&(0x7f0000000300)="cd44595e211eff1271c3be369871e0440c35b36df230e1da937cced4aa45fd4ba3e0c4a7ff03708ef68e297d488084657479aa7d919e0c558b9e2d", 0x3b, 0x4}], 0x1040, &(0x7f0000000580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@utf8='utf8=1'}, {@nonumtail='nnonumtail=1'}, {@shortname_winnt='shortname=winnt'}, {@utf8no='utf8=0'}], [{@mask={'mask', 0x3d, '^MAY_READ'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@euid_gt={'euid>', r6}}, {@appraise_type='appraise_type=imasig'}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@hash='hash'}, {@uid_gt={'uid>', r7}}]}) 11:40:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x4e, 0x63) [ 1082.817413][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:15 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x3000000}], 0x2, 0x0) 11:40:15 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200000, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000080)={0xffffffffffffaa72, 0x4, 0x400, 0x87, 0x11}) 11:40:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x4f, 0x63) [ 1083.012699][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:16 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x3f00}], 0x2, 0x0) 11:40:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = msgget$private(0x0, 0x1) msgctl$MSG_STAT(r5, 0xb, &(0x7f0000000080)=""/50) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0x3ff, @empty, 0xffffffffffffffff}, {0xa, 0x4e23, 0x20, @rand_addr="ea80f2fec4cb7047ee07309b3994c014", 0x2}, 0x7, [0x4, 0x4, 0x5, 0x1, 0x200, 0x100000001, 0x5c, 0x95a]}, 0x5c) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r6) sendfile(r1, r3, 0x0, 0x5) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x50, 0x63) 11:40:16 executing program 5: r0 = semget(0x1, 0x0, 0x288) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0xfff, 0x1000}, {0x7, 0xa8, 0x1000}, {0x4, 0xfffffffffffffffb, 0x1000}, {0x2, 0x7, 0x1000}, {0x7, 0x5, 0x1800}, {0x4, 0x9, 0x800}, {0x1, 0x7f, 0x800}, {0x3, 0x10000, 0x1800}], 0x8, &(0x7f0000000040)={0x77359400}) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.', 'cgroup^vboxnet1vmnet0}/+em1)/l{\x00'}, &(0x7f0000000100)='eth0system)\x00', 0xc, 0x1) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x51, 0x63) [ 1083.168176][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:16 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x7000000}], 0x2, 0x0) 11:40:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x52, 0x63) [ 1083.321838][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:16 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x3f000000}], 0x2, 0x0) 11:40:16 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x441, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x1) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000140)=""/193) 11:40:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000040)={0x100000001, 0xffffffff}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) prctl$PR_SET_DUMPABLE(0x4, 0x1) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x53, 0x63) 11:40:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x54, 0x63) 11:40:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x55, 0x63) 11:40:16 executing program 5: r0 = semget(0x1, 0x7, 0x102) semctl$GETPID(r0, 0x0, 0xb, &(0x7f0000000000)=""/16) semget(0x2, 0x3, 0x0) r1 = semget$private(0x0, 0x0, 0x10) semtimedop(r1, &(0x7f0000000080), 0x0, 0x0) 11:40:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000000)=0x9) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') shmget(0x1, 0x1000, 0x800, &(0x7f0000ffe000/0x1000)=nil) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x902000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="040028bd7000fcdbdf2504000000f8a259c81d01000400010000000800050004000000c78ef7ffc084a791665fdcce0faa44b16b71654983cb08000600ffffff7f040001000800"], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:17 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x3f000000}], 0x2, 0x0) 11:40:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:17 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x300000000000000}], 0x2, 0x0) 11:40:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x56, 0x63) 11:40:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000002c0)={{0x1ff8199b, 0xf21}, 'port0\x00', 0x20, 0x100000, 0x7fc000000000000, 0x80000001, 0x4, 0x80d, 0x298909f, 0x0, 0x0, 0x4}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@random={'osx.', '/delo\xff\a\x00'}, &(0x7f0000000500)=""/234, 0xea) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000400)}, 0x10) socket$inet(0x2, 0x5, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r6 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r6) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$FIDEDUPERANGE(r7, 0xc0189436, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000000000000000000000100000000000000", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00!\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendfile(r2, r3, 0x0, 0x2000006) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000040)=0x3f, &(0x7f0000000080)=0x1) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:17 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x55c) 11:40:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x57, 0x63) 11:40:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:17 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000080)=0x80) ioctl$sock_bt_hci(r0, 0x400448fe, &(0x7f0000000180)="bc66a2a77978981e4594e260165ceb14dc724c2a920825da9bc443") ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x241, 0x0, 0x0, 0x0, 0x74eb, &(0x7f00000000c0)='irlan0\x00', 0x3, 0x0, 0x4}) 11:40:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x58, 0x63) 11:40:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:18 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x700000000000000}], 0x2, 0x0) 11:40:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x1c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) r5 = syz_open_procfs(0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f0000000000)={0x100000000, "22ec35fe34da1a6e85dacad1404ccb47de33756dfaba18219a48b1f8ca78840f", 0x3, 0x3, 0x7, 0xe0, 0x200}) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:18 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x3f00000000000000}], 0x2, 0x0) 11:40:18 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = semget(0x2, 0x0, 0x100) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) write$P9_RSYMLINK(r1, &(0x7f0000000040)={0x14, 0x11, 0x2, {0x4e, 0x4, 0x8}}, 0x14) write$FUSE_INTERRUPT(r1, &(0x7f0000000100)={0x10, 0xfffffffffffffffe, 0x1}, 0x10) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000000)=[{0x4, 0x8, 0x800}], 0x1, &(0x7f0000000080)={r2, r3+30000000}) 11:40:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x59, 0x63) 11:40:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r5, 0x0, &(0x7f0000000040)=""/87) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x5a, 0x63) 11:40:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:18 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x414200) getsockopt$rose(r0, 0x104, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000100)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendfile(r2, r3, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x5b, 0x63) 11:40:18 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20100, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x10, 0x0, &(0x7f0000000040)=[@clear_death={0x400c630f, 0x0, 0x4}], 0xd7, 0x0, &(0x7f0000000080)="d0fe5ac0f3403ff05356b91498a0603d0bff797a09d9063beffeee6a07715f8ca4859f883425a4d43e48ef075577f786c373484fde20cdde25379fafe39b14eb16117d8e50604852ac03d32f0440a538faadd8857f8c29c4a6bbc8e0e263240d08576b2ee9bddace1b431ff6c87e4be5d477422b9f0e0ddbcf4a65cf2eb3e9c523fc5d13cf0ec5e321b5f1aeaa58734c9377963232e53ac68dbb3ab1a26fe8c602ae7ad69584a80af4c7a66334864065de0f49fc899aacbca1ed3dc18fd2dbe3c451124a57bf751f37126075a65cd424e7cffef8d1f622"}) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x20000000}], 0x2, 0x0) 11:40:18 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x3f00000000000000}], 0x2, 0x0) 11:40:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 1086.062907][ C0] net_ratelimit: 8 callbacks suppressed [ 1086.062918][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:19 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x3, 0x0) 11:40:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x5c, 0x63) 11:40:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x2000006) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r4, 0x800, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'bcsh0\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000000)=@netrom) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000680), 0x4) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000040)={0x7a1, 0x2, 0x7ff, 0xffffffffffff7fff, 0xfffffffffffffffe, 0x2}) r5 = mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x2010, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f00000000c0)={0x0}) r7 = mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x80010, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000005c0)={0x104, 0x0, &(0x7f0000000340)=[@request_death={0x400c630e, 0x3, 0x4}, @clear_death={0x400c630f, 0x1, 0x1}, @acquire_done={0x40106309, r5}, @clear_death={0x400c630f, 0x4}, @acquire_done={0x40106309, r6, 0x4}, @request_death={0x400c630e, 0x4, 0x1}, @transaction={0x40406300, {0x1, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000240), &(0x7f0000000280)=[0x38, 0x20]}}, @transaction={0x40406300, {0x2, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x20, 0x30, &(0x7f00000002c0)=[@fda={0x66646185, 0x6, 0x2, 0x20}], &(0x7f0000000300)=[0x58, 0x60, 0x20, 0x0, 0x38, 0x0]}}, @acquire_done={0x40106309, r7}], 0xa5, 0x0, &(0x7f0000000500)="8f5a88618c1f9b1aa9c3b39984d89193259ef15699ca8f77b986a17bb6359b5bbfb7c968ed120bb83943450a0788a6715edb6a15b74f10810c58178783faa02ae498b09a046d68c16e5656010a946faae0e41405f677aad99d4ee3ac23460fe5c8a03a574b5998c288ba5c9bda658e7e329dc787c7fa7d57d79f55b944dd0ca96e23827aaeca6c4ba3e3ade8b6deaf8a9191c627de7f8f11f35a6a839f1d059e394e54bffc"}) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000240)=0x5) modify_ldt$read_default(0x2, &(0x7f0000000600)=""/100, 0x64) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:19 executing program 5: semget(0x3, 0x1, 0x421) r0 = semget(0x1, 0x0, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000007c0)={@rand_addr="4d69808514f9466896e497598a67de8d", @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @mcast2, 0xff, 0x0, 0x80000001, 0x100, 0xdcde, 0x4a, r2}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000040)={0x9, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) semtimedop(r0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x5d, 0x63) [ 1086.560847][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:19 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) 11:40:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f0000000100)='+'}], 0xe4, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) r5 = syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r5, 0x28}, 0x10) 11:40:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x5e, 0x63) [ 1086.717091][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:19 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x7, 0x0) [ 1086.963196][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:20 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x1f4, 0x0) 11:40:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x5f, 0x63) 11:40:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000200)=0xffffffffffffd721) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r1, r2, 0x0, 0x2000006) r6 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e21, 0x200, @rand_addr="d23a9d65b3d516eb7eb9437e1bb02e4b", 0x3}}, 0x80000001}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r7, 0x81, 0x7}, &(0x7f0000000180)=0xc) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:20 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000000)={{0x7, @name="f40a61e3da6602d4ce9db80f60d53c1da1e31d1a0262b21aa4bc922ab26f8c7b"}, 0x8, 0x9, 0x3f}) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x60, 0x63) [ 1087.425192][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:20 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000001980)) 11:40:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x61, 0x63) [ 1087.567645][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 11:40:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) pwritev(r4, &(0x7f0000000140)=[{&(0x7f0000000000)="aa3efa464065cb1894565d91d79475a352d76cd9d1b92415389c8bd4fe6ec8636c83c5b971f9df41e03fa61ea1a5285962c2e74ee7356dae572d36b70469305f033ccca58e11add479a17ab66180d50be0fa100e3033e314aaebbc0d4e7c4f4eed6e98b37eb5d9b30cb93f2d3309be3a4f5a26d942bd81e80022b8a65a8edac63a8bc0a49b0d420499710f73a2", 0x8d}, {&(0x7f0000000100)="5210974d3a273705db0ba3f193a7e7e276350193f0319334d0a543dc3a69c3b52b9d377fcc19dc", 0x27}, {&(0x7f0000000200)="98afacd07595f258dc191ce97172ab3582ac6c2ebbe68574ab0cda7a4f0ef651ea9f596db8b8b9b45a5e70eae284d0edae81d19f1e0f9e21b6509125fade48f9961935ab24770b648fd4c9bbac7ecc49bcd17305641516649a9620a6f44a4b311ee559d112cc7bf12c261daec6cd845b1e0683c9db13064f30ad704fa86ad37205cdfc21343a4dbc2d6aed053b0be7a581f5b412ad8271e720b05a3d764dc9d2234aee64632cd4f4362256245a6c70659a0c80f5bbbff603601c49c20da0b7dd0e43fc058edf7737894a524159", 0xcd}], 0x3, 0x45) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1087.736414][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x62, 0x63) 11:40:21 executing program 0: memfd_create(0x0, 0x1) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)={0x0, @reserved}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x16c, r1, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7667}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1400000000000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x528}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xc63}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfff}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffffffe0}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffff7a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x489}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x4000}, 0xc4) 11:40:21 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x1f4, 0x0) 11:40:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x2}, 0x1c) 11:40:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x301000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) getsockopt$inet_tcp_buf(r0, 0x6, 0x3f, &(0x7f0000000200)=""/255, &(0x7f0000000000)=0xff) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:21 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x46681, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @initdev, 0x0}, &(0x7f00000000c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10800000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=@getpolicy={0x30c, 0x15, 0x102, 0x70bd28, 0x25dfdbfc, {{@in6=@rand_addr="402d1eeb92461efefe7775de2986791d", @in=@empty, 0x4e20, 0x2, 0x4e20, 0x40, 0x0, 0x80, 0x20, 0x33, r1, r2}}, [@policy={0xac, 0x7, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e22, 0x81, 0x4e22, 0x0, 0xa, 0x20, 0x80, 0xaf, r1, r2}, {0x0, 0x7d0d6ef8, 0x0, 0x6, 0x9, 0xd9, 0x811e, 0xfffffffffffffffd}, {0x800, 0xbb, 0x101, 0x7}, 0x7fffffff, 0x6e6bbc, 0x3, 0x1, 0x2, 0x3}}, @sa={0xe4, 0x6, {{@in6=@mcast2, @in=@loopback, 0x4e21, 0x0, 0x4e22, 0x0, 0x2, 0x80, 0xa0, 0x0, 0x0, r2}, {@in=@rand_addr=0x2, 0x4d3, 0xff}, @in6=@loopback, {0x6, 0x7, 0xc6, 0x35, 0x100000001, 0xfff, 0x5f, 0x80000000}, {0xffffffffffffffc8, 0xff, 0x1, 0x8}, {0x50, 0x900000000000, 0x83c}, 0x70bd28, 0x3505, 0xa, 0x4, 0x0, 0x20}}, @algo_comp={0x12c, 0x3, {{'deflate\x00'}, 0x720, "7e7e119edc555e0c61c20dc6fe5f311f02de3a76ff89999448347328ab5c9f986d9800cef28e559c856ec7f4ff9af88f511d046b932654444e7417e28ff887ad5bd677b2defa1acd8a91cf6c2f487e61f37555d1e80ccc8743872714a633f25e38ba55aae23560e03d3c50e960c40f8b1075f934a31fc5c09927dc026583e4301463cc3e79abffb916a4a65014c1756dfd7d576f4cff3126d382808029f38e88599234e0b20ec3e39d8261cc51192e6b44ac5c5009e2f522829fa47a0b2e42066d256991a647f6470cea0a4424776abaf035c632fa3b5adac129a6b73e8319eda60a9104"}}]}, 0x30c}, 0x1, 0x0, 0x0, 0x1}, 0x3fff) 11:40:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x63, 0x63) [ 1088.400097][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x64, 0x63) 11:40:21 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x101040, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0x148, 0x0, 0x8, [{0x5, 0x5, 0x9, 0x0, '#&-1wlan1'}, {0x5, 0x8000, 0x0, 0x2}, {0x3, 0x3, 0x3, 0x81, '@lo'}, {0x3, 0x2, 0x8, 0x8, 'selinux\''}, {0x0, 0x5, 0x4, 0x5, '*em0'}, {0x1, 0x91, 0x0, 0x3}, {0x6, 0x7fffffff, 0xa, 0x8, 'em0selinux'}, {0x1800000000000000, 0x1, 0x3, 0x3ff, 'em0'}, {0x2, 0x2, 0x0, 0x7}, {0x3, 0x0, 0x5, 0x5, 'I!