$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209242", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2092f5", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:53 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:53 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:53 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:53 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:54 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:54 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:54 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:54 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd2"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:54 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 271.111527][T13153] net_ratelimit: 41 callbacks suppressed [ 271.111546][T13153] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:02:54 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 271.242604][T13158] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 271.273792][T13160] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:02:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:55 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd2"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 271.561073][T13181] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:02:55 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 271.613127][T13185] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 271.645187][T13186] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:02:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2092ff", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:55 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:55 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 271.932237][T13207] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:02:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd2"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 271.993285][T13210] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 272.029847][T13214] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:02:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 272.212674][T13227] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:02:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:56 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:56 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac69"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:56 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2092ff", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:56 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac69"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:56 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:56 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "20928d", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:57 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:57 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac69"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2092f5", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:57 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:57 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:57 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:57 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:58 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:58 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:58 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:58 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:59 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:59 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x10, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:59 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:59 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:02:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:02:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:02:59 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 276.287563][T13523] net_ratelimit: 44 callbacks suppressed [ 276.287582][T13523] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x10, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:00 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:00 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 276.593997][T13538] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 276.607590][T13540] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 276.661766][T13546] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2092ff", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:00 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:00 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 276.911690][T13558] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x3, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 277.015912][T13570] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x10, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:01 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:01 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x13, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 277.907404][T13604] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x7c, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 277.999419][T13613] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:01 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:01 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x2, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 278.314617][T13629] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 278.402292][T13638] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:02 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x3, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:02 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x4, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:03 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:03 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x5, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:04 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x7, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:04 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x8, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:04 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:04 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x9, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:05 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:05 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 282.035298][T13793] net_ratelimit: 10 callbacks suppressed [ 282.035317][T13793] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x11, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 282.164864][T13803] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:05 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:06 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x21, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 282.481032][T13821] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 282.518142][T13825] dccp_invalid_packet: P.Data Offset(68) too large [ 282.553998][T13827] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:07 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:07 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x29, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 283.459422][T13853] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 283.503643][T13859] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:07 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x2b, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:07 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 283.822969][T13878] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:07 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x34, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 283.865992][T13882] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x2c, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:07 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x34, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:07 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x36, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 284.331308][T13914] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x2f, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:08 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x3b, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:08 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x36, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x33, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:08 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x3b, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x3a, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:08 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 285.140083][T13976] BPF:Unsupported version 05:03:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x3b, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 285.220809][T13983] BPF:Unsupported version 05:03:09 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:09 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x4, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x3c, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 285.504483][T14003] BPF:Unsupported version [ 285.507690][T14002] BPF:Unsupported version 05:03:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 285.630438][T14010] BPF:Unsupported version 05:03:09 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x4, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:09 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x7, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x7c, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x10, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 285.925059][T14029] BPF:Unsupported version [ 285.999106][T14039] BPF:Unsupported version 05:03:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2092ff", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 286.083633][T14044] BPF:Unsupported version 05:03:09 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:09 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x9, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x2, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x3, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 286.348384][T14064] BPF:Unsupported version [ 286.421932][T14069] BPF:Unsupported version 05:03:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 286.527691][T14076] BPF:Unsupported version 05:03:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x3, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:10 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x9, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x13, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:10 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0xf, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 286.797435][T14094] BPF:Unsupported version [ 286.828231][T14097] BPF:Unsupported version [ 286.962833][T14101] BPF:Unsupported version 05:03:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x10, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x4, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x7c, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:10 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0xf, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:10 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1d, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 287.163999][T14108] net_ratelimit: 18 callbacks suppressed [ 287.164020][T14108] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 287.179621][T14115] BPF:Unsupported version 05:03:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x2, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 287.221187][T14119] BPF:Unsupported version 05:03:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x5, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 287.309281][T14125] BPF:Unsupported version 05:03:11 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1d, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:11 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x25, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x3, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 287.490080][T14134] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 287.578969][T14136] BPF:Unsupported version 05:03:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x6, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 287.686028][T14147] BPF:Unsupported version [ 287.784148][T14154] BPF:Unsupported version [ 287.853062][T14155] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x4, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:12 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x25, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:12 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x34, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x7, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:12 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x10, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 288.405765][T14168] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 288.453331][T14175] BPF:Unsupported version [ 288.461511][T14169] BPF:Unsupported version 05:03:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x8, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 288.525027][T14181] BPF:Unsupported version 05:03:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x5, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:12 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x34, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:12 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x36, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 288.730307][T14189] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 288.817284][T14198] BPF:Unsupported version 05:03:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x11, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 288.839741][T14196] BPF:Unsupported version 05:03:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x7, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 288.906765][T14205] BPF:Unsupported version 05:03:12 