%.%'}]}, 0x148) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x3}, 0x1c) 11:40:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x44, r4, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6e}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000200)={'IDLETIMER\x00'}, &(0x7f0000000240)=0x1e) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x65, 0x63) [ 1088.578141][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x4}, 0x1c) [ 1088.730420][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:22 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x0) memfd_create(0x0, 0x2000000004) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x3ff}, {}], 0x1, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) 11:40:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x66, 0x63) 11:40:22 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xce) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0x400000) ioctl(r2, 0x8, &(0x7f0000000100)="1578ba3a2a7c5c48a766e6b0fbf479319f6df8f31ad89ca2b4040392e683701759e0737cb5ad905085dab56c8e42f257b4843e1248157ee4a56538f58fc267a3af4a9f3d311ce4083dafa3c8e84444b7c43c8c52af4462bbf72ce7ffff658902f955595044f8fd028e0390e9e3a473f0ebfd5bf10bd1dc7ac100f1c9134dafec36c5471efe3d328798359b5663f29e4f9cb611fd84ed7b22895aa86fce13e4747b99830109d71f7c48a4c344feca0c8204814b3c726965b791bc5ee7fcf4f1c51297676c3920ec3904491e59255ef79c3ae04e27d55395a52586fd67f4b2b6e37cb59238a9d47f6a8176ff856e8099680216b88488e3f87b14") ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000001280)=""/21) renameat(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') ioctl(r0, 0x5, &(0x7f0000000280)="4c08277993c35b0c4c3f276828c3be1d2260bec76a5734b9db57615268d94593f42fb7cbdeec5540a4eeff80e0018f222f7389da04cf244f7e343a47fdf4db8773990a172e1c634af755c56487758b5f844d5936f8b5944c709a50f9d77e882941cf1831eccd69b078e5269843afff27bccfad3d6a89c05edec7515bc47f626a21fcb0e56ef0282c465142a887dbfb4c24c1b60c31c0d4502a42d70807e4d966ba7d8d0b9fd0360c44935e9b90734e0b700ad72ed6676016ba5e9dbd658f8544aeb84014f7b07674aebc09f13927abf599814e6ee9bdf0205669f938ab6aaa6bee20f1d078a86bb98ec22528039b51537c14ad3040bdf5c6c261bd7bdc8cd63620f79b713f52a49ddd617b718711ae6da40447ab928169669e500d1d4871beb02e30db38fceb11bab67a4511162bad8c12ad0da466f8ab3da933cf7a81bef923c1d769edeec59f261d87f3ffa08172abdef18782a69ca117796ef5c44bb812c28c802e78b17280241c965c48b50f693944cef64451e3d5b6232aca4d92a08eb43c578997e33bf656bcd0653ad588e63576daf9ac46d9ad06f2214023ebb1ed20faff1ad333e530a0ae96c3b80bc25eb47f5271ca233245b19fb681c94c43183b28b5edb3935ece74891c084f963ee215c44ba7cf49afa2f7cf4a775ea9fe24580673c0b00a7f9288142a10fcd4d5d53f9836b036f70ef3ca740a8dd9dde72f59c62706e37cf3ac16ead4c793ea7c933e627379deeb36a9f15acf697c49fb2aaf921f5f7b4220a3f2adc839942a31fe124fe57a185f0a1e83d7fc89bde0ca03472e15aac52c07507b54dd191444cdd4ac9abcab01a155dccea753b42aece480bfb4066a1b4501a9ee57a1d61d870ad634224b4799d0e62b5b7b7de8c522faa25e69fc9ad430a7247aa423abaa4f22c2bd27c6328d66088a758af718632eb11059cf80f127c9a924a55bb785c8987611726d53351289c731a03afe8f9b3794ec9f8498835d988ce2be97c64fc5794b6bd40ad6f2573c53bdad3cdb77cccff8a90311743015bf71dce94811f2fe3aa44b481abc7ff170ded0bdcaec3217e0ad3b8fbc254250072e1b375dd2a51e4c2cf29f639d56dd4bdc0a667588922c2370c042f6a287718f61ab58ad63c1a3a4f5f0c431e18e48383341fa5ba600e5fed49ced3341b6f2c1cac4ad45fc248d58311e7f5bdb46ea8222cd12dd1159f5a11a04f4a3362eea5446f3ba2f22c43b3b9a5224c3fbb1fd9caf68473f64be1e8f46ba0465fe844485e2a1e1d6c08ffff0cf87b50b77a001ccdce4ceae749e2c694845849490b32053062ea8fc7df6b8e5a05def4a560297c46ac19e13517bd181aa399df29ccce78409eb4d36974745aaa0ce316e7adcd4416e4306e86213e1650700a82c936dd59332a97a7ea2154d54b52e1fdd0b2176ef6d78ce0a8934ddb027c445473490b3d6a07e7e538ea53eda3e62bbe12ef065834ddfbaedde9cf26164671b545051e93c1a5193837dd8286b0585848d9e71d02132587aa225c26aa1c94ef737f19198c8cbbb55246ba3d4bbd3133423e477ad01b49439b7d3d60174878ae4a762bfc2de2e38b8e7a4a54372345966671d151921fd374d8a999f0e366649e5442277f41e40a1150f78f9e9508d580aeadf17e34fa36578dd5f7e6fcaf417b5cab53ccd081d5738acc889e2fa3df4e0404092557630d4d6fbb1a8e29d656012f5b57148996e58183fea6e03dc57df5ce939359dcdb06567cb1f5c693f4cfe372d094f0d7b66e8e72a940d620427c4286e5e21d4dd1ea83372960543ff650efda0cf32ea1f1412d4869052cd54c29932997d47197a0841b97ce32adcd3c7dee753658c88f2660b77803da4153dcd3972f146a88d3dfac78e6ffa49a721140896f9bdb43141fd1ba18b9524fc0fec1269b3b7e201779889864257838482f763d05965357fdb1cebf10c5df1222d6727ee82fe3f0a9fe895ad4079d1c8b332764f08ee8fa57bcc56e5b14b3c4403272a7ac6d36bb0275f3afdbc0f5ef7bdec7a8c4ba0d2d9ad1450aa7502ecd7a1e874729110a0beefd530354a05be2afdfe3197176f2be69c69ea04f8bfece37df08a230da7b20ef802b5987dfe09fd49975c445b6d7eba7f6e923b285b1f4d39c70209afce0a1be96034975cc8c076ab4aac59b9227f75db0cc6a4b1684feae45c545954a367f755e1b226250262d3788d5f8cce6665cc2366557850c328d47da1f84c612f39cdf6356cf4d9941f091c3e7565055f1c3bc0e775453084489e5d4f34e6a21b34a39eb9cc262bc073d423d3325a9e446ab9a2f516dd15e7965ec3e5b245fe4acbb8cdbbd6d9d0a84f528794827c3ed3e87c24f17c182b18a23ccd39b704ed7abeb0d7d346f90a73b6dd0d521f616c586b347be3b55f695fe41acbd1219e70c34dd38d424d087d4b03615f2bcd1cd450d37fed278e17daef49305f566598b52c884ce4d3b7749d98cd2349c6d5ce46859cd04e9a18c51076e7598ba2a246247350ce5ee4e7709ba6cae941507cccbfeb9b12394198e05fe5abbbb49f2aed9a4b78f5a5afe2c155594bed50456e4a0ec6eb0165aef9f21093063e2a57ea49c60403337c88ce2197ad2d68217bd92655b03db533df1d9788e6f72331e166e3c32734fa59681be7dc36c847036c4dd4b6d50654b8b18d53b77d8dc796bd05cbd8e55ee4c1e4af93c13fc36925a1cc05ab8bd2be1fd932571674be8d1fc10774c3e6612576eb7feb1374c0c351d6d0b1c1a1ac00aef375d18f2e70c5ca20bbd3184e5ae3cd0569f7b7ece466112fa27b04a64329f079335a656f6e31c8861a4f1a145a726782d5ce91abb8fd62d6a66e8744d103193bb969bfd9dcd14b74419ca1b235c3308997d4d56f6da546062eede6f74cfee2ae8f5c72887d6cd2b5c30edd60aa8ae86976e3e51e10a8bae537425cc631145f8fb3db81423dc8ddda687cf1c0d4e3031b4676f019914fd5879c45b644be83a20ec4f67cb7fb662f238588f45fcc261568767a5f495da26ddd3b1f05429c0f06200dcc4f2b21ada358c5a1771dcc5b356ad7b35519500655f649d3323eb1814b175cff56ea14410b1ded2d35e458c8f38bcd0ceb367edacb95260dd3e022220ceb31b0705b131d1385bd72ccf6454aba7a1aa19202039498fc7a59178208fcd8e4e27fde4e4aa74cc375a0c5d05f10e4c6530402b5c1f6c64b03582302907e64e49b00e733e885361ada93e945f5a9d75f34c3dd76b7ea236ad5adf40de6b1a6e5e80034b989397767a59fb134cada4030b70da875e9dd989fd1975eb1df97b1768150d32e4e6ffe1f7eec6ee51316e8160350734f66878fb2a9af018d91237e1be057ecd8731df277cdc1b907121c67897e5f9d47a03db7acf0457390720567ae48d65f0a04114198cbd66b7d3842bfe9e263269b1971f312a2d368631f310a2e5de7475b587b5d3f3f0fd735712d0a1939f4ad835236bce44443de729a8ca7112256f3e259b0bc3178ea3408da7c8a27d20ee639a2178960597347d24afdfc48ced11e20c99a529ec8533e7567c9e18777a4bfa2b86f4818c9202b978e7ee9171d6a78c043e1b7cdbfc73f8427076ae3cfae74a7f7395c06cb9c359546a39d4d31c3f24d3b810adf3eeefc4ff0b3b610dca0ed18209b6919e3a945f55dbb54748a1d7c16a7b264b2efecabb824471a864512fc8b2cb145a48d053140e92c51a17fc32a4f20b2fbd14f4b613751c1ac15f0b6c75a7db9242165b4b80505f5cbf7e6f0e71bb372f37abacda51d1a5b6fde912ef470b2bef778da279c9c9297d173c463a66464f64c5b8f94933c47224d51a54d01d9ab2e02fa85f65496b8133cce10b5aba8ea8259426c38a3aa99b0f51e8b82a05084c68ef7517e2dd118e19c98f4223a07e7466f4e02d191132e7f68d3fb23ea6f261f919c72fa91f0f6b3e13d87ce8ed3e4c38d3645fe0584608109b72309a0f79b0e77ddda93a762a634f29b94400987c50abe197897927ae0001eb7eec3c6f5e1d47e85385571044bc997998fbbee37c06c5edfbaa879a5064281a8788dd23e0d6dfd670a12ee3c37882bb5862c46e41062cb2038764b26e9c08c85655c39e139441dd17f445948e8f8a7951625705194f520c9c117e883e0462582048e66d1f84b12c412187f84b5ccd2f02f645d43dfb1de7665480cafb37aaed4c438b20decf4a9f50b9122255fc53e2da8922574f69ea6d0bc3efd67b3209dba2dadfc4ce5a22e4a87e0c815b0015e3df4eb8ca462c65e59cdbcfc6513d7ca7efb1bbe5379da5812216a34b04538adc5ba427f43ea845ed0ab4a30031e01cd1a323451e009a0a8d17924719f1107922c0e16ebf9a75840f0c80e9b81de315cc5aa7a7aac9e4e6b188dbf6adc78dc48ec880ce38f90337246d877cad9ce2d510f3d4e5ea6a7088528ffe6400823f0599f12f14d1520c43abd2f4a971643a16cfb64fbd43d1e6d6897bc6e0c91ca860ebd4957aa746344235bc07b934afb9e088435033e91ecfe0e0473070d463e34bbaf9f80a50d835cfd02b1bed1a3cccf5317022cf089f425566c7b9788f5dc041b2d97ee87d2bfe7c5f8416cc874e70cdb2ee470eda32d1bbf0b847544035c7f1783aa15c8b0bfd81ce9182cfee37120e0f06be95b3f63593e38806a598ffde44b8fe2a2802249c536e8a6b5a77bd3928a5313bc1b2b71ed7ee4c700e1e9165acfddd0dddd3c6263e3140a1cce0a4f06251eafae6770c0354f916ff5e0b3627bca51e7e48262f20e9d6de91ed3985be1af430f737b0aae21cfe5416a68c18caf6ad9ddcb22426a343fca26056ba0892da87ca9b3e8e92497a21450d6ac3e4b363d003b6e839948dc86e12e4ee9ec91e83efc810f4d8c49e1c95bb03180df139337983f243afefe4bddc9acedac1388c0dc333c72beb27a80c408159ffa082bf785da44491101ebc0458fe2c6bd72b6688a818ad1d0c117ddb9453d9ab4b06c8ea1f15354c181994ee480236df9244a81021c1211e6c1fbd19d2e0197b1b3af43100f55c82c3bf142cfa4818d1a0c09abb90fc794af6c17f2bb4279c9db074012c033e5383012c917be3b23c567940ab414fd8bcc29c3de91ad6af5d3327f0cae441a093b53c9361e8e1d4e6b5bf38b2df9c66ca637fb3d4b20bfd71ecf19d109a66a868fb6668e0df27b2f726d86c359ca9c0e2fac2ce31206b8ee98a57da81c59b69394ad8f4164876a23ec588a6fa7fbe77bb61b22e7b3f513a1992b61c8dad4c609659fddbfbc28a2d37b0b4f0c65a375e79ecae2068373dcafedf5cf04e160ef248a88de76b53df352acb63daa97f2ead518862f6e545702fdee5887f9c426d3d9354533053a387ac1d0e4b04e7412d6f491e5ae7fa752578831b338590530a29cb71e691df8d44fedd33a7d83025a133b4552216048ae4b3b0a83f61025d951fe4e676e54ddebfcae413dc2131b40a4a3d2dc5e2d892342b068c8c4142137bf12547ce89cfb7ac597f3b6a39fec9fb004647bb62375570f88a7fa58d8d6bcdb68edc980c17333c7747e99a3ab5b5cb927a1ba27540df2b97c105b84e092379a7aeb6b0e90c62711d5bda3f584ce3b0964fb056dc491f6f66003a0ba0539f8e3cbfd180d308521de3275318642781ee439856f4eff8fa1690d3b3d97ff773f804009e13417454e9ae21a8d7efcac5e09a20d74ac7619c98ec9feea0173e7982e5958b1cf0cf5358651e6dbe97037c1a7e327c18f14cf96e9ab41aff844860d52fa2f90e4f95c70ff4434453cf836396d145b6999eae101e9eee7") 11:40:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0x4a, &(0x7f0000000000)=""/74}) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x2, 0x8, 0x7, 0x0, 0x9, 0xffffffff}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000100)=0x9) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x5}, 0x1c) 11:40:22 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3f, 0x602040) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000100)={0x0, 0x6, 0x6, [], &(0x7f00000000c0)}) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4c0, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='veth1\x00') 11:40:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x67, 0x63) 11:40:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x6}, 0x1c) 11:40:22 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000340)={'broute\x00', 0x0, 0x0, 0x0, [], 0x6, &(0x7f0000000300)=[{}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000200)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x10) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000180)={&(0x7f0000000080)=""/208, 0x20000, 0x1000, 0x1}, 0x18) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) 11:40:22 executing program 0: r0 = memfd_create(0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) 11:40:22 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000040)=[{&(0x7f0000000200)="b0bfede29b2827b50e584a4c502d059ce51b75febb8d3a7d4fcacd94fe2aef5beeaa97561d314ba4109659d8da58a7b2389c6a6d858a28a03d2d628b9ad14d8c623f37525546460b859815ea32957177dc3776fb7fa3ff8c3cbe26fc007c2ca41a4fd46f76b5e11aad5644a0eca36f33fcd28227d4626c214c96cb03361276da7af61e51b86d75e7d7508fc3e62d1b535360bbbc34063d87d709272412068ecc35bdb4732daa4547382369b24e084cfc6a087aecf9efdae198c729a567e7338400b78301e6e66c139aae76492c5db305d62e4a314132251cb7bc5a024d070a6fa13bc30cbdccf13084a73068ecb6a2", 0xfffffe70}, {&(0x7f0000000300)="2702bd63555c607773682d22be93d760e52bf8d11d5fadadcfc87376bbcbd75641e396add6a926f578fba78ea35266b83ec0ec20f166524300efea23845bcc5345a3d612ed0a9a13f675219d65486a16aaad6a8b18071774b6acdddc2bdf448cd5f649aa51618a2c5a3141f900eb722491835ff212d049c38d1d0847c0eb7f641e896accd809dbd2b2e66debd0525d3c2403913a503f5dfeeedfcedb74945926f1d6bdfdb7823c1ce617f25970e0bada3d0ac899f0eb1686cf7c1ab145d2fcb39fc16d65e1658a441edb8d4e33793bb5a373956611d3751c312140d3255c0aa2c4200139ca63c54478b9f40c05dd", 0xee}, {&(0x7f0000000500)="23b3e284ba97cff3e6410b477539760f009a4d4a5f3fd7864ed16451be14291778bf8f5dfccfb54e35a0d2d97c80bf11207393616846221072d0fa7f9f5937246ea49d4d2e699222d911cde4adf68d1c39a05028a76a941208cc655d1763c88edf1e1f6c164d55d0c88b4ba15328c8125b968feb09aa76fa262c9eccdc9f316f701f705f5fbad479aa5e4796e606e8234d109970619a16588c47f7a2ae9617ba3cbbb671e89f35aa8d3e149e09eec8a9a98db9da8e6cbf8988b11b68d6d39078461c03083c1a510719ad64d04d1831d6bdaec8252daa3d83d0f947556022d02216774f808fbbcfe40a7ffd812f4bbddd78d602875d69", 0xf6}], 0x3, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setsockopt$inet6_dccp_int(r1, 0x21, 0x7, &(0x7f0000000080)=0x7ff, 0x4) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000000)=""/42) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x68, 0x63) 11:40:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x7}, 0x1c) 11:40:22 executing program 5: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x69, 0x63) 11:40:22 executing program 0: r0 = memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000040)=0x1, 0x4) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x200) 11:40:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x8}, 0x1c) 11:40:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x6a, 0x63) 11:40:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x9}, 0x1c) 11:40:22 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, 0x0) 11:40:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x6b, 0x63) 11:40:23 executing program 5: 11:40:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xa}, 0x1c) 11:40:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x6c, 0x63) 11:40:23 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f00000000c0)=0x1) syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x400000) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000080)=0x80000000) 11:40:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={r2, 0x5}, &(0x7f0000000140)=0x8) r3 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x8, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1075, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendfile(r3, r4, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:23 executing program 5: syz_init_net_socket$netrom(0x6, 0x5, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}}) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x6d, 0x63) 11:40:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xe}, 0x1c) 11:40:23 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x674082, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40001, 