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x36, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:12 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x3b, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 289.029152][T14210] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x8, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 289.155068][T14220] BPF:Unsupported version 05:03:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x3c, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 289.239994][T14225] BPF:Unsupported version [ 289.320267][T14232] BPF:Unsupported version [ 289.376363][T14233] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:13 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x3b, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x9, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:13 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x63, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x48, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 289.887498][T14249] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 289.910774][T14253] BPF:Unsupported version [ 289.911797][T14252] BPF:Unsupported version 05:03:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x11, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x4c, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 290.018148][T14259] BPF:Unsupported version [ 290.025273][T14253] BPF:Unsupported version 05:03:13 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x63, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:13 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 290.172112][T14265] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x21, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x60, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 290.355925][T14276] BPF: (anon) type_id=2 bits_offset=0 [ 290.363595][T14277] BPF:Unsupported version [ 290.387168][T14276] BPF: [ 290.402342][T14276] BPF:Member exceeds struct_size [ 290.430060][T14276] BPF: [ 290.430060][T14276] [ 290.453585][T14281] dccp_invalid_packet: P.Data Offset(68) too large [ 290.517427][T14287] BPF: (anon) type_id=2 bits_offset=0 [ 290.546783][T14287] BPF: [ 290.561201][T14287] BPF:Member exceeds struct_size [ 290.580592][T14287] BPF: [ 290.580592][T14287] 05:03:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x68, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:15 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x29, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:15 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:15 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 291.477011][T14308] BPF: (anon) type_id=2 bits_offset=0 05:03:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x2b, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 291.519560][T14308] BPF: [ 291.528676][T14316] BPF:Unsupported flags [ 291.535186][T14308] BPF:Member exceeds struct_size 05:03:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x6c, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 291.567427][T14308] BPF: [ 291.567427][T14308] [ 291.630602][T14322] BPF:Unsupported flags [ 291.665892][T14324] BPF: (anon) type_id=2 bits_offset=0 [ 291.694199][T14324] BPF: [ 291.711789][T14324] BPF:Member exceeds struct_size 05:03:15 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 291.740650][T14324] BPF: [ 291.740650][T14324] 05:03:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x2c, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x74, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:15 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 291.938288][T14337] BPF:Unsupported flags [ 292.023985][T14345] BPF:Unsupported flags 05:03:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x2f, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x7a, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 292.079071][T14348] BPF:Unsupported flags 05:03:15 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:15 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 292.283433][T14358] net_ratelimit: 6 callbacks suppressed [ 292.283452][T14358] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 292.337317][T14364] BPF:Unsupported flags [ 292.436152][T14371] BPF:Unsupported flags [ 292.460012][T14373] BPF:Unsupported flags 05:03:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x33, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0xff, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:16 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:16 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 293.148815][T14390] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 293.219963][T14394] BPF:Unsupported flags [ 293.237952][T14399] BPF:Unsupported flags 05:03:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x3a, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 293.272737][T14400] BPF:Unsupported flags 05:03:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x3}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:17 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:17 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 293.522065][T14412] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x3b, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 293.571912][T14414] BPF:Unsupported flags [ 293.609588][T14416] BPF:Unsupported flags 05:03:17 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 293.663229][T14423] BPF:Unsupported flags [ 293.752270][T14423] BPF:Unsupported flags [ 293.896469][T14434] BPF:Unsupported flags [ 293.970812][T14434] BPF:Unsupported flags 05:03:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x4}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x3c, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:18 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:18 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 294.741627][T14457] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 294.777719][T14462] BPF:Unsupported flags [ 294.788129][T14463] BPF:Unsupported flags 05:03:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x7c, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 294.874825][T14470] BPF:Unsupported flags 05:03:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x6}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:18 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:18 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 295.105022][T14477] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 295.179603][T14485] BPF:Unsupported flags [ 295.201026][T14488] BPF:Unsupported flags 05:03:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x7}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 295.251020][T14490] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 295.270446][T14491] BPF:Unsupported flags [ 295.327041][T14493] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 295.447788][T14496] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:19 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x24, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:19 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x2, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x8}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 