0x0) fsync(r2) r4 = accept$unix(0xffffffffffffff9c, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f00000001c0)={r3, r4, 0xda}) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f0000000000)="00cc526f02dbbb914fa8c00cfc96aecc2ba45c091f99751334a6c1f202226c6765dcfbac63a986c2f16e65926974834812ae4f4272a9b435afc1986ff0375a8c18b932d5c4415a8de250585b", 0x4c}], 0x1, 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:23 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x10000}], 0x2, 0x0) 11:40:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x6e, 0x63) 11:40:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x10}, 0x1c) 11:40:23 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x274440) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000040)={0x10000, 0x1}) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) connect$netrom(r0, &(0x7f00000000c0)={{0x3, @bcast, 0x7}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @random="1762e9274c7f", 'irlan0\x00'}}, 0x1e) 11:40:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x7ff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000040)={r5, 0x80000, r1}) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x12}, 0x1c) 11:40:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x6f, 0x63) 11:40:24 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0xa001) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x200000000) 11:40:24 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) clock_settime(0x7, &(0x7f0000000080)) 11:40:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x54}, 0x1c) 11:40:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x70, 0x63) 11:40:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x50, r5, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x48090}, 0x4000090) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:24 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x141c00, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) bind$rose(r0, &(0x7f0000000180)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0x1c) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000140)={0x80, 0xfffffffffffffff7, r1, 0x0, r2, 0x0, 0x9, 0x400}) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:24 executing program 5: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x4}], 0x2, 0x0) [ 1091.831058][ C0] net_ratelimit: 9 callbacks suppressed [ 1091.831069][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xfc}, 0x1c) 11:40:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x71, 0x63) 11:40:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x72, 0x63) [ 1091.998929][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x5) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x6, 0x4000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x1f4}, 0x1c) [ 1092.145506][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:25 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x2000) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000080)={0x7, "f2e147149f2b72825af809fedfb81b50e3c94144fd6e7050b54955c0528d662a", 0x1, 0x1}) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000040)={0x7, 0x4, 0xfffffffffffff001, 0x80000000, 0x401}) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:25 executing program 5: r0 = semget(0x3, 0x3, 0x408) semtimedop(r0, &(0x7f0000000080)=[{0x3, 0xd5, 0x1000}, {0x3, 0x6, 0x1800}, {0x1, 0x100, 0x1800}, {0x7, 0x7, 0x1800}, {0x3, 0x9}, {0x3, 0x100000001, 0x1000}, {0x2, 0xea, 0x800}, {0x0, 0x1, 0x1000}, {0x1, 0x200, 0x800}], 0x2, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10040, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x20, @empty, 0x100000000}, @in6={0xa, 0x4e23, 0xfff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}, @in6={0xa, 0x4e22, 0x7fff, @ipv4={[], [], @local}, 0xff}, @in6={0xa, 0x4e24, 0x5, @local, 0x1}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e22, 0xfffffffffffff909, @ipv4={[], [], @broadcast}, 0x3}], 0x9c) 11:40:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x73, 0x63) 11:40:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x218}, 0x1c) 11:40:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x4000000000004, r0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:25 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x40, 0x0) accept4$nfc_llcp(r1, &(0x7f0000000240), &(0x7f00000002c0)=0x60, 0x80800) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="b28b45ceae12a5cb774a0d9bf38ca023ced5db129446067e88a4f7d2c67ad63004a3b0feb5daa2337eecebb964c6bebe88481b9a1e0bf0e41783cb568abf96d001764ca682d4dacde8fd6ef4fd998af26c01a9bb5801ae3cdf665f4edf8265c4d6d6edb78cf38b257735c5d788b739af92c7e491a68395d464a7f8bf93dc38a9425484bbf5107921a768e90e5ea3d12bf58a4d2c3a96c78a0f808ef1aba4067353c78d10462478ea06a07f515dc50023aa008a290992d839603730550fe923abc4f0f97101b7cb7340a3df0cac0a23cb3d8c58aac6cf3f8d6dabf56d077305476b1b70b881751e2d1007588cac", 0xed, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x5, r3) semtimedop(0x0, &(0x7f0000000240), 0x2aaaaaaaaaaaab16, 0x0) [ 1092.771424][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x240}, 0x1c) 11:40:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x74, 0x63) 11:40:25 executing program 1: r0 = syz_open_dev$loop(0x0, 0x4, 0x40000080000001) signalfd(r0, &(0x7f0000001800)={0x48a}, 0x8) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) read$FUSE(r3, &(0x7f0000000280), 0x1000) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18, 0x71, 0x2, {{0x0, 0x1, 0x3}, 0x8}}, 0x18) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xfffffffffffffd33) stat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BLKFLSBUF(r3, 0x1261, &(0x7f00000017c0)=0x5) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000001340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x3f}}], [{@obj_role={'obj_role', 0x3d, '\xdbsecurity/eth1!+'}}]}}) memfd_create(0x0, 0x7) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x800}], 0x2aaaaaaaaaaaaac7, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000001740)={0x53, 0x0, 0x9c, 0x4, @scatter={0x1, 0x0, &(0x7f0000001540)=[{&(0x7f0000001440)=""/198, 0xc6}]}, &(0x7f0000001580)="65b8f4474958a5cbc634155d5ec41649d702605ba5b33ded9486234cfbe021db9ae1fd2babd8b2eef289ae647da88e3e0e7cf818cc866e9e0d31662ae07f734e2ca6aa9632fa91ce71d9cec29c522f34cc44b779e5aa20b0e8a64286d66ec7045b97b846bb1e38869328d2dcd012b8c9d7e0fb7fde3244e5ea1de2ecb2e35898dad2e681a4b03451ee9facb1683eb5c926c0638fbcca25b98b928926", &(0x7f0000001640)=""/149, 0x5, 0x10000, 0x1, &(0x7f0000001700)}) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) 11:40:25 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) pkey_alloc(0x0, 0x2) 11:40:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8000000000000000) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, 0x0, 0x2000006) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) syz_open_procfs(r4, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x75, 0x63) [ 1093.004397][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:26 executing program 0: memfd_create(0x0, 0x5) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x84100) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000040)) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x300}, 0x1c) 11:40:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x76, 0x63) 11:40:26 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0xcc040, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0x100000001}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0xfffffffffffffffd, 0x9, 0x8005, 0x101, 0x7, 0x8000000000000000, 0x2, 0x8, r2}, 0x20) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000000c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}]}, 0x98) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4000, 0x8) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000040)={0x74}) syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000100)={0xb8, 0x0, 0x3, [{{0x4, 0x2, 0x8, 0x80, 0x0, 0x1, {0x3, 0x2, 0xfffffffffffffff9, 0x75c, 0x7, 0x84f8, 0x5, 0x8, 0x7, 0x1, 0x1, r6, r7, 0x800, 0xffffffffffffffff}}, {0x3, 0xca0, 0xb, 0x8, '/dev/loop#\x00'}}]}, 0xb8) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x77, 0x63) [ 1093.784793][T18932] kernel msg: ebtables bug: please report to author: Wrong nr of counters [ 1093.787807][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x3e8}, 0x1c) 11:40:26 executing program 5: semtimedop(0x0, &(0x7f0000000240), 0x0, 0x0) 11:40:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x78, 0x63) [ 1093.960892][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:26 executing program 5: clock_getres(0x3, &(0x7f0000000040)) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f0000000000)) 11:40:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000000), &(0x7f0000000040)=0x4) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:27 executing program 0: memfd_create(0x0, 0x2) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) accept$netrom(r0, &(0x7f0000000040)={{}, [@netrom, @netrom, @default, @default, @rose, @bcast, @bcast]}, &(0x7f00000000c0)=0x48) semtimedop(0x0, &(0x7f0000000100), 0x2aaaaaaaaaaaae62, 0x0) write$ppp(r0, &(0x7f0000000100)="333e0f5a7a85a219086694123938a9de46d322f8edefd91e8fcd4861e6d02dc1bc80949cc0f76cf21b223b18f0b3362b5561cfc476d1eb9ca500b90dcd8454c0ff324d83462e17eaa94b68a9ec19d89327300a0effd4fc23421fef314d9db2da3afe3c6b4a0e6aba5f814e307b5a63311f48b424b1beb8075f3854a471ab24a93c7784a7cc695478f2c99865b06e5c4912005f656cf09b97013cf7cffc6b48412478ba12a099b1d0a4b26b43295fb96e11d5a32d90d2c919ffa556306e43254b4c859b41708ab95c38", 0xc9) 11:40:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x500}, 0x1c) 11:40:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x79, 0x63) 11:40:27 executing program 5: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000000)=""/70, 0x46, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=r0, 0x4) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) 11:40:27 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x7cd, 0x5, 0x6, 0x1f, 0x101}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r1, 0x2}, 0x8) io_setup(0x3, &(0x7f0000000180)=0x0) io_pgetevents(r2, 0x75e, 0x1, &(0x7f00000001c0)=[{}], &(0x7f0000000200)={0x0, 0x989680}, &(0x7f00000002c0)={&(0x7f0000000280)={0x6}, 0x8}) syz_open_dev$loop(0x0, 0x9, 0x105082) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x7a, 0x63) [ 1094.757320][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x600}, 0x1c) 11:40:27 executing program 5: semtimedop(0x0, &(0x7f0000000000), 0x649, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x103800, 0x0) mq_timedreceive(r0, &(0x7f0000000040)=""/72, 0x48, 0x4, &(0x7f00000000c0)) 11:40:27 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x701200, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x100000001, 0x1, 0x1940000000000}) 11:40:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r5) sendfile(r2, r3, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x7b, 0x63) 11:40:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x700}, 0x1c) [ 1094.935846][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:27 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = socket$inet6(0xa, 0x800, 0x10001) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180), &(0x7f00000000c0)=0x4) [ 1095.110784][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x900}, 0x1c) 11:40:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x7c, 0x63) 11:40:28 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x70, 0x37, 0x7fff, 0x1e2, 0x800, 0x0, 0xfffffffffffffffe, 0x210, 0x0, 0x1fffe0000000000, 0x3f, 0x7, 0x9, 0x1, 0x1ff, 0x7, 0x6, 0x400, 0x1, 0xffffffffffffff7f, 0x1, 0x4, 0x0, 0x0, 0x7, 0x401, 0x8c, 0x2000000000, 0x4, 0x7f, 0x1f, 0x81, 0x3f, 0x100000001, 0xfffffffffffffffe, 0x8, 0x6ad, 0x0, 0x100000001, 0x4, @perf_config_ext={0x5, 0x7}, 0x20000, 0xff, 0x9, 0x1, 0x3, 0x2, 0x84}, 0xffffffffffffff9c, 0x3, 0xffffffffffffffff, 0x8) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x0, 0x29, 0x8bf9, 0x9}) 11:40:28 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x800) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r3}, 0x20) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r2, r4, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xa00}, 0x1c) 11:40:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x7d, 0x63) 11:40:28 executing program 0: memfd_create(0x0, 0xfffffffffffffffa) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101400, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:40:28 executing program 5: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x3ff}, {0x0, 0x0, 0x1800}], 0x2, 0x0) r0 = syz_open_dev$cec(&(0x7f00000004c0)='/dev/cec#\x00', 0x2, 0x2) write$selinux_attr(r0, &(0x7f0000000500)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) r1 = msgget(0x0, 0x24) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000300)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000400)={0x0, 0x3, 0x0, @tid=r6}, &(0x7f0000000440)=0x0) timer_gettime(r7, &(0x7f0000000480)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)=0x0) msgctl$IPC_RMID(r1, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000380)={{0x101, r2, r3, r4, r5, 0x8, 0x2c}, 0xffff, 0x7fff, 0x4, 0x3, 0x0, 0x2, r6, r8}) 11:40:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xe00}, 0x1c) 11:40:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x7e, 0x63) 11:40:28 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x10000, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x6b88f034e85d70f7, 0x0) write$capi20_data(r0, &(0x7f00000000c0)={{0x10, 0x4, 0x5, 0x83, 0x1}, 0x1000, "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"}, 0x1012) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000000), 0x4) 11:40:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key(&(0x7f0000001780)='user\x00', &(0x7f00000017c0)={'syz', 0x1}, &(0x7f0000001800)="7c972d7997db6fb400be28150e462c21d57888a81d8b79a0976869cdaacd3bcd4569389e72033e3215cdf802709e1cbf5bf1624188bd160df4c031f875e4b0e396c382a90eed8452fb740f4572813b878827ed8bc138791dbaffd155ebee63949aa6c83a390e891aa17b430b44d7c9960180cf891e8571609e", 0x79, 0x0) keyctl$instantiate_iov(0x14, r1, &(0x7f00000016c0)=[{&(0x7f0000000200)="2edab1dbc7732cd3b8d3030833b043cbac7ba4c0d1f09a5e19f17692ba2eed1b1e04fa70393880705f337f528d62fc5e81c1887d13c202ec71f0f4904870aacd29cc6da455eab41aab5277669f35b4e2c435cf58397dcda7139e6f5c04f7aeaac50e0797ffdf8282ba76385751ced78415251fb0f810886c9a6637aca22c3b696be525b49d89190f162a4c75bed6e755a6d57279445ef844499f2f5b6b0f6b51ee829e5570f1cb42822ea85e0fcd297f3be7fd0b5bcc48c1f239728364bd8d432b", 0xc1}, {&(0x7f0000000100)="6957db88acce5337e6148a683cf33f7a827312b1c7faf5c192de9108236fb69a53c10ed28b29b8bd530689c86a6b79a94009d2772f0de03e6369c738b1b20232f4bbe7bbdbb0c3ad41bc762cf676203b0eba9c2f914a3c775d9bf5ffbd30d814cf1a9d834d161c1a2a055282a0f9e53c683f8b37d2a089a73dd065d85cd0ed10cae3e3cd36f0e8393cda36e7efe85e250a3c931f012cc24d521b288c1b6082a77a8bb4d100f6c8148fa0cb530e8cdde95fcd6c0df5294d63c2f575e8", 0xbc}, {&(0x7f0000000080)="80e5854b61943329d5257a4a64b661cfa66b6e9b6655c330a35787f4e9d331ef8864cc91060b124dfb74", 0x2a}, {&(0x7f0000000300)="39624ff88f2f0abec071b68ab616cd0a4bb2e77d88cb714764469df7a9b5da4bda2ba38aef989cfc29a36e93dfaf9eac583425eead13a354587d5cba23ab19dfbc305ae9ff310ee66e5673e193ea1ac9a35bc5564456f7f745f990427dc3bccdde964533db1f1962d731134cc83446311afd01d106d123257b243ee32776cc5803d53a8859bd0d20e865a5bdbcbc0aaa3f76c58502362fad524410a1144616f38ff98f6519f3aa616945", 0xaa}, {&(0x7f00000003c0)="ac9b64c2a1c42699360f4bf30535f5fd95e7d507c021549715eacec2768982437cbbe95809fd1722e03ecb41757cdbc5be54f6aada503d43e872bc5288c47145cf477330240625901f8947b9cc2acfd90b6ab91ea28929053273a4a57a6e51f222c8d5b841f94fd811b1c534f8c907598d9be22f6b62df8d10380cad9cf24024e41e4631ffdf411409a8b32775182c69c7054581cbad694ca557ecf388d8c7c98ffd07615b86cadbcb73911417b483afbc6955b0a067", 