295.876458][T14514] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 295.900507][T14516] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 295.930607][T14523] BPF:Unsupported flags [ 295.940402][T14524] BPF:Unsupported flags 05:03:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x3, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x9}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 296.058007][T14533] BPF:Unsupported flags 05:03:19 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:19 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x30, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2a}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x4, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 296.364524][T14553] BPF:Unsupported flags [ 296.404945][T14551] BPF:Unsupported flags [ 296.467907][T14564] BPF:Unsupported flags 05:03:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x5, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:20 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x24, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x63}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:20 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x32, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 296.814952][T14576] BPF:Unsupported flags [ 296.823830][T14585] BPF:Unsupported flags [ 296.857385][T14576] BPF:Unsupported flags 05:03:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x7c}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x6, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 296.878685][T14585] BPF:Unsupported flags 05:03:20 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x30, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:20 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x7, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 297.196746][T14600] BPF:Unsupported flags [ 297.229984][T14602] BPF:Unsupported flags [ 297.297620][T14617] BPF:Unsupported flags [ 297.302896][T14615] net_ratelimit: 15 callbacks suppressed [ 297.302914][T14615] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 297.305662][T14618] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:21 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x32, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:21 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x2}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x8, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 297.580468][T14630] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 297.595566][T14626] BPF:Unsupported flags [ 297.661426][T14636] BPF:Unsupported flags [ 297.752104][T14642] BPF:Unsupported flags [ 297.757291][T14641] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 297.824214][T14643] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:21 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:21 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:21 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x3}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:21 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x60, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0xa, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 298.145913][T14655] BPF:Unsupported flags [ 298.161559][T14661] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 298.164500][T14660] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 298.185166][T14664] BPF:Unsupported flags [ 298.220409][T14670] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 298.227181][T14668] BPF:Unsupported flags 05:03:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x11, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:22 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:22 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:22 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x4}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 298.403017][ T9734] Bluetooth: hci0: command 0x0406 tx timeout [ 298.416650][ T9734] Bluetooth: hci4: command 0x0406 tx timeout [ 298.468137][ T9734] Bluetooth: hci5: command 0x0406 tx timeout [ 298.473866][T14680] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 298.514608][ T9734] Bluetooth: hci1: command 0x0406 tx timeout [ 298.517910][T14682] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 298.560032][ T9734] Bluetooth: hci2: command 0x0406 tx timeout [ 298.589437][T14685] BPF:Unsupported flags 05:03:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x3c, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 298.658710][T14696] BPF:Unsupported flags [ 298.663614][T14694] BPF:Unsupported flags [ 298.752163][T14699] BPF:Unsupported flags 05:03:22 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, 0x0) 05:03:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x5}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:22 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x60, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:22 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x48, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:22 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 299.336244][T14719] BPF:Unsupported flags [ 299.344980][T14720] BPF:Unsupported flags [ 299.411085][T14735] BPF:Unsupported flags 05:03:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x4c, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:23 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x6}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:23 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x60, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 299.656916][T14745] BPF:Unsupported flags 05:03:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x7}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 299.745252][T14754] BPF:Unsupported flags [ 299.834260][T14760] BPF:Unsupported flags 05:03:23 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, 0x0) 05:03:23 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:23 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x68, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x8}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:23 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 300.389928][T14788] BPF:Unsupported flags [ 300.395135][T14781] BPF:Unsupported flags 05:03:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x6c, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x11}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 300.455525][T14796] BPF:Unsupported flags 05:03:24 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:24 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0xda, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x3c}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x74, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 300.772873][T14812] BPF:Unsupported flags [ 300.796267][T14813] BPF:Unsupported flags [ 300.862203][T14819] BPF:Unsupported flags 05:03:25 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, 0x0) 05:03:25 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x7, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x7a, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x48}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:25 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 301.477166][T14848] BPF:Unsupported section found [ 301.489508][T14849] BPF:Unsupported flags 05:03:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x4c}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 301.570545][T14857] BPF:Unsupported section found 05:03:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0xff, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:25 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0xda, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:25 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0xb, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x60}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x3}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 301.881391][T14870] BPF:Unsupported flags [ 301.897857][T14876] BPF:Unsupported section found [ 301.975262][T14883] BPF:Unsupported section found 05:03:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:26 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x7, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x68}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x4}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:26 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x1d, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x4}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 302.479438][T14901] net_ratelimit: 29 callbacks suppressed [ 302.479458][T14901] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 302.518700][T14903] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 302.519159][T14902] BPF:Total section length too long [ 302.574819][T14909] BPF:Unsupported section found [ 302.601727][T14912] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 302.602111][T14914] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 302.620698][T14917] BPF:Total section length too long 05:03:26 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x6c}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:26 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0xb, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x6, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x6}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 302.876717][T14928] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 302.897700][T14932] BPF:Unsupported section found [ 302.907107][T14930] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 302.927351][T14933] BPF:Unsupported btf_header 05:03:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 303.016048][T14940] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 303.033979][T14941] BPF:Unsupported btf_header [ 303.101256][T14942] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x74}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:27 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x34, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:27 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x1d, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x7}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x11, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 303.927856][T14964] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 303.948202][T14965] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x7a}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 304.021066][T14973] BPF:Unsupported btf_header [ 304.027747][T14974] BPF:Total section length too long 05:03:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x8}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 304.117881][T14980] BPF:Unsupported btf_header 05:03:27 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:27 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x36, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:28 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0xff}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 304.443665][T15000] BPF:Unsupported btf_header [ 304.471296][T15003] BPF:Unsupported btf_header [ 304.562333][T15009] BPF:Unsupported btf_header 05:03:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x9}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:29 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x34, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:29 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x3b, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 305.380562][T15040] BPF:Unsupported btf_header [ 305.423820][T15042] BPF:Unsupported btf_header 05:03:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x2, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2a}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 305.490035][T15045] BPF:Unsupported btf_header 05:03:29 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x36, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:29 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x4a, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x63}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x3, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 305.786073][T15063] BPF:Unsupported btf_header [ 305.840288][T15066] BPF:Unsupported btf_header [ 305.854174][T15074] BPF:Unsupported btf_header 05:03:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x7c}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:30 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x3b, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:30 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x3fff8, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x4, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 306.528560][T15106] BPF:btf_header not found [ 306.528885][T15107] BPF:Unsupported btf_header 05:03:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x5, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 306.674546][T15114] BPF:btf_header not found 05:03:30 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x4a, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:30 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:30 executing program 0 (fault-call:6 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x6, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 306.966977][T15135] BPF: (anon) type_id=2 bits_offset=0 [ 306.998677][T15136] BPF:Unsupported btf_header [ 307.010891][T15135] BPF: [ 307.021397][T15135] BPF:Member exceeds struct_size [ 307.044226][T15135] BPF: [ 307.044226][T15135] [ 307.129601][T15145] BPF: (anon) type_id=2 bits_offset=0 [ 307.144835][T15145] BPF: [ 307.151244][T15145] BPF:Member exceeds struct_size [ 307.168418][T15145] BPF: [ 307.168418][T15145] [ 307.189306][T15137] FAULT_INJECTION: forcing a failure. [ 307.189306][T15137] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 307.212187][T15137] CPU: 1 PID: 15137 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 307.221097][T15137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.231357][T15137] Call Trace: [ 307.234690][T15137] dump_stack+0x141/0x1d7 [ 307.239416][T15137] should_fail.cold+0x5/0xa [ 