0xb6}, {&(0x7f0000000500)="18ea30b87df4000b06e8828453ae8ab7a7c6302b68fa60539d8225597883451883eb2071e6d0c1b97ff0c7b9708d49678f9849a122f9c445857416b81f068ed4ad5fba3283730bdb7ec8a5922b842001ae85122df378fc2cd892dae2ddd3e03566a0962f7c9391f394a405e0d4f16e359838e4de91b38795ff5ce33d456657ae18106ccb1db9ab2a97b0c698", 0x8c}, {&(0x7f00000005c0)="26b6a9ad3ac1004c7cb6375c8f4a1161233e8b737b197ceb0198861aa14904b4ba", 0x21}, {&(0x7f0000000600)="6d8ffef2be76d661962b591c441ea7ef825c8cfcce76edb659eb4865d872cc3fd67217ba6f49d5a700a64ab0b06ffd7757186fb45eb0d87671531235ddac62ff41834ce5d939366ab05315fae6893403caa16b997dc6b407981eefec94d37d30cdaf27aada56e113250f434727b3d1699ebe48aafffff6b64a472596e86cdb687c2b0a7cda983b2021a370be584dfdefbd82b5e3de0e28cfdb0f64", 0x9b}, {&(0x7f00000006c0)="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", 0x1000}], 0x9, r2) r3 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r7 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r7, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r7) sendfile(r3, r4, 0x0, 0x2000006) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000001880)={@empty, 0x0}, &(0x7f00000018c0)=0x14) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000001980)={0x5, &(0x7f0000001940)=[{}, {0x0}, {}, {}, {}]}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000002680)=@assoc_value={0x0, 0x7}, &(0x7f00000026c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000002700)={0x0, @in6={{0xa, 0x4e21, 0x33a0, @mcast2, 0x5}}, 0x400, 0x23a8, 0x1, 0x3, 0x92}, &(0x7f00000027c0)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000002800)={0x0, @in6={{0xa, 0x4e21, 0x4, @empty, 0x7}}, 0x7fffffff, 0xffffffff}, &(0x7f00000028c0)=0x90) getsockopt$inet_sctp_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000002900)={0x0, 0x6826c85a, 0xf2, 0x20}, &(0x7f0000002940)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f00000031c0)={0x0, 0x20, &(0x7f0000003180)=[@in={0x2, 0x4e23, @local}, @in={0x2, 0x4e24, @multicast2}]}, &(0x7f0000003200)=0x10) sendmmsg$inet_sctp(r6, &(0x7f00000043c0)=[{&(0x7f0000001a00)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000001ac0)=[{&(0x7f0000001a40)="21f705168a4a77c863ecc9d34c2f3ad5dacb807e2837acd71efa55609ccc47ba80e8d006a18fe86df822100d7c429495bca9c68fcdb1eb171667865a01f5fda97b39cd46ed2bfa9a5d39c55ab533689af433ef69e5c50138b0055a538bd99595c2f31d23170147e0c259", 0x6a}], 0x1, &(0x7f0000001b00)=[@prinfo={0x18, 0x84, 0x5, {0x30, 0x1}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @authinfo={0x18, 0x84, 0x6, {0x1ff}}], 0x48, 0x4000010}, {&(0x7f0000001b80)=@in={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000001f80)=[{&(0x7f0000001bc0)="1003cc662d6c7cb51aa2e979968df1400c02fe2c3ea350777c55c7c161b8c174a864f01867ab21410bf0ce1dcef453e6d45a7c1d3e2b1affdcf2be4e112a9e9da699aa9d8fed96469ca33b57daedffdd35947f799016c135e032cebe3e0dfabe1f72d97271ceb69b04bbfc18bed4cb7ce6126bdc849b236a122096991952aa157e2bcda96761ac4be3ebd6ffbf603efcaeb1261c328b334617908439e23288a20c93b7a2382cc4fd272bc2440b5548b04a638caf98b96c3860af65037f7d14b8b8ae6b3966a892c8d6d0a0c9693327c309423596069a79c15922e5cd2c70fdff909eeb5fe446b01960cb85", 0xeb}, {&(0x7f0000001cc0)="d3cbfa60b72a853e876bd5677982edc1261cc7050c7c68c47a9fc7051748b2f0e2e331828407eeb5946940dcdb6296518cc396f8f161c1d84918b1b56351dc0333047fec3bb9ae682cf1ca29763f7d6d441fa5fa10bc79ba2f0f0125eace335b273ecd65ec88c2b3a1dbe2346923716d241f1697ec7bf7e5b2a3c6776c455c818e63cbfdc6085ff5d05a70dd6e179485ebb8e3b8c395e2bf3962215fa1691acf3d06ece687a5ddc1", 0xa8}, {&(0x7f0000001d80)="56542c0db3f505e321884046e1c91c461611c280871135d4ee22a7bea7b25c57725d7b1f8bc2f8f116a703b12ee70de6ce0b02dfe99e0bbdcf39b6b12e0c7f91aa1cd0043f0df243886a6d42deb87316babeb115e6f1e6d0973f7b47513fd3296e48c83c6d", 0x65}, {&(0x7f0000001e00)="892d69169d55eff12f696e80963d60e90df238770221b46421ba4ab04de416d29a67490827669ac49468b5f72c1380e0ba0ff2a9a29aa29a1b5bf657affb231d8eb21f50b7fc0bad360944a6683cd448717f3d7396d72639c485df3d0747374199cc19f53e68bb7dcbadffb063ae302214c42a1e485c2ff88e39cefd1df536c7bc162db38137db4b3ffb3c0be76bc01360", 0x91}, {&(0x7f0000001ec0)="fdbe1554dfadb294b96ce39f978317927408949aa0ad2f1a0d902b9a629b18570817a94e15d550cf7a4631a7ad6194757542b718538a1c50ea07a80a5cf22c9fd499fa2e7c6825548aff1d368a78a0185d79ef6a68a9dc31433bbca36aa59df97625d0049bf3a0e49e89fd79873977a70c4f67feecb2531d851dafe01e39c62282d6b69e5632e9ec944ef50e544759e00acaf88405eb247ed710ee5908306ee382e9c0bca9629425f52ca41ecc19f3395abbfb6e20c4339f2a7bf584d5b9385e", 0xc0}], 0x5, 0x0, 0x0, 0x4008000}, {&(0x7f0000002000)=@in={0x2, 0x4e20, @local}, 0x10, &(0x7f0000002600)=[{&(0x7f0000002040)="1feb78bac5a1bbcf8aa8a998592e44503c2644281376850268610ee55ce015d1312274230376c596df720105c27e79a94f0711ba231c4fbbf00cbf3a3fade10dbbf73a488c2046ca344feac804c31f9c3e2ca7c386de92fd0aabdd21ba5a31d15edd112e6db6c08a46d0b395866a1ea23ba3eb61cef2d5ebd837ba59cfe683f49190eb03be3056621055df45bf95b78f27491fdd2cabeb7ec2926ce7165d7428f5d35deb9c2ef81e5968a6d95c67d2dedf7e0ec58721eaf40990bc84aa5912d38a9f0bc5470bf988ed895ca2a1d6f0", 0xcf}, {&(0x7f0000002140)="5477c375734c9cf6007b7b5b787b16dbfc3b5d476144782de569b6e800a004a70c7fb23ecfd5b4c61301dc95398d432d6d12cc8d65ea22a29ac0e69bbd85b436be13220fa9e236246c3d000e267164bc07fe380620279d0bfc2a405238c5cc553f03d523c67c93eb1f370e0625e1e62450823a6190e593164684bf1eeae955f339d415a6168433f0cdb6760374824b6f4fbb87b0fdda5a39a46c5b88574fc795a5cd449b6a41c1221bf290c276060efbb64b37cfb2d2a9ed8c9a07827a3c6175308387d5c2cb6aa4ef7f", 0xca}, {&(0x7f0000002240)="c41f53e382784402f4956ce081bc662dee6e267b0b4d30a46d611181f96379b7bde688886bb8b3c0bf8e03bf39edcfad9cd2a7d6963de8235602dcf4c44c7d0733a0486ebe1c606ee9726cfb9b6e1c3f160414548374d5ee6d94df2cd11b090586beb4872ab8786052ac6a656a34c682cddb393bc25a256d70b51b27a0ac0b1a9596a38fc64391f22ccbf7e016a094341b9d08dbd3182b3f7ae398791cee73f16340c2d914bc0e819e9f645e46f005", 0xaf}, {&(0x7f0000002300)="eafda47021627e1b31429790f7ee0ad5cdaeff75d076a02ddd8827e5bb54b0a88f9863320cb3653c691e004d705a88713cb8a94309314ab3c227dd71096cc50e1fb6d967868ba3df6928cb48e89036349bbebca3cda0f71b556df343128beef1c61669610b", 0x65}, {&(0x7f0000002380)="738e9bdbee388ccc8055e8c20dbbea3e14a60764821bf260d1e9575d8d9f98f7495d8e1f70c33f2dbdab94c6944b33abe122b359030d2f7dbf269a6908df307cde5411f9e24435ea6200f1b26cf348d63ab98838eee7e504cd7a0f4ba36d6ae368ef0fc346990d6ce7fe83cd53ae5bf911bdc9779c6fa65fea1a533cb7de8f22cc725c7118104bf79a44381a7970b8a7c8013005ef14f60a4d418b538ce33565", 0xa0}, {&(0x7f0000002440)="dc29924f1fd3fdca31d60c8521b6f229324e7ca24193e0d00e1eb2adc4991b88350b2cb96daf8ed0695334507038935f53853626ddb13f8ecc0a86", 0x3b}, {&(0x7f0000002480)="fa36e496ea52ea5ea1f03af76b1eb925ede7e933d2e5296e6fd363b952d4e7e90ce3f7b794d65e40829e195ee69d4645dfe924333dff22714e9a832c4e7c0d590736cada8829ee161c20261060498683e364119aad24b55d413269895fb5d79b6116a109c82c8260429fdf6cfc749d5c5f107827d1b25c656e4d2156da555957341d01f0abce6d8d3932c30c63fb6ea2a1dcdf71e36bb5427e3c6cf0a9b037edd60a477fd00fefcea936b4aaa050fc1d67e178b12f155f4c1eb80e09e60498d3991d3a0b75d3aa9277fa03b4de909fca1d9a01", 0xd3}, {&(0x7f0000002580)="895a9657f09f46c1a049569e344de31245d15a2461014a7ea4a5afbb1d6a27cac24883a6fca9cd17e8ea5481d344e876e9b7c6fb9d4da82529931aeb3cf088503de70312119d768750fcbc7edfd73ea7b2d76de4a3d9597fb17010f19f4c683d66f7a3b5aacdc4220665452d5a7e", 0x6e}], 0x8, &(0x7f0000002980)=[@authinfo={0x18, 0x84, 0x6, {0x4}}, @init={0x18, 0x84, 0x0, {0xffff, 0x6, 0x5, 0x401}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0x2, 0x8000, 0x3, 0x7, 0x2, 0x1, 0x481f, r10}}, @sndrcv={0x30, 0x84, 0x1, {0x100000001, 0x3ff, 0x0, 0x400, 0x8, 0x2, 0x2, 0x2, r11}}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x81, 0x200, 0x3, 0xfff, 0x7fffffff, 0x1000, 0xffffffffce12a16c, r12}}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x8000, 0x8000, 0x1f, r13}}], 0xe0, 0x40001}, {&(0x7f0000002a80)=@in={0x2, 0x4e24, @local}, 0x10, &(0x7f0000002c00)=[{&(0x7f0000002ac0)="11a696d9407c908d8bb2f979d20343156a82bf8fa70772f94979085564e7bbe5853c2546cd661122d8f52ad0560c3dc902ba92a2d430dfc4e094e1593cb06ec05094b70a7e4dd52bc3c98816b02396c81e709bc4b6d5f60620af1b98de9b078e51277707344550a43ff125a80c977bc772f8fca6c9f19921692220750f9dc739d1bd13eb57f7d190d87309c8d3c4fb6a4e9e2ae1b1c6b3c62428f46e9a2aebecb12a13f188d3ac9883aaea765f13bf8e75123f1ebd5b615fd92c557ee42cdc87da884f924b4faa784080979970329074c977b55f6bf8d9efa371c95f593c34a2f6cd", 0xe2}, {&(0x7f0000002bc0)="6719c1ab730c0e7ba6c38fb5ed7118c7745cb159965bb95c02d630817e19940278aae18cceda76aefc5983f87abad56d1b99bedebb14bd35ba1dbb75", 0x3c}], 0x2, &(0x7f0000002c40)=[@dstaddrv6={0x20, 0x84, 0x8, @empty}, @init={0x18, 0x84, 0x0, {0x9293, 0x2, 0x3ff, 0x5}}, @authinfo={0x18, 0x84, 0x6, {0x3}}], 0x50}, {&(0x7f0000002cc0)=@in={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f0000002dc0)=[{&(0x7f0000002d00)="4a10bb2043c4ea5c446642facea00ebb31184ad6f13b088d80198ecbb99440ff88b75329340fe83b774d3f9f02242de6c4ec88d7648f12edd18a1c02cc793a1642de16ea5dd1ba0694d99ae85f16ab33c1cefb0d60e8c1a7ff3fc44b681c11af1c027f82d2f0c6f9a0e99eb479093dba318dc9c7006f64b49e6a252cb62106ede42ab80d916a08f35773898ae9005bb7f02b", 0x92}], 0x1, 0x0, 0x0, 0x4000000}, {&(0x7f0000002e00)=@in6={0xa, 0x4e20, 0xbcf1, @dev={0xfe, 0x80, [], 0x17}, 0x2}, 0x1c, &(0x7f0000003100)=[{&(0x7f0000002e40)="2368449b14bfe7c46f749bd4fd11144d2f2c0795adc33a117694124c3f639d53a5fe9ca1230779e5e9a4d925b9030fcc67b36a36628bd0c5247a8ea31d6c27d172e41767152c739190019e5c8b4cb028b0130512b64f6b0fda9e46d33c3ebd5f877cad7d8d30b5c2a4129350f9906d743bff1407dfdb0e6699da2b1e5fdf3f48b517415a94c70216a3b0696c45e94f9e3f4a6d978383b964170ad9b3e5e76a2a2aa1b958fada6209b7d51bbd7c809f4207ce1673", 0xb4}, {&(0x7f0000002f00)="f46da6bf74f898d3911cb010ad76af06abcbae33ea20e5745166a4f7eaca0d5ee5b5bb90819a32dbb752ded72814e10c7ea3f2dbe4ab27276286f6c56e373428465e2e3a361d", 0x46}, {&(0x7f0000002f80)="f550ecf88a4bb5749ad379663009bde390ab43cdeaa70b376ee8b51c6c968146dda3f67f4b0c2f32ea653884159ebcda8748f46ab82b43e0feaa4f4d31c87fb58ff66957a77b534522d6d425ffd6c929a8a2669580aa2eec3b718e6d3601fbac81340c80cc8cbd87a8997c02e7f973777c43f155cf72c2ae87555d399c0e08c3d6970a3b07a393fb90a38cdff46b4b02b848", 0x92}, {&(0x7f0000003040)="d108d18756d25cce62e67f92ab6ae3c216cec91f384d9e9e412bd16d24705967b60c7b538ec657c50a00b8d1d288aab3e0abfd4896dbce5c341021d1bcb335db5c74f334a212c2fc0db6fe6e68707024e14f3cfba018623ba1c6b5523b3dedd448a3db7ab153c4a552276727d25fe180e7512ac6e1012afd17", 0x79}, {&(0x7f00000030c0)="aac9f635457d433e61d3e8cae4a82809bd6264d4d78b36ef7b791f2460edf5cf678df6db03fc5beaa61df1114d39c7ed", 0x30}], 0x5, &(0x7f0000003240)=[@sndrcv={0x30, 0x84, 0x1, {0x4, 0x1, 0x1, 0xfffffffffffffffd, 0x20, 0x800, 0x1, 0x20, r14}}, @init={0x18, 0x84, 0x0, {0x6, 0x10000, 0x8, 0x3}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x6aa}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xea}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x23}}, @init={0x18, 0x84, 0x0, {0x7, 0x5, 0x3f, 0x4}}], 0xb0, 0x81}, {&(0x7f0000003300)=@in={0x2, 0x4e20, @rand_addr=0x6}, 0x10, &(0x7f0000004340)=[{&(0x7f0000003340)="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", 0x1000}, {0xfffffffffffffffe}], 0x2, &(0x7f0000004380)=[@dstaddrv6={0x20, 0x84, 0x8, @loopback}, @authinfo={0x18, 0x84, 0x6, {0x3f}}], 0x38, 0x80}], 0x7, 0x80c0) ioctl$DRM_IOCTL_SWITCH_CTX(r3, 0x40086424, &(0x7f00000019c0)={r9, 0x1}) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000001900)={r8, 0x1, 0x6, @broadcast}, 0x10) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x82, 0x63) 11:40:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x1200}, 0x1c) 11:40:29 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000000c0)={{0x9, 0x3, 0x2, 0x0, '\x00', 0x9}, 0x5, 0x53, 0x9, r1, 0x1, 0x8000, 'syz1\x00', &(0x7f0000000080)=['\x00'], 0x1, [], [0x10000, 0x4d7e, 0x1000, 0x768]}) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x83, 0x63) 11:40:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x1802}, 0x1c) 11:40:29 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0xfffffffffffffffc, 0x3ff, 0x2}, {}], 0x2, 0x0) r0 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000040)='/\x00', 0x2) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 11:40:29 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc74, 0x8101) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000040)={0x1, {}, 0x2a86, 0x20}) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000280)=""/77) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) syz_mount_image$minix(&(0x7f0000000300)='minix\x00', &(0x7f0000000340)='./file0\x00', 0x1, 0x3, &(0x7f0000000680)=[{&(0x7f0000000380)="53659d21129670473b50b3e0041b2b6aaac6600d94e392cad692d488e667fc26b06adc6725be8ce21a1fc4b2f98518f2de2b422a2fc0cd4dfc25aa27c4bb820c33c70caca19ea3bec2c53e1ef45cb7193f8ed7ea03c895241f3f3ecba267d038fb732febcef0cfece583defc8674da6ccfb3d2ca4b76b8bf058b543a1bd3e38a6639c8a078b0c6653d7ccacdfb9aeccd38e17c67a25631919400dec3d0e7e76859cb42b2e699fe67acf501d577523ba93000794ea702deeb8454177d290da8433c2ea764cc8fe70ac4bc3695eb98d4e28fd0afa9cd14", 0xd6, 0x4}, {&(0x7f0000000500)="d988055cc19d09afd67d06ae27fe79be0121a22ec941fab892c6d0e66319ee6e05b496e65526efa8dd2b0ccf547ee75c320069a6fcfb3bad67193d23343b21d28e6094a09058881eb1f6d337bbbf82b77f5887c482788c55066428ba2a23e36fb36eadfe10d6f2c51dd87c95b62c67a421657cf1310de504482fcfb3ea0ba89f7ce6595a8e52f32cbac77e5b83c60669db99e39f546681fd26a0f22e9cd6c1aadf34bdf70c4362577d1ca108281c9769", 0xb0, 0xffffffff00000001}, {&(0x7f00000005c0)="19ca0dd01a02ced36fc47ccb322d36d9723de49ee45b29e9481589e563634a7b02928176136cfa0af515d22001ef9a095761421fce4f6c6472d598166fc37577d5e1a2f2a266cc9c0dd43a844fb1b212e31facf754feceb7c134d092f363152569f08c99ab3c697054d6840bee51f345ea865d48516cea639890441aea6a27e2da16467257fab8d5eb23d356b7fdc54b5099", 0x92, 0x100000000}], 0x0, 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000000)=0x100000001, 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000240)={0x200, 0x3, 0x1}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r1, r2, 0x0, 0x2000006) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r1, 0x0, 0xa, &(0x7f0000000080)='eth1:ppp1\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000200)=0x0) syz_open_procfs(r6, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x2000}, 0x1c) 11:40:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x84, 0x63) 11:40:29 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x201, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e24, 0x80000000, @mcast1, 0x8}, {0xa, 0x4e23, 0x1, @local, 0x1}, 0x8, [0x716, 0x3, 0x0, 0x2, 0x700000000000000, 0x6, 0x0, 0x80]}, 0x5c) 11:40:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x85, 0x63) 11:40:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x3f00}, 0x1c) [ 1096.880047][T20283] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 11:40:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x86, 0x63) [ 1096.940634][ C0] net_ratelimit: 6 callbacks suppressed [ 1096.940645][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:30 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf, 0x1f, 0x2, 0x6}, 0xf) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:30 executing program 5: r0 = semget(0x0, 0x1, 0x20) semtimedop(r0, &(0x7f0000000240)=[{0x0, 0x3ff, 0x800}, {}], 0x2, 0x0) 11:40:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x4000}, 0x1c) 11:40:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1097.587608][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:30 executing program 0: memfd_create(0x0, 0x1) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x87, 0x63) 11:40:30 executing program 5: semtimedop(0x0, &(0x7f0000000000), 0x0, 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0x20) 11:40:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x4002}, 0x1c) 11:40:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x88, 0x63) 11:40:30 