307.243966][T15137] _copy_to_iter+0x286/0x1840 [ 307.248705][T15137] ? find_held_lock+0x2d/0x110 [ 307.254442][T15137] ? _copy_from_iter_nocache+0x1440/0x1440 [ 307.260634][T15137] ? tun_do_read+0x12a1/0x1c00 [ 307.265515][T15137] ? lock_downgrade+0x6e0/0x6e0 [ 307.270423][T15137] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 307.276948][T15137] tun_do_read+0xcee/0x1c00 [ 307.281583][T15137] ? tun_attach.isra.0+0x16b0/0x16b0 [ 307.287629][T15137] ? lock_downgrade+0x6e0/0x6e0 [ 307.292515][T15137] ? wake_up_q+0x100/0x100 [ 307.297142][T15137] tun_chr_read_iter+0x100/0x260 [ 307.302111][T15137] new_sync_read+0x41e/0x6e0 [ 307.306783][T15137] ? ksys_lseek+0x1b0/0x1b0 [ 307.311408][T15137] ? __fget_files+0x266/0x3d0 [ 307.316198][T15137] vfs_read+0x35c/0x570 [ 307.320555][T15137] __x64_sys_pread64+0x1fd/0x250 [ 307.325605][T15137] ? ksys_pread64+0x1a0/0x1a0 [ 307.330589][T15137] ? syscall_enter_from_user_mode+0x27/0x70 [ 307.336721][T15137] do_syscall_64+0x3a/0xb0 [ 307.341260][T15137] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 307.347181][T15137] RIP: 0033:0x4665d9 [ 307.351277][T15137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 307.371120][T15137] RSP: 002b:00007f2d94759188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 307.379687][T15137] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 307.387774][T15137] RDX: 000000000000000e RSI: 00000000200000c0 RDI: 0000000000000003 [ 307.395785][T15137] RBP: 00007f2d947591d0 R08: 0000000000000000 R09: 0000000000000000 [ 307.403863][T15137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 307.411946][T15137] R13: 00007ffc0dcffaef R14: 00007f2d94759300 R15: 0000000000022000 05:03:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x2}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x7, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:31 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x3fff8, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:31 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 307.875580][T15161] net_ratelimit: 22 callbacks suppressed [ 307.875599][T15161] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:31 executing program 0 (fault-call:6 fault-nth:1): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x8, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 307.921420][T15165] BPF:btf_header not found [ 307.926952][T15162] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 307.982468][T15170] BPF:Unsupported section found 05:03:31 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 308.030067][T15171] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 308.068891][T15170] BPF:Unsupported section found 05:03:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x3}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:31 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 308.138435][T15178] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x11, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 308.267226][T15187] BPF: (anon) type_id=2 bits_offset=0 [ 308.291932][T15187] BPF: [ 308.309217][T15187] BPF:Member exceeds struct_size [ 308.338770][T15187] BPF: [ 308.338770][T15187] [ 308.345562][T15193] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 308.379430][T15196] BPF:Unsupported section found [ 308.383397][T15182] FAULT_INJECTION: forcing a failure. [ 308.383397][T15182] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 308.395307][T15198] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 308.443907][T15182] CPU: 0 PID: 15182 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 308.452734][T15182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.463075][T15182] Call Trace: [ 308.466483][T15182] dump_stack+0x141/0x1d7 [ 308.471020][T15182] should_fail.cold+0x5/0xa [ 308.475574][T15182] _copy_to_iter+0x286/0x1840 [ 308.476511][T15202] BPF:Unsupported section found [ 308.480322][T15182] ? _copy_from_iter_nocache+0x1440/0x1440 [ 308.480365][T15182] ? copyout.part.0+0xeb/0x110 [ 308.495855][T15182] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 308.501866][T15182] ? _copy_to_iter+0x3fe/0x1840 [ 308.507109][T15182] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 308.513379][T15182] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 308.520196][T15182] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 308.526564][T15182] ? __phys_addr+0xc4/0x140 [ 308.531353][T15182] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 308.537847][T15182] ? __phys_addr_symbol+0x2c/0x70 [ 308.542884][T15182] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 308.548887][T15182] ? __check_object_size+0x171/0x3f0 [ 308.554281][T15182] simple_copy_to_iter+0x4c/0x70 [ 308.559308][T15182] __skb_datagram_iter+0x10f/0x770 [ 308.564453][T15182] ? zerocopy_sg_from_iter+0x110/0x110 [ 308.570118][T15182] skb_copy_datagram_iter+0x40/0x50 [ 308.575348][T15182] tun_do_read+0xf7f/0x1c00 [ 308.579922][T15182] ? tun_attach.isra.0+0x16b0/0x16b0 [ 308.585680][T15182] ? lock_downgrade+0x6e0/0x6e0 [ 308.590829][T15182] ? wake_up_q+0x100/0x100 [ 308.595284][T15182] tun_chr_read_iter+0x100/0x260 [ 308.600285][T15182] new_sync_read+0x41e/0x6e0 [ 308.604904][T15182] ? ksys_lseek+0x1b0/0x1b0 [ 308.609616][T15182] ? __fget_files+0x266/0x3d0 [ 308.614529][T15182] vfs_read+0x35c/0x570 [ 308.618742][T15182] __x64_sys_pread64+0x1fd/0x250 [ 308.623712][T15182] ? ksys_pread64+0x1a0/0x1a0 [ 308.628588][T15182] ? syscall_enter_from_user_mode+0x27/0x70 [ 308.634620][T15182] do_syscall_64+0x3a/0xb0 [ 308.639069][T15182] entry_SYSCALL_64_after_hwframe+0x44/0xae 05:03:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x4}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 308.644995][T15182] RIP: 0033:0x4665d9 [ 308.648911][T15182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 308.650110][T15204] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 308.669265][T15182] RSP: 002b:00007f2d94759188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 308.669297][T15182] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 308.669314][T15182] RDX: 000000000000000e RSI: 00000000200000c0 RDI: 0000000000000003 [ 308.669330][T15182] RBP: 00007f2d947591d0 R08: 0000000000000000 R09: 0000000000000000 [ 308.669345][T15182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.669360][T15182] R13: 00007ffc0dcffaef R14: 00007f2d94759300 R15: 0000000000022000 [ 308.742940][T15205] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 308.853434][T15208] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:33 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:33 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x3c, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x5}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:33 executing program 0 (fault-call:6 fault-nth:2): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 309.464941][T15224] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 309.497461][T15223] BPF:Unsupported section found 05:03:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x48, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 309.556741][T15234] BPF:Unsupported section found [ 309.569466][T15231] BPF:Unsupported section found 05:03:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x6}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:33 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 309.674332][T15229] FAULT_INJECTION: forcing a failure. [ 309.674332][T15229] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 309.734832][T15229] CPU: 0 PID: 15229 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 309.743839][T15229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.753920][T15229] Call Trace: [ 309.757225][T15229] dump_stack+0x141/0x1d7 [ 309.761597][T15229] should_fail.cold+0x5/0xa [ 309.766154][T15229] _copy_to_user+0x2c/0x150 [ 309.770808][T15229] simple_read_from_buffer+0xcc/0x160 [ 309.776300][T15229] proc_fail_nth_read+0x187/0x220 [ 309.781378][T15229] ? proc_exe_link+0x1d0/0x1d0 [ 309.786176][T15229] ? security_file_permission+0x248/0x560 [ 309.791941][T15229] ? proc_exe_link+0x1d0/0x1d0 [ 309.796746][T15229] vfs_read+0x1b5/0x570 [ 309.800955][T15229] ksys_read+0x12d/0x250 [ 309.805234][T15229] ? vfs_write+0xa30/0xa30 [ 309.809706][T15229] ? syscall_enter_from_user_mode+0x27/0x70 [ 309.815660][T15229] do_syscall_64+0x3a/0xb0 [ 309.820219][T15229] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 309.822878][T15253] BPF:Unsupported section found [ 309.826135][T15229] RIP: 0033:0x41935c [ 309.826195][T15229] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 309.826227][T15229] RSP: 002b:00007f2d94759170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 309.863343][T15229] RAX: ffffffffffffffda RBX: 000000000000000e RCX: 000000000041935c [ 309.871361][T15229] RDX: 000000000000000f RSI: 00007f2d947591e0 RDI: 0000000000000006 05:03:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x7}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:33 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x8}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 309.879375][T15229] RBP: 00007f2d947591d0 R08: 0000000000000000 R09: 0000000000000000 [ 309.887711][T15229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 309.895813][T15229] R13: 00007ffc0dcffaef R14: 00007f2d94759300 R15: 0000000000022000 [ 310.020013][T15263] BPF:Unsupported section found [ 310.095667][T15268] BPF:Unsupported section found [ 310.184059][T15268] BPF:Unsupported section found 05:03:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, 0x0) 05:03:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x4c, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0xa}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:34 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:34 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 310.808031][T15299] BPF:Unsupported section found [ 310.826580][T15300] BPF:Unsupported section found 05:03:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x11}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x60, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 310.932092][T15307] BPF:Unsupported section found 05:03:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x3c}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x68, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:34 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:34 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 311.330955][T15332] BPF:Unsupported section found [ 311.363344][T15333] BPF:Unsupported section found [ 311.471090][T15336] BPF:Unsupported section found 05:03:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, 0x0) 05:03:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x48}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x6c, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:35 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:35 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:35 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x74, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 312.005369][T15359] BPF:Unsupported section found [ 312.024945][T15352] BPF:Unsupported section found 05:03:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x4c}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 312.098553][T15367] BPF:Unsupported section found 05:03:35 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:35 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x7a, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x60}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 312.380874][T15387] BPF:Unsupported section found [ 312.405761][T15384] BPF:Unsupported section found [ 312.446295][T15388] BPF:Unsupported section found 05:03:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, 0x0) 05:03:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x300, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:36 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x24, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x68}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:36 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0x4, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 313.043816][T15412] net_ratelimit: 27 callbacks suppressed [ 313.043836][T15412] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 313.118382][T15416] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 313.138661][T15420] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 313.171085][T15423] BPF:Unsupported section found [ 313.176399][T15422] BPF:Unsupported section found 05:03:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x500, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x6c}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 313.260091][T15414] BPF:Unsupported section found [ 313.269089][T15430] BPF:Unsupported section found 05:03:37 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:37 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x30, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 313.440644][T15437] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 313.459423][T15438] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 313.502991][T15444] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 313.524640][T15441] BPF:Unsupported section found [ 313.537398][T15446] BPF:Unsupported section found 05:03:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x600, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 313.588007][T15450] BPF:Unsupported section found 05:03:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x74}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 313.741143][T15454] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 313.784005][T15457] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 313.823429][T15458] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 313.977118][ T5] Bluetooth: hci3: command 0x0406 tx timeout 05:03:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0x34, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:37 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x32, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x3c, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x700, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:37 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x24, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x7a}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 