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80002, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}]}) 11:40:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) accept4$ax25(r1, &(0x7f0000000000)={{0x3, @netrom}, [@remote, @netrom, @default, @rose, @rose, @rose, @netrom]}, &(0x7f0000000080)=0x48, 0x800) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1097.766800][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x5400}, 0x1c) [ 1097.934609][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:31 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x1) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20000, 0x0) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000040)={0x4, 0x0, [{}, {}, {}, {}]}) 11:40:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x89, 0x63) 11:40:31 executing program 5: semtimedop(0x0, &(0x7f0000000240), 0x0, 0x0) 11:40:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x7fdc}, 0x1c) [ 1098.502710][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:31 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400100, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 11:40:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) r5 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e20, 0xffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xe0}}, 0x800000, 0x1}, &(0x7f0000000100)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r5, 0x84, 0x17, &(0x7f0000000140)={r6, 0x7, 0x40, "4b2c61e5bb4475b45433376086707efc884666d9a9e89c6c77a7590fe2b67d3ba233f6cbab9d388f1f8adbb451ac6fed3c5399d4ee50a126a6e244a7e4fd6fc7"}, 0x48) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:31 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000040)=""/78) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x8a, 0x63) 11:40:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x80fe}, 0x1c) 11:40:31 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5, 0x4900) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000440)={0x8, 0x97}) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) pwritev(r1, &(0x7f0000000100)=[{&(0x7f00000000c0)="4511a3109f6df0eec20ea13095b42ee15b19c364d544b84862c8d6aba069e304a4c9db341ab3f4b5152109586ff5b6415f3692d0ce0b72", 0x37}], 0x1, 0x0) timerfd_gettime(r2, &(0x7f0000000080)) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000000)={0x5f65, 0x3}) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000280)={[], 0x3, 0x5, 0x8001, 0x0, 0x2, 0x10000, 0xf006, [], 0x24}) write$sndseq(r2, &(0x7f0000000140)=[{0x2, 0x7, 0x9d, 0x9, @tick=0xfff, {0x80, 0x2}, {0xdf29, 0xfffffffffffffff9}, @control={0x8, 0x8, 0xfffffffeffffffff}}, {0x1f, 0x3, 0x7fff, 0x8, @tick=0xffffffffffffff12, {0x0, 0x3}, {0xffff, 0x3f}, @addr={0x0, 0xa86}}], 0x60) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0)=0x9, 0x4) [ 1098.746924][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x8b, 0x63) 11:40:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xb8ff}, 0x1c) 11:40:31 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x145, 0x0) 11:40:31 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101401, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x473c7e98) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x8c, 0x63) 11:40:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000000)='/delo\xff\a\x00\x00\x00\x00', 0x4) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1098.973458][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:32 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000040)) 11:40:32 executing program 5: semget$private(0x0, 0x4, 0x40) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x440001, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x7fff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e20, 0x401, @rand_addr="000c4b159eeb09520a6aeb8961b7876f", 0x7}}, 0x0, 0x100000000, 0x800, 0x3, 0x40}, &(0x7f0000000180)=0x98) 11:40:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xc0fe}, 0x1c) 11:40:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x8d, 0x63) 11:40:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000000)={0x1, [0x7fffffff]}, &(0x7f0000000040)=0x6) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1099.643949][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x8e, 0x63) 11:40:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xdc7f}, 0x1c) [ 1099.788548][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xe803}, 0x1c) 11:40:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000100)="d27d23cb4044ebf22dd4ad694c848269741175b34254870ce3fdcb59d1425a3432e68a94134f285f5ef62477acd1ff4f94300bbf598930cc4b7ed1e1260b9db4ddca008796b3b39f5a889d9d255f87217844bb98cd92bb59d0b2c32cc7edc5cdc6081292a3b1c4e536d5bf83b570cf23c02dfc90fba160cff319f401b86954ed897a1e32c4319b40eab1cc415d1343a1508f9289c241b77b7982191be50f003a21c573dbf42665fd5c3228dcbc045ee6ed4af3ea94496237fe4de791", 0xbc, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000080)='syzkaller\x00', 0x0) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000300)=@req={0xfffffffffffffff9, 0x100, 0x8, 0x3}, 0x10) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000400)=0x165eb131) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000240)={{0x477f, 0x6}, 'port1\x00', 0x10, 0x100000, 0x8, 0xff, 0xaa, 0x3, 0xa611, 0x0, 0x5, 0x1ff}) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rfkill\x00', 0x202, 0x0) ioctl$SG_GET_PACK_ID(r7, 0x227c, &(0x7f00000003c0)) pwritev(r4, &(0x7f0000000480)=[{&(0x7f0000000340)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000200)=0x1, 0x4) sendfile(r2, r3, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:32 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x18c00, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r1, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 11:40:32 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) 11:40:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x8f, 0x63) [ 1100.006454][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:33 executing program 0: memfd_create(0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1ff, 0x480100) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000040)={0x100000000, "9599f2eaa9df5f6e6bbfc232ac81ed5ec4b530dab64c87976e0f8d812cbf7833", 0x3, 0x5, 0x4, 0x1700, 0xa}) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000180)=0x18) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000100)={0x1, 0x0, 0x102, 0x2, {0xfffffffffffffc01, 0x81, 0xffffffffffffffff, 0x7}}) 11:40:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) r5 = syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) keyctl$session_to_parent(0x12) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000080)=0x54) ptrace(0x10, r6) kcmp$KCMP_EPOLL_TFD(r6, r6, 0x7, r5, &(0x7f0000000040)={r1, r5}) 11:40:33 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0x0, 0x1}], 0x2aaaaaaaaaaaadfa, 0x0) 11:40:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x90, 0x63) 11:40:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xf401}, 0x1c) 11:40:33 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmmsg(r0, &(0x7f0000003b40)=[{{&(0x7f0000000000)=@in, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/204, 0xcc}], 0x1, &(0x7f0000000280)=""/215, 0xd7}, 0x5}, {{&(0x7f00000001c0)=@hci, 0x80, &(0x7f0000000700)=[{&(0x7f0000000380)=""/208, 0xd0}, {&(0x7f0000000480)=""/252, 0xfc}, {&(0x7f0000000580)=""/207, 0xcf}, {&(0x7f0000000680)=""/9, 0x9}, {&(0x7f00000006c0)=""/62, 0x3e}], 0x5, &(0x7f0000000780)=""/3, 0x3}, 0x4fe4}, {{&(0x7f00000007c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000840)=""/180, 0xb4}, {&(0x7f0000000900)=""/16, 0x10}, {&(0x7f0000000940)=""/41, 0x29}], 0x3, &(0x7f00000009c0)=""/112, 0x70}, 0x1}, {{&(0x7f0000000a40)=@ax25={{0x3, @bcast}, [@remote, @default, @remote, @bcast, @rose, @rose, @default, @default]}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000ac0)=""/183, 0xb7}, {&(0x7f0000000b80)=""/51, 0x33}, {&(0x7f0000000bc0)=""/242, 0xf2}, {&(0x7f0000000cc0)=""/13, 0xd}, {&(0x7f0000000d00)=""/201, 0xc9}], 0x5, &(0x7f0000000e80)=""/51, 0x33}, 0x7}, {{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/188, 0xbc}, {&(0x7f0000000f80)=""/13, 0xd}, {&(0x7f0000000fc0)=""/3, 0x3}, {&(0x7f0000001000)=""/14, 0xe}, {&(0x7f0000001040)=""/33, 0x21}, {&(0x7f0000001080)=""/78, 0x4e}], 0x6, &(0x7f0000001180)=""/234, 0xea}, 0x8001}, {{&(0x7f0000001280)=@nfc_llcp, 0x80, &(0x7f0000002680)=[{&(0x7f0000001300)=""/137, 0x89}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/102, 0x66}, {&(0x7f0000002440)=""/64, 0x40}, {&(0x7f0000002480)=""/35, 0x23}, {&(0x7f00000024c0)=""/253, 0xfd}, {&(0x7f00000025c0)=""/3, 0x3}, {&(0x7f0000002600)=""/76, 0x4c}], 0x8}, 0x8df}, {{0x0, 0x0, &(0x7f0000003a40)=[{&(0x7f0000002700)=""/191, 0xbf}, {&(0x7f00000027c0)=""/10, 0xa}, {&(0x7f0000002800)=""/2, 0x2}, {&(0x7f0000002840)=""/182, 0xb6}, {&(0x7f0000002900)=""/198, 0xc6}, {&(0x7f0000002a00)=""/46, 0x2e}, {&(0x7f0000002a40)=""/4096, 0x1000}], 0x7, &(0x7f0000003ac0)=""/85, 0x55}, 0x5}], 0x7, 0x2000, &(0x7f0000003d00)) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x91, 0x63) 11:40:33 executing program 5: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x10000) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xfc00}, 0x1c) 11:40:33 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x10000) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x6, 0x4) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f00000000c0)=0xffff, 0x4) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0x10001, 0x4) 11:40:33 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x101000) sendto$ax25(r0, &(0x7f00000003c0)="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", 0x12b, 0x0, 0x0, 0xfe44) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000300)=""/64) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000140)={0x0, 0x4, 0x24fc, [], &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000040)={0x10000, 0xffff, 0x406}) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000200)=0x8) 11:40:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x3, 0x0, 0x2, 0x0, 0x0, 0x7}, &(0x7f0000000040)=0x20) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:34 executing program 0: r0 = memfd_create(0x0, 0x0) r1 = semget(0x0, 0x2, 0x1) semtimedop(r1, &(0x7f0000000240)=[{0x0, 0x3fc, 0x4}, {0x7, 0x7}], 0x2, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)=0x7) 11:40:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xfe80}, 0x1c) 11:40:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x92, 0x63) 11:40:34 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) prlimit64(r0, 0x3, &(0x7f0000000040)={0x100}, &(0x7f0000000080)) 11:40:34 executing program 1: syz_open_dev$loop(0x0, 0x7, 0x4000) memfd_create(0x0, 0x0) socketpair(0x9, 0x0, 0x20, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000140)={'mangle\x00', 0xb, "b7dd98d19253d6ac023db8"}, &(0x7f0000000180)=0x2f) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_gettime(r1, &(0x7f0000000040)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = semget$private(0x0, 0x1, 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000000c0)={'veth0_to_bridge\x00', {0x2, 0x4e20, @broadcast}}) semtimedop(r2, &(0x7f0000000000)=[{0x0, 0x20, 0x17ff}, {0x0, 0xab7b, 0x800}, {0x0, 0x0, 0x17fc}, {0x0, 0x6, 0x1800}, {0x1, 0x401, 0x1000}, {0x3, 0x6, 0x1000}, {0x2, 0x100, 0x1000}], 0x7, 0x0) 11:40:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000500)={"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"}) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x93, 0x63) 11:40:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xfec0}, 0x1c) 11:40:34 executing program 5: semtimedop(0x0, &(0x7f0000000000)=[{0xfffffffffffffffe, 0x3ff}, {0xfffffffffffffffe, 0x8001, 0x2}], 0x2aaaaaaaaaaaac04, 0x0) pselect6(0x40, &(0x7f0000000040)={0x7fff, 0x2, 0x7b8, 0xf052, 0x4, 0x1, 0x8, 0x20000}, &(0x7f0000000080)={0x3, 0x9307, 0x643fb8d3, 0x3, 0x2, 0x6, 0x7fffffff, 0x48}, &(0x7f00000000c0)={0xadd, 0x4, 0x7, 0x6, 0x4, 0x3, 0x8001, 0x9}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={0x8}, 0x8}) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40000, 0x80) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x10001) 11:40:34 executing program 1: r0 = syz_open_dev$loop(0x0, 0x1, 0x100) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) fdatasync(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') write$P9_RXATTRWALK(r1, &(0x7f0000000040)={0xf, 0x1f, 0x1}, 0xf) 11:40:34 executing program 0: r0 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r1 = socket$isdn_base(0x22, 0x3, 0x0) r2 = socket(0x8, 0x3, 0x1) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x3, 0x4) getsockopt$sock_int(r1, 0x1, 0x3f, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={0x0, 0xda, 0x10001, 0x4, 0xd4f2, 0x5e, 0x2, 0x5, {0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x4, 0x0, 0x401, 0x2, 0x10000}}, &(0x7f00000003c0)=0xb0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000400)={r3, 0x3}, &(0x7f0000000440)=0x8) sendmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)="29f35bf5dea87ad8b24662d62628401fedcc9d150cfd56f7a489592b56ccde105652dd823b03cc5fdc3cbc4712e35374d471f41c856b3a9004f2d5041ef16d78ab194d63e71cdf55b0b8baed7c91a2f58e37ba46a9e70c71d5e1f5e530eb889871a27c", 0x63}, {&(0x7f0000000140)="0f5a8f4c11aecb6e08df47614916016c8b05ca61322abf679846c48ed81d6529e06ca00641c0bf1c7cc9a8b17d40705f527d1ef7e8c06d227b221a353b7e96f469af63859c5d68f8ac2dba337d9a1906b88e178e4377fc97", 0x58}, {&(0x7f00000001c0)="d0306db8e14f87c20999c424e961048c2114304d2567292737b7da4eff8602989ddc5358fdd670b6b72fc3cf27482efa0ecf062d57c8236ab2e4bfda3e39ec186a213bc49ce88e340e48878154f47e4a57399cb8779b79080ab3086bbf1b2ac9cc2b0c81cbc089a326", 0x69}], 0x4}, 0x9}], 0x1, 0x44000) 11:40:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000380)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x2, {0xa, 0x4e24, 0xff, @local, 0x5d}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000003c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r5}}, 0x18) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40030}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="9c010018", @ANYRES16=r6, @ANYBLOB="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"], 0x180}, 0x1, 0x0, 0x0, 0x4000014}, 0x4040090) sendfile(r1, r2, 0x0, 0x2000006) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r1, 0x0, 0x6, &(0x7f0000000400)='bcsf0\x00', 0xffffffffffffffff}, 0x30) r7 = getpid() syz_open_procfs(r7, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xff00}, 0x1c) 11:40:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x94, 0x63) 11:40:34 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x400) fallocate(r0, 0x1, 0x6, 0x100000000) open(&(0x7f00000001c0)='./file0\x00', 0x145000, 0x100) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, r1, 0x2, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x7f7]}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="4faddd4087a9f65d4410d3042ba7a7ba"}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x2]}]}, 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x4040010) 11:40:34 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r0 = semget(0x3, 0x7, 0xd1) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x3ff, 0x1800}, {0x0, 0x0, 0xfffffffffffffffc}], 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) 11:40:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r4) sendfile(r3, r1, 0x0, 0x8) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) pkey_alloc(0x0, 0x2) 11:40:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xff0f}, 0x1c) [ 1102.019799][ C0] net_ratelimit: 4 callbacks suppressed [ 1102.019810][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x95, 0x63) 11:40:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000), 0x8) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1102.200301][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:35 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = request_key(&(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)=')-vmnet1/+\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="253a338df32f420c6770993a8f93669d9ad828a26d7bbe8bf028bb4f98e426fa2c68a4fba1c1674c428fbb373f6d47ca736e114acd41805ed8796e8ef69b754b50a30be4af6edc66440ca82334dacb7ca0a8dc2af6d1d338cd3b23d25b52719b3a7b144b91b600c01c0ef562df769388b91acf9b863da2c6749de2c04c2601873b852caba17c6a3dc842f81fb455e8fbd680b50985c98cc1be09508fd90bf8c31c509bb5d6b42644c64a26794ded01bf9bfe76d37d9c417400daf70b1683cd21418261586c01ef41b4043710e9624e4a7c7e1904b699c53c576e5742660eabd472d05015b52d8790bb9c4f", 0xeb, r1) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x3cf, 0x100) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) r4 = getuid() r5 = geteuid() stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0, 0x0}, &(0x7f00000008c0)=0xc) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f0000000900)={{}, {0x1, 0x7}, [{0x2, 0x1, r2}, {0x2, 0x4, r3}, {0x2, 0x6312f3ac07c4c06e, r4}, {0x2, 0x3, r5}, {0x2, 0x2, r6}, {0x2, 0x2, r7}, {0x2, 0x2, r8}], {0x4, 0x1}, [{0x8, 0x2, r9}, {0x8, 0x1, r10}, {0x8, 0x3, r11}], {0x10, 0x5}, {0x20, 0x4}}, 0x74, 0x1) 11:40:35 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U+'}, 0x28, 0x3) 11:40:35 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xff, 0x101200) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)=0x6, 0x4) 11:40:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xffb8}, 0x1c) 11:40:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x96, 0x63) 11:40:35 executing program 5: semget$private(0x0, 0x3, 0x80) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000740)=0x5) r1 = semget$private(0x0, 0x3, 0x20) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x20000) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1040880, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x2}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '-proc[/selinux-#nodev#'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x62, 0x37, 0x7a, 0x0, 0x65, 0x31, 0x7f], 0x2d, [0x77, 0x7f, 0x65, 0x38], 0x2d, [0x34, 0x62, 0x7f, 0x39], 0x2d, [0x0, 0x77, 0x0, 0x75], 0x2d, [0x62, 0x35, 0x0, 0x38, 0x33, 0x63, 0x32, 0x7a]}}}]}}) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000500)=@assoc_id=0x0, &(0x7f0000000540)=0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000580)=@sack_info={0x0, 0x2, 0x7f}, &(0x7f00000005c0)=0xc) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000600)={r5, 0xfff, 0x545fc009, 0x5ac029e5, 0x2, 0x19928957, 0x10000, 0x101, {r6, @in6={{0xa, 0x4e23, 0x33, @remote, 0x100000000}}, 0x8000000000000000, 0x800, 0x7, 0x3, 0x3}}, &(0x7f00000006c0)=0xb0) r7 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x5d3200) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f00000000c0)=0x7) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r7, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) semtimedop(r1, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x1, 0x0, &(0x7f0000ffd000/0x1000)=nil}) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) fcntl$setsig(r3, 0xa, 0x3d) r5 = syz_open_procfs(0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r5, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x6, 0x7, 0x8}}, 0x28) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:35 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x40, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) memfd_create(0x0, 0x3) [ 1102.847620][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x97, 0x63) 11:40:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x20000}, 0x1c) 11:40:35 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x3, @mcast2, 0x3}}}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000280)={r1, @in={{0x2, 0x4e20, @broadcast}}, 0xc, 0x6}, &(0x7f0000000200)=0x90) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x98, 0x63) 11:40:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000000)={0x3, 0x9, 0x5, 0x80, 0xffffffffffff5d6c}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1103.052852][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x99, 0x63) 11:40:36 executing program 0: memfd_create(0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200000, 0x20) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000040)={0x100, 0x3, 0x1}) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x24070}, 0x1c) 11:40:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x9a, 0x63) 11:40:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000000)={0x2, 0x2, 0x7, 0x697b, 0x1}) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:36 executing program 5: r0 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80800) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x100}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r1, 0xfffffffffffffe6a, 0x101, 0x6, 0x5, 0x2}, 0x14) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x400, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001180)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000001280)=0xe8) bind$packet(r2, &(0x7f00000012c0)={0x11, 0x1d, r3, 0x1, 0x8, 0x6, @local}, 0x14) [ 1103.794164][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x9b, 0x63) 11:40:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x50000}, 0x1c) 11:40:36 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000200)={0x3, 0x7fff, 0x93da, 0x2, 0x9, 0x7, 0x4, 0x0, 0x3, 0x7fff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0xfffffffffffffff8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r1, @in={{0x2, 0x4e22, @multicast1}}, 0x2, 0x4, 0x3, 0x4, 0x3}, 0x98) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x102, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) fsetxattr$security_smack_entry(r2, &(0x7f0000000500)='security.SMACK64MMAP\x00', &(0x7f0000000540)='/proc/capi/capi20\x00', 0x12, 0x3) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000040)={0x7fffffff}) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000440)=""/172) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) 11:40:36 executing program 1: r0 = socket(0x5, 0x4, 0x7fff) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000004100)='/dev/full\x00', 0x2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000004140)={0x7}, 0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000300)={0x0, 0xba, "a899b3f3ca939b7e97ed1c96293d578bc7000897cbfd71a406cd2ce0347577b183b2661f6aa26c5ca111320704f40277d3429ecf21d97c2d0abb80fc159020062ba29f0967ef2cf05dc1aa331ba01f34f6795f73be2065a071ca76daa11718f94c347b2df567159fea65bc56ebc0d54acb7c65887f8904b761c15b3f92d805270df37ad9d71c10b4fa2a83facfb30c581c8042545aa400796c1608a986ae8239e657f3bd85a50800d4aa12a92c3cf2f12792278612fe3a896755"}, &(0x7f0000000400)=0xc2) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={r2, 0x439}, 0x8) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x3ff}, {}], 0x2, 0x0) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f0000000000)={0x0, 0x8, 0x4, 0x8, &(0x7f0000ffe000/0x2000)=nil, 0x7}) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000200)="f685c226fd76f80058d6e2ad877ff24a3ef30f1dc7f2d3f165e1221a021963a6220ea273b7c12c6c04a757c7f17a723d4e0d6a306e4c3ef4ae1d267c7660a7fa78b7d5dfb8bc0ee27e8be9456f410290659bb95d701045509de332e452f8ce0b62db23c3665e3b8f76e7a70411fea1b8bd1bbfbd0bc6bfd35eb0c112d493027dc11d6d9f42996605b8901acffa1b0ff9f544dc86eb03fdca65e956fbf754ad60e61c5c952c501d98978cc162efa63e9870e0c7dbd6e2e50d53cb848d42ce39d3c591a078035c8344996621fdf5fffb586a7a57bcbf7e898be6ae687f2c2d9df36a9ab526af737bf87b588b") 11:40:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) write$evdev(r1, &(0x7f0000000000)=[{{0x77359400}, 0x0, 0x9, 0x8}], 0x18) ioctl$KVM_NMI(r1, 0xae9a) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000040)={0x4, 0xffff, [{0x5, 0x0, 0x3ff}, {0x0, 0x0, 0x80000000}, {0x6920, 0x0, 0xffffffff}, {0x1, 0x0, 0x4}]}) [ 1103.996274][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x9c, 0x63) 11:40:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x1000000}, 0x1c) [ 1104.176939][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:37 executing program 0: memfd_create(0x0, 0xfffffffffffffffc) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x9d, 0x63) 11:40:37 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) lseek(r0, 0x0, 0x3) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) 11:40:37 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0xc4) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x2000000}, 0x1c) 11:40:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000080)='.dead\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='vmnet1\x00', 0xfffffffffffffff8) keyctl$read(0xb, r5, 0x0, 0x11e) [ 1104.777124][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x3000000}, 0x1c) 11:40:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x9e, 0x63) 11:40:37 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl(r0, 0x8, &(0x7f0000000040)="296cc8151049bef87d14") semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0xc000, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000340)=0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x4b1}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000200)={r2, 0x9}, &(0x7f0000000280)=0x8) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f00000000c0)={0x0, 0x8}) 11:40:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x400, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) readahead(r4, 0x1, 0x6) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r2) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) r7 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x40002) ioctl$BLKIOMIN(r7, 0x1278, &(0x7f0000000040)) keyctl$read(0xb, 0x0, 0x0, 0x0) eventfd2(0x0, 0x80000) write$P9_RLOPEN(r5, &(0x7f0000000100)={0x18, 0xd, 0x1, {{0x8, 0x2, 0x2}, 0x3}}, 0x18) [ 1104.913113][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x4000000}, 0x1c) 11:40:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x9f, 0x63) [ 1105.048913][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:38 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x8001, 0x7, &(0x7f0000000580)=[{&(0x7f0000000080)="132104cb7428f322a6792319e7c4ff8ae220bd9700adb6fd25627a5aaa4c82d3d9e259f4dff478ee08c94d222b95e2b58762965b8ed6d740ee23c052b1520b12e52ca9d14caf368af0707f01b8de6fc793bc54ee79b5ed693de9e32fd776653ac0dee5f0677675fc4cd7617a2e382cae27723abb98ebeb49f11fbe3df954e8f8310366d702308302", 0x88, 0xff}, {&(0x7f0000000140)="fcd6afdab1c48cf4669cf37355c9a2e5b535f19d80ead6723565b4f4fb2c717d393b", 0x22, 0x3400000000000}, {&(0x7f0000000180)="99b41d0807110ef33eca256ac7cdfb231a3f3229c04693001ea8a28a62386137493ad3850e0b8abc3d9e9ebe45ebabaeed6cf482620e293610813c8e4fd19faaf6590a876f5b2088ab5339524cd37fcaede2b04bd8df1a73aef6ba44567772e59b70419a50806727f6e4f7333181880114a53e8bc619cf1d2d640672eb88e7c77d71e996aa1ddde2ca558a455d", 0x8d, 0x1}, {&(0x7f0000000280)="dfb23d0cca6153bd9c8b83849ff86bb9330dde85b3a630e0c357202207b3c65c93d47d0e35624897c8eff061e1e4796ece032975b01cae4ef268ce3487ce402c28eccd6d3327e4ff60e75ca10a8917e420bfbe32985b92a2020f8c4e3a6bca8e0ac91225f84f43d0df32a6121dadd534b335117aa554533376d254d70ee460078ea6f21c78bb162192fa17a6703620fcd386818784e2c8875f5ff2a98db15f155720ed81e611b93cb2d48c1761c6755e6c5ac4c4cce7436a5db38ae826f81f5bd6461d2105649dc6dd119b41dd1fb93671b781a0fc031d740e9957fe549ae2eebc1312d80c82ad48c5dab666de08c5", 0xef, 0x800}, {&(0x7f0000000380)="59b32fb90ffa46809249672c90fb8d2d7701e3c3b201a620bb54da312e71db76d6834f830f8119285134bb9482d808ab3b6da4a2f6e0951f5172c9f5fc3e2c95baf384d317694710c95cda01b59e406fa1a4bbd9466cfae9fe759c03f72497630119c6cb689d466cd29a", 0x6a, 0x7}, {&(0x7f0000000400)="da85f188fa49af7f723f87214426a54a0d6bd3c1451f10f04b21fdc39773117070273dd03fe7c6de90d6751e8c6f1c6563156ec29232f7acae3745147848657ad2b5bb4b73679506f4a1d85759471ff0a7cfb988dfffb1f215b913a6264dddb69241249d4301266de43a5bec2bcf6493d934b6800f49797c04b89f489f8e7fad70d1a0392820f0fa46cf5076ab40f2337088a3d3d28a28e3e29b960e2d7ad23cf95e25121982b5dbb2d11380ca4eda00f6cbd1a6624c7fffd5c78827e8b531ee4969ebf3501c69a9b95cb1797a0b3a2cc3", 0xd1, 0xf640}, {&(0x7f0000000500)="03b0171da2bb014400fff12ea73fa45740e49dccadcea95f625bda9c3c8167654be133ee849d65c4d3577979b01f2852ccb507cdf1fc8da54e57dc84fc8175e969dcef943b6f4cb83bb3ed141ac1d21972e6667a3ea4af0b10", 0x59, 0x7}], 0x42040, &(0x7f0000000640)={[{@errors_recover='errors=recover'}], [{@subj_role={'subj_role'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@smackfshat={'smackfshat'}}]}) 11:40:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r1, 0x0, 0xb, &(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(r6, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x5000000}, 0x1c) 11:40:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xa0, 0x63) 11:40:38 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0xfffffffffffffefd) 11:40:38 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x10000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r1, 0x290}, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) fadvise64(r2, 0x0, 0x1, 0x4) 11:40:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xa1, 0x63) 11:40:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x6000000}, 0x1c) 11:40:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000000)={0x100000001, 0x20000800, 0x0, 0x100000000, 0x0, 0x7fff, 0x6, 0xaa14, 0x8, 0xfff}, 0x10) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:38 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xa76, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x20000, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="66b9800000c00f326635001000000f30660f380009f082360018ac0f06baf80c66b80a01018e66efbafc0cb8eed0ef660f3a62c22566b9e30a000066b80000000066ba010000000f30660f9b930500b808008ec0fd", 0x55}], 0x1, 0x13, &(0x7f0000000140)=[@dstype0={0x6, 0x6}, @dstype3={0x7, 0x8}], 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000180)=[@in={0x2, 0x4e22, @multicast1}], 0x10) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x4, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4000010) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000380)={r1, r1, 0xc6eb, 0x21, &(0x7f0000000340)="97b1d5f5dfdf25840d4f1f6dc065e68de78ad7634007fc718ba2e3f74508f55492", 0x4, 0x6, 0x598, 0x3f, 0x4, 0x1, 0x6, 'syz0\x00'}) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10064000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r2, 0x200, 0x70bd25, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x20000000) 11:40:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xa2, 0x63) 11:40:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x7000000}, 0x1c) 11:40:39 executing program 0: memfd_create(0x0, 0x7) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:39 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x9) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x2000, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f00000000c0)=0x1, 0x4) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x200) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000040)={{0x2, @addr=0x8000000000000000}, 0x8, 0x3, 0x1}) 11:40:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x8000000}, 0x1c) 11:40:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xa3, 0x63) 11:40:39 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000280)='/dev/nbd#\x00', 0x0, 0x40) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f00000002c0)={0x1, 0x3e, 0x1}) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000200)={0x3, 0x9, 0x1, 0x7fffffff}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0x7ff, 0x3, "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", 0xd4, 0x1, 0x5, 0x1, 0xd2aa, 0x7d, 0xfc, 0x1}, r2}}, 0x128) 11:40:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x620840, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x7) r5 = socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r6) sendfile(r1, r2, 0x0, 0x2000006) fcntl$getownex(r3, 0x10, &(0x7f0000000040)) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r1, 0x0, 0x5, &(0x7f0000000140)='eth1\x00'}, 0x30) syz_open_procfs(r7, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xa4, 0x63) 11:40:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x9000000}, 0x1c) 11:40:39 executing program 5: timer_create(0x0, &(0x7f0000000000)={0x0, 0x41, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x989680}}, &(0x7f00000000c0)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getuid() getresuid(&(0x7f0000000200), &(0x7f0000000300), &(0x7f0000000340)=0x0) mount$9p_xen(&(0x7f0000000100)='md5sumvboxnet0#\x93\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x2000018, &(0x7f0000000380)={'trans=xen,', {[{@afid={'afid', 0x3d, 0xff}}, {@mmap='mmap'}, {@dfltuid={'dfltuid', 0x3d, r1}}, {@afid={'afid', 0x3d, 0xffffffffffffffaa}}, {@loose='loose'}], [{@euid_lt={'euid<', r2}}, {@pcr={'pcr', 0x3d, 0x12}}, {@fsuuid={'fsuuid', 0x3d, {[0x73, 0x7f, 0x31, 0x77, 0x37, 0x76, 0x3f, 0x62], 0x2d, [0x38, 0x0, 0x76, 0x33], 0x2d, [0x35, 0x35, 0x32, 0x72], 0x2d, [0x36, 0x34, 0x76, 0x35], 0x2d, [0x0, 0x31, 0x33, 0x73, 0x0, 0x0, 0x61, 0x76]}}}, {@uid_eq={'uid', 0x3d, r3}}]}}) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x9}, {0x3, 0x1, 0x1800}], 0x2, 0x0) 11:40:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xa5, 0x63) 11:40:39 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000080)=""/17) unlink(&(0x7f0000000000)='./file0\x00') semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xa000000}, 0x1c) 11:40:40 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x6, 0x100000000, 0x800}, {0x1, 0x80000001, 0x800}, {0x5, 0x80000001, 0x800}, {0x1, 0x5, 0x800}, {0x0, 0x0, 0x800}, {0x3, 0x4, 0x1800}, {0x2, 0x3, 0x1000}], 0x7, 0x0) 11:40:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000200)={{0x3, 0x0, 0x80000001, 0x0, 0x8000}, 0x9, 0x10001, 'id1\x00', 'timer0\x00', 0x0, 0x3, 0x3, 0xfffffffffffffffa, 0x2}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:40 executing program 5: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = getpid() wait4(r0, &(0x7f0000000100), 0x40000003, &(0x7f0000000140)) wait4(r0, &(0x7f0000000200), 0x8, &(0x7f0000000280)) 11:40:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xa6, 0x63) 11:40:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xd527f97}, 0x1c) [ 1107.653780][ C0] net_ratelimit: 6 callbacks suppressed [ 1107.653791][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xa7, 0x63) 11:40:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xe000000}, 0x1c) 11:40:40 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x3, 0x200000) memfd_create(0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x525401, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x4, 0x4) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f00000001c0)='/dev/vcsa#\x00') setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000140)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 11:40:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:40 executing program 5: semtimedop(0x0, &(0x7f0000000240), 0x2e, 0x0) [ 1107.868279][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xa8, 0x63) 11:40:40 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2aaaaaaaaaaaac88, 0x0) 11:40:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x10000000}, 0x1c) 11:40:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r3}, 0x20) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r2, r4, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xa9, 0x63) 11:40:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1108.052422][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x12000000}, 0x1c) 11:40:41 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x1) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r1, 0x110, 0x5, &(0x7f0000000000)=[0x1, 0x2], 0x2) 11:40:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xaa, 0x63) [ 1108.225516][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:41 executing program 0: memfd_create(0x0, 0x0) clock_gettime(0x1, &(0x7f0000000080)) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = semget(0x1, 0x1, 0x490) semtimedop(r0, &(0x7f0000000000)=[{0x2, 0x9, 0x1000}, {0x2, 0x0, 0x1000}], 0x2, &(0x7f0000000040)={0x77359400}) 11:40:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffd) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x22c}], 0x31f, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) fstat(r3, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', r5, r6) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x18020000}, 0x1c) 11:40:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r3}, 0x20) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r2, r4, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xab, 0x63) 11:40:41 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20840, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000040)={0x0, 0x800000000000000}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) 11:40:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xac, 0x63) [ 1108.750255][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x20000000}, 0x1c) 11:40:41 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffffffffffff0000, 0x44cc01) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) memfd_create(0x0, 0x4) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x3, 0x0, 0x2}], 0x1, 0x0) 11:40:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xad, 0x63) 11:40:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) r5 = syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000000)={0x2000, 0xd000}) 11:40:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r3}, 0x20) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r2, r4, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1109.000686][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:42 executing program 0: memfd_create(0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000040)='syz1\x00') semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:42 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x3) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x381440, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xae, 0x63) 11:40:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x3f000000}, 0x1c) 11:40:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) syz_open_procfs(r5, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r3}, 0x20) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r2, r4, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) 11:40:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xaf, 0x63) [ 1109.737811][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x40000000}, 0x1c) 11:40:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xb0, 0x63) 11:40:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r3}, 0x20) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r2, r4, 0x0, 0x2000006) 11:40:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="04000011", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000040)=0x14) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={r6, 0xffff, 0x401, 0x2, 0x3, 0x3}, 0x14) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xb1, 0x63) [ 1109.938548][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:43 executing program 0: semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x40020000}, 0x1c) 11:40:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r3}, 0x20) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r6 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) 11:40:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xb2, 0x63) 11:40:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) sched_yield() pwritev(r4, &(0x7f0000000480)=[{&(0x7f0000000100)='+'}], 0x0, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000000)={[{0x3, 0x0, 0x7, 0x300000000000000, 0xfffffffffffffffd, 0x5, 0x8, 0x7, 0x4, 0x200, 0x100000000, 0x7ff, 0xe66}, {0x0, 0x0, 0x4, 0x101, 0x10001, 0x4e, 0x7, 0x453, 0x7, 0x1, 0xffff, 0x1, 0x4}, {0x9, 0x7, 0x1, 0x2, 0x0, 0x8000, 0x833, 0x2, 0x0, 0x7, 0x2, 0x1, 0x800}], 0x8}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:43 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x100) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffffffff94e4, 0x80) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000180)={r1, &(0x7f0000000080)=""/254}) [ 1110.628442][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x54000000}, 0x1c) 11:40:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xb3, 0x63) 11:40:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r2}, 0x20) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 11:40:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) fadvise64(r0, 0x0, 0x5, 0x5) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r4, 0x0, 0x200000b) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1110.786459][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x70400200}, 0x1c) 11:40:43 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffff, 0x8402) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000040)="3e0169e483c79bb923fd6974ec2ee3cf6aecb9d3120cf7050b940ab3bb55af05dba81c74a05cee733001b0fa6faf22248e5687c0ce04a318af8290ab20cd87cbf472729e4b3d161ca03ce378effd04886054bbaf99724bd805dc9a27003072e17dbe4af36d3c29f2a0247352b6978b4d70dcd9661ee9ae437f52cc634651720262b38a4958d56fbf7de52d053aa2608610a747e75979ea1a35b0f1dae3560609dbf5608f1f63ee8379b72ce7c2af") memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x200000, 0x4}], 0x2, 0x0) 11:40:44 executing program 0: lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'wlan1posix_acl_accesslomd5sumvboxnet1$\x00'}) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xb4, 0x63) 11:40:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x8dffffff}, 0x1c) 11:40:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008011) r2 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockname$unix(r2, &(0x7f0000000000), &(0x7f0000000080)=0x6e) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000100)=0x10, 0x4) socket$inet(0x2, 0x0, 0x0) r5 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)="2ae75183f91b15a70d87687df7abf8980f8bb6af", 0x14, 0xfffffffffffffffd) r6 = request_key(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)=',!\x8abdev[$em1\x00', 0x0) keyctl$link(0x8, r5, r6) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f0000000140)={0x7, 0x9, 0x9, 0x800, r2}) r7 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r7, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r7) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000180)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000200)={r8, 0x80000, r2}) sendfile(r2, r3, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r2}, 0x20) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) 11:40:44 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x410500, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000280)={{0x2, 0x2, 0x1, 0x1000, '\x00', 0x3}, 0x0, [0x3f, 0x7c00000, 0x200, 0x8, 0x3, 0xfffffffffffffffc, 0x9dc9, 0x3f, 0x234, 0x10000, 0xfffffffffffffc00, 0x0, 0xae3c, 0x56, 0x10001, 0x9, 0x7, 0x131, 0x101, 0x10001, 0x8000, 0x0, 0x4, 0x3, 0x2, 0x8, 0x6, 0xfffffffffffffeff, 0x1, 0x20c, 0x7fffffff, 0x40, 0x4, 0x0, 0x7, 0x1, 0x7bb5, 0x101, 0x9000000000000, 0x1, 0x9, 0x8001, 0x3ff, 0x4, 0x101, 0x2, 0x80, 0xf3, 0x3, 0x0, 0x8, 0x1, 0x1, 0x9, 0x8000, 0x8, 0xffff, 0x9, 0x9, 0x1, 0x8, 0x4, 0x4, 0x70, 0x7, 0x7, 0xe9ec, 0x2, 0x20, 0x3, 0x5, 0x4, 0x4, 0x400, 0x0, 0xffffffffffff063c, 0x3, 0xff, 0x8001, 0x8, 0xffffffff, 0x8, 0x4, 0x6, 0x100, 0x5, 0x3993, 0x277, 0xdbd, 0x6, 0x0, 0xfffffffffffffffe, 0x5, 0x7, 0x8, 0xcf61, 0x401, 0x7, 0x8000, 0x3ff, 0x9, 0x9, 0x8, 0x3ff, 0x20, 0x7, 0x5, 0xffffffff, 0x3, 0x9, 0x400, 0x401, 0x4, 0x6, 0x0, 0x10000, 0x1, 0x7, 0x4, 0xbab, 0x9, 0x3, 0xfffffffffffffffa, 0xd4, 0x7f, 0x100000000, 0x7, 0xedb5], {0x77359400}}) 11:40:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x91ffffff}, 0x1c) 11:40:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xb5, 0x63) 11:40:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r2}, 0x20) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) 11:40:44 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {0x0, 0xfffffffffffffffd, 0x1000}], 0x1, 0x0) pread64(r0, &(0x7f0000000000)=""/128, 0x80, 0x13) 11:40:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0x977f520d}, 0x1c) 11:40:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xb6, 0x63) 11:40:45 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x880, 0x0) memfd_create(0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x3, 0x20, 0x3, 0xb41}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0x7fff, 0x30}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0)={r1, 0x4c, "36ec075d55bcae5db0aa0329736ee47e415d440ca9549aefbf6e526b8217e2f78682ecf6ff95988e72b0022029fbfd0348a5630ae6be1d0c96a4b4e32add27da97a7cadf444b81632c1c399e"}, &(0x7f0000000140)=0x54) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xb8ff0000}, 0x1c) 11:40:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xfffffffffffffffd) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/115, 0x73) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:45 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x8a80, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) socket$inet6_udp(0xa, 0x2, 0x0) 11:40:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r2}, 0x20) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) 11:40:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xb7, 0x63) 11:40:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xb8, 0x63) 11:40:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xc4ffffff}, 0x1c) 11:40:45 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x2, r3, 0x10, 0x1, @in={0x2, 0x4e22, @empty}}}, 0xa0) write$P9_RGETATTR(r0, &(0x7f0000000280)={0xa0, 0x19, 0x1, {0x80, {0x0, 0x1, 0x8}, 0x8a, r1, r2, 0x1, 0x20, 0x7a, 0x1f, 0x6, 0x7ff, 0xff, 0xead000000, 0x3, 0x6, 0xadb6, 0xfffffffffffffff9, 0xa8, 0x5, 0x8}}, 0xa0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000440)=0x2) 11:40:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xb9, 0x63) 11:40:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r2}, 0x20) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) 11:40:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r1, r2, 0x0, 0x2000006) fallocate(r3, 0x10, 0x9, 0x1) syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000080)={0x2d}, 0x1) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1112.741419][ C0] net_ratelimit: 5 callbacks suppressed [ 1112.741430][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:46 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000002a40)='/dev/vga_arbiter\x00', 0x180, 0x0) readv(r0, &(0x7f0000002b40)=[{&(0x7f0000002a80)=""/153, 0x99}], 0x1) memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x1000}, {}], 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x800, 0x40000) setsockopt$inet6_tcp_buf(r1, 0x6, 0xc290fc14c86c85b0, &(0x7f00000000c0)="bd0362ba8cdaf5523ef54adeafd13cdcc561f5731ae4dfddab87de2feceb3000596578602729ef6ef769956917df09472c11f85b335825b1965da659897dd08e0e0d15b58f5503ca20941a35172f3cbf65f43fae56c4c04b615c7216f6d866ea9b986fe3c6a0a35122edbf2ac0210263be703a374c73a6644cba21c4a259456584c88514dea7895842ed0036524e62f75f7c3929adca66bc3ce89e8b6df242561129ffc02937faad045ed9cfb764dde31cea29ef90", 0xb5) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000040)={0x57, 0x8, 0x9, {0x4, 0x3}, {0x800, 0xfffffffffffff3e3}, @rumble={0x1, 0x1000}}) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000080)={0x4, 0x9d, 0x2b, 0x9, 0x4, 0x101, 0xf6a9, 0x7, 0x2000000000007, 0x8, 0x401, 0x5}) 11:40:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xba, 0x63) 11:40:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000)=0x4, 0x4) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000200)=""/251) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:46 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$getenv(0x4201, r0, 0x400, &(0x7f0000000040)) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x42, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, &(0x7f00000000c0)={0x20, 0x5, 0x3}) flistxattr(r1, &(0x7f0000000100)=""/137, 0x4e) memfd_create(0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f0000000380)={0x80000, 0x1, 0xfffffffffffffff9, 0x4a, &(0x7f00000001c0)=""/74, 0x0, &(0x7f0000000280), 0xa5, &(0x7f00000002c0)=""/165}) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video1\x00', 0x2, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xdc7f0000}, 0x1c) 11:40:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r2}, 0x20) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 11:40:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xbb, 0x63) [ 1113.435945][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r2}, 0x20) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 11:40:46 executing program 0: memfd_create(0x0, 0x0) r0 = socket$inet6(0xa, 0x80000, 0xa427) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x1, 0x200) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @loopback}, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e24, @empty}, 0x2, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)='ip6gretap0\x00', 0x6, 0x3, 0x80}) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xe8030000}, 0x1c) 11:40:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xbc, 0x63) 11:40:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r2, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:net_conf_t:s0\x00', 0x20, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x1, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000140)={r6, 0x8001}, &(0x7f0000000180)=0x8) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r2}, 0x20) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) [ 1113.669178][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xbd, 0x63) 11:40:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xeffdffff}, 0x1c) [ 1113.871188][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:47 executing program 1: syz_open_dev$loop(0x0, 0x200, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x109000) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) memfd_create(0x0, 0x0) r1 = semget(0x0, 0x3, 0x4) semtimedop(r1, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x9, 0x3ff, 0x9, 0x7f, 0x6, 0x8000, 0x40, 0x8000, r2}, 0x20) 11:40:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xbe, 0x63) 11:40:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) getpid() r5 = getpgid(0x0) syz_open_procfs(r5, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xf4010000}, 0x1c) [ 1114.318268][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:47 executing program 0: memfd_create(0x0, 0x7) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x400000) connect$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x80, {0x52c3, 0x4, 0x8, 0x2, 0x100000001, 0x9}, 0xd6, 0x5}, 0xe) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000180)={r0, r0, 0x3, 0x26, &(0x7f0000000140)="445a032a083498bb1dd3281d880196d13d1411b75bd18b93db61df4e9f0667819a0358300a4d", 0x76f08955, 0x8000, 0x40, 0xfffffffffffffe00, 0x5, 0x0, 0x2, 'syz1\x00'}) setsockopt$inet_dccp_buf(r0, 0x21, 0x2, &(0x7f0000000040)="f449067538e9f7e4aad141a1d01a3e3ab28535d1abba8731a41ed2c70ed5c9c24be82a4555fe0b493078229cec8d74443a2e1eef751551de8c601f7e525f159d3611d41ca7909e9c93082ba6c8dac8f2a8b042aad6d713e3e9737097e315dc3885f6df8ae8d0ff23a07cd9b3b57b8e4356bb100b55cf6da4a86e5ebca41ddcbe20", 0x81) r1 = semget$private(0x0, 0x3, 0x200) semtimedop(r1, &(0x7f00000002c0), 0x0, 0x0) 11:40:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000140)=0x8) 11:40:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xbf, 0x63) 11:40:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xf5ffffff}, 0x1c) 11:40:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xc0, 0x63) 11:40:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800010c0045005, &(0x7f0000000040)=0x34) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) 11:40:48 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x210000, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x446c00, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000040)=0x322, 0x2) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) 11:40:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xfaff50fd}, 0x1c) 11:40:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xc1, 0x63) 11:40:48 executing program 0: r0 = memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x2, 0x1, 0x8, 0x798444d0, 0x7}, &(0x7f0000000180)=0x14) 11:40:48 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800010c0045005, &(0x7f0000000040)=0x34) 11:40:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_STATFS(r1, &(0x7f0000000000)={0x60, 0xffffffffffffffda, 0x1, {{0x2, 0x6, 0x3, 0x3, 0x100000000, 0x5, 0x80000001, 0xfffffffeffffffff}}}, 0x60) r4 = socket$inet(0x2, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x0, 0x41, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x24) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xfc000000}, 0x1c) [ 1115.327332][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xc2, 0x63) 11:40:48 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) ioctl$int_in(r0, 0x800010c0045005, &(0x7f0000000040)=0x34) 11:40:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r4 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000000)={0x10200, 0x3, 0x5001, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) sendfile(r1, r2, 0x0, 0x2000006) syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 11:40:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xc3, 0x63) [ 1115.475391][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xfd50fffa}, 0x1c) [ 1115.581115][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:49 executing program 1: memfd_create(0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000003040), 0xfcdc) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) bind$unix(r0, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e) 11:40:49 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) ioctl$int_in(r0, 0x800010c0045005, &(0x7f0000000040)=0x34) 11:40:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xc4, 0x63) 11:40:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xfe800000}, 0x1c) 11:40:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) accept4$inet(r1, &(0x7f0000000080), &(0x7f0000000100)=0x10, 0x80800) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r5 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000480)=[{&(0x7f00000004c0)='+', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r5) sendfile(r2, r2, 0x0, 0x7ffffffd) r6 = syz_open_procfs(0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) poll(&(0x7f0000000000)=[{r6, 0x620}, {r3, 0x4000}, {r5, 0x4020}, {r3, 0x4000}, {r3, 0x4002}], 0x5, 0x7) 11:40:49 executing program 0: memfd_create(0x0, 0x0) semtimedop(0x0, &(0x7f0000000240)=[{0x0, 0x3ff}, {}], 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x8000, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x0, @empty, 0x4e22, 0x0, 'lblc\x00', 0x33, 0x10001, 0x46}, 0x2c) ioctl$KDSETMODE(r0, 0x4b3a, 0x80000001) [ 1116.241957][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:40:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xc5, 0x63) 11:40:49 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) ioctl$int_in(r0, 0x800010c0045005, &(0x7f0000000040)=0x34) [ 1116.327165][T27315] page:ffffea0002812240 count:0 mapcount:0 mapping:0000000000000000 index:0x0 11:40:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xfec00000}, 0x1c) 11:40:49 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = add_key(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="e34a709a40579384574eb33f695344413455520dd7d35a632105bbd23fdfde5a5d119a39a1c8", 0x26, 0xffffffffffffffff) keyctl$get_security(0x11, r0, &(0x7f0000000140)=""/166, 0xa6) memfd_create(0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, r1, 0x2) [ 1116.371493][T27315] flags: 0x1fffc0000000000() 11:40:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xc6, 0x63) [ 1116.394411][T27315] raw: 01fffc0000000000 ffffea00025229c8 ffffea00023f5408 0000000000000000 [ 1116.411215][T27315] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 11:40:49 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800010c0045005, &(0x7f0000000040)=0x34) [ 1116.446941][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1116.454128][T27315] page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) 11:40:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000005a00)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000007c0)=""/246, 0xf6}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0xc7, 0x63) 11:40:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='dctcp\x00', 0x107) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @rand_addr, 0xff000000}, 0x1c) 11:40:49 executing program 1: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x20000, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e21, @remote}, 0x10) semtimedop(0x0, &(0x7f0000000240)=[{0x800000000000, 0x4}, {}], 0x1, 0x0) bind$isdn_base(r1, &(0x7f0000000000)={0x22, 0x101, 0x1, 0xfff, 0x1}, 0x6) sync() ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000040)={0x1000000000000000, 0x2, 0x9, 0x5, 0x8}) epoll_create1(0x80000) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) [ 1116.512849][T27315] ------------[ cut here ]------------ [ 1116.518351][T27315] kernel BUG at include/linux/mm.h:579! [ 1116.578317][T27315] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1116.584441][T27315] CPU: 0 PID: 27315 Comm: syz-executor.4 Not tainted 5.0.0-rc7-next-20190225 #42 [ 1116.593550][T27315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.603618][T27315] RIP: 0010:generic_pipe_buf_release+0x120/0x160 [ 1116.609945][T27315] Code: bd ff 4c 89 e7 e8 60 44 db ff e8 db 28 bd ff 5b 41 5c 41 5d 5d c3 e8 cf 28 bd ff 48 c7 c6 e0 98 75 87 4c 89 e7 e8 90 dc e4 ff <0f> 0b e8 b9 28 bd ff 4d 8d 65 ff e9 3d ff ff ff 48 89 df e8 58 f9 [ 1116.629545][T27315] RSP: 0018:ffff88805823f920 EFLAGS: 00010212 [ 1116.635618][T27315] RAX: 0000000000040000 RBX: ffffea0002812274 RCX: ffffc9000e850000 [ 1116.643593][T27315] RDX: 0000000000038cbd RSI: ffffffff81982c42 RDI: ffffea0002812278 [ 1116.651695][T27315] RBP: ffff88805823f938 R08: 000000000000003e R09: ffffed1015d05011 [ 1116.659654][T27315] R10: ffffed1015d05010 R11: ffff8880ae828087 R12: ffffea0002812240 [ 1116.667620][T27315] R13: 0000000000000000 R14: ffff8880a66670c0 R15: ffff888088d34940 [ 1116.675576][T27315] FS: 00007f665af3f700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1116.684487][T27315] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1116.691055][T27315] CR2: 00000000004dc1e8 CR3: 00000000a5798000 CR4: 00000000001406f0 [ 1116.699010][T27315] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1116.706964][T27315] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1116.714922][T27315] Call Trace: [ 1116.718201][T27315] iter_file_splice_write+0x7d1/0xbe0 [ 1116.723562][T27315] ? atime_needs_update+0x5f0/0x5f0 [ 1116.728747][T27315] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1116.734729][T27315] ? rw_verify_area+0x118/0x360 [ 1116.739576][T27315] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1116.745541][T27315] direct_splice_actor+0x126/0x1a0 [ 1116.750636][T27315] splice_direct_to_actor+0x369/0x970 [ 1116.755990][T27315] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1116.761533][T27315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1116.767758][T27315] ? do_splice_to+0x190/0x190 [ 1116.772433][T27315] ? rw_verify_area+0x118/0x360 [ 1116.777359][T27315] do_splice_direct+0x1da/0x2a0 [ 1116.782216][T27315] ? splice_direct_to_actor+0x970/0x970 [ 1116.787758][T27315] ? rw_verify_area+0x118/0x360 [ 1116.792606][T27315] do_sendfile+0x597/0xd00 [ 1116.797016][T27315] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1116.802285][T27315] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1116.808509][T27315] ? put_timespec64+0xda/0x140 [ 1116.813273][T27315] __x64_sys_sendfile64+0x1dd/0x220 [ 1116.818457][T27315] ? __ia32_sys_sendfile+0x230/0x230 [ 1116.823726][T27315] ? do_syscall_64+0x26/0x610 [ 1116.828399][T27315] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1116.833668][T27315] ? trace_hardirqs_on+0x67/0x230 [ 1116.838680][T27315] do_syscall_64+0x103/0x610 [ 1116.843266][T27315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1116.849139][T27315] RIP: 0033:0x457e29 [ 1116.853019][T27315] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1116.872607][T27315] RSP: 002b:00007f665af3ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1116.881006][T27315] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1116.888964][T27315] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000005 [ 1116.896918][T27315] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1116.904897][T27315] R10: 000000007ffffffd R11: 0000000000000246 R12: 00007f665af3f6d4 [ 1116.912854][T27315] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1116.920816][T27315] Modules linked in: 11:40:49 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800010c0045005, &(0x7f0000000040)=0x34) [ 1116.938421][T27315] ---[ end trace 73cc896dd358b3db ]--- [ 1116.952567][ T3877] kobject: 'loop5' (00000000c9b4cbcf): kobject_uevent_env [ 1116.957527][T27315] RIP: 0010:generic_pipe_buf_release+0x120/0x160 [ 1116.973961][ T3877] kobject: 'loop5' (00000000c9b4cbcf): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1116.977210][T27315] Code: bd ff 4c 89 e7 e8 60 44 db ff e8 db 28 bd ff 5b 41 5c 41 5d 5d c3 e8 cf 28 bd ff 48 c7 c6 e0 98 75 87 4c 89 e7 e8 90 dc e4 ff <0f> 0b e8 b9 28 bd ff 4d 8d 65 ff e9 3d ff ff ff 48 89 df e8 58 f9 [ 1116.999093][ T3877] kobject: 'loop2' (00000000db007844): kobject_uevent_env [ 1117.009625][T27315] RSP: 0018:ffff88805823f920 EFLAGS: 00010212 [ 1117.017308][T27315] RAX: 0000000000040000 RBX: ffffea0002812274 RCX: ffffc9000e850000 [ 1117.023965][ T3877] kobject: 'loop2' (00000000db007844): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1117.032140][T27315] RDX: 0000000000038cbd RSI: ffffffff81982c42 RDI: ffffea0002812278 [ 1117.037096][ T3877] kobject: 'loop5' (00000000c9b4cbcf): kobject_uevent_env [ 1117.043654][T27315] RBP: ffff88805823f938 R08: 000000000000003e R09: ffffed1015d05011 [ 1117.051554][ T3877] kobject: 'loop5' (00000000c9b4cbcf): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1117.062867][T27315] R10: ffffed1015d05010 R11: ffff8880ae828087 R12: ffffea0002812240 [ 1117.081154][T27315] R13: 0000000000000000 R14: ffff8880a66670c0 R15: ffff888088d34940 [ 1117.105142][T27315] FS: 00007f665af3f700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1117.116018][ T3877] kobject: 'loop0' (00000000a8e95bdc): kobject_uevent_env [ 1117.120026][T27315] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1117.123181][ T3877] kobject: 'loop0' (00000000a8e95bdc): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1117.129841][T27315] CR2: 000000000070d274 CR3: 00000000a5798000 CR4: 00000000001406e0 [ 1117.151862][T27315] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1117.160060][T27315] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1117.171375][T27315] Kernel panic - not syncing: Fatal exception [ 1117.178817][T27315] Kernel Offset: disabled [ 1117.183151][T27315] Rebooting in 86400 seconds..