314.235061][T15474] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 314.271169][T15475] BPF:Unsupported section found [ 314.298016][T15484] BPF:Unsupported section found [ 314.338065][T15489] BPF:Unsupported section found 05:03:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0xff}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0xab2, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:38 executing program 3: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:38 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x30, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:38 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 314.689762][T15510] BPF:Unsupported section found [ 314.695785][T15511] BPF:Unsupported section found [ 314.735294][T15514] BPF:Unsupported section found [ 314.842844][T15521] BPF:Unsupported section found 05:03:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xfdef, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x1100, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:38 executing program 3 (fault-call:6 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x2, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:38 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x32, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:38 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 315.264557][T15543] BPF:Unsupported section found [ 315.279572][T15544] BPF:Unsupported section found 05:03:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x3, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 315.359801][T15551] BPF:Unsupported section found 05:03:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x1f00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:39 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 315.418506][T15535] FAULT_INJECTION: forcing a failure. [ 315.418506][T15535] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 315.480095][T15535] CPU: 0 PID: 15535 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 315.489037][T15535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.499229][T15535] Call Trace: [ 315.502525][T15535] dump_stack+0x141/0x1d7 [ 315.506894][T15535] should_fail.cold+0x5/0xa [ 315.511438][T15535] _copy_to_iter+0x286/0x1840 [ 315.516217][T15535] ? find_held_lock+0x2d/0x110 [ 315.521048][T15535] ? _copy_from_iter_nocache+0x1440/0x1440 [ 315.527033][T15535] ? tun_do_read+0x12a1/0x1c00 [ 315.531839][T15535] ? lock_downgrade+0x6e0/0x6e0 [ 315.536738][T15535] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 315.542676][T15535] tun_do_read+0xcee/0x1c00 [ 315.547249][T15535] ? tun_attach.isra.0+0x16b0/0x16b0 [ 315.552697][T15535] ? lock_downgrade+0x6e0/0x6e0 [ 315.557585][T15535] ? wake_up_q+0x100/0x100 [ 315.562050][T15535] tun_chr_read_iter+0x100/0x260 [ 315.567024][T15535] new_sync_read+0x41e/0x6e0 [ 315.571645][T15535] ? ksys_lseek+0x1b0/0x1b0 [ 315.576272][T15535] ? __fget_files+0x266/0x3d0 [ 315.581038][T15535] vfs_read+0x35c/0x570 [ 315.585752][T15535] __x64_sys_pread64+0x1fd/0x250 [ 315.590757][T15535] ? ksys_pread64+0x1a0/0x1a0 [ 315.594126][T15560] BPF:Unsupported section found [ 315.595929][T15535] ? syscall_enter_from_user_mode+0x27/0x70 [ 315.607174][T15535] do_syscall_64+0x3a/0xb0 [ 315.611636][T15535] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 315.617575][T15535] RIP: 0033:0x4665d9 [ 315.621576][T15535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 315.641760][T15535] RSP: 002b:00007f19122a2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 315.650205][T15535] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 315.658295][T15535] RDX: 000000000000000e RSI: 00000000200000c0 RDI: 0000000000000003 [ 315.666472][T15535] RBP: 00007f19122a21d0 R08: 0000000000000000 R09: 0000000000000000 05:03:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x2000, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:39 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 315.674672][T15535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 315.682986][T15535] R13: 00007ffd2a61da5f R14: 00007f19122a2300 R15: 0000000000022000 05:03:39 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x60, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0x200000ce, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x4, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 315.816704][T15570] BPF:Unsupported section found [ 315.910714][T15581] BPF:Unsupported section found [ 315.987865][T15588] BPF:Unsupported section found 05:03:40 executing program 3 (fault-call:6 fault-nth:1): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x3c00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:40 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x60, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x5, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:40 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 316.809983][ T3250] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.816489][ T3250] ieee802154 phy1 wpan1: encryption failed: -22 05:03:40 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xfffffdef, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x6, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x3f00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 316.922146][T15614] BPF:Unsupported section found [ 316.937174][T15615] BPF:Unsupported section found [ 317.007958][T15615] BPF:Unsupported section found 05:03:40 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:40 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x7, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 317.157482][T15618] FAULT_INJECTION: forcing a failure. [ 317.157482][T15618] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 317.208030][T15618] CPU: 1 PID: 15618 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 317.216949][T15618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.227132][T15618] Call Trace: [ 317.230426][T15618] dump_stack+0x141/0x1d7 [ 317.234804][T15618] should_fail.cold+0x5/0xa [ 317.239354][T15618] _copy_to_iter+0x286/0x1840 [ 317.244073][T15618] ? _copy_from_iter_nocache+0x1440/0x1440 [ 317.250011][T15618] ? copyout.part.0+0xeb/0x110 [ 317.254911][T15618] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 317.260655][T15618] ? _copy_to_iter+0x3fe/0x1840 [ 317.265541][T15618] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 317.271892][T15618] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 317.280343][T15618] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 317.286611][T15618] ? __phys_addr+0xc4/0x140 [ 317.291133][T15618] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 317.297403][T15618] ? __phys_addr_symbol+0x2c/0x70 [ 317.302458][T15618] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 317.308214][T15618] ? __check_object_size+0x171/0x3f0 [ 317.313549][T15618] simple_copy_to_iter+0x4c/0x70 [ 317.318526][T15618] __skb_datagram_iter+0x10f/0x770 [ 317.323784][T15618] ? zerocopy_sg_from_iter+0x110/0x110 [ 317.329286][T15618] skb_copy_datagram_iter+0x40/0x50 [ 317.334525][T15618] tun_do_read+0xf7f/0x1c00 [ 317.339067][T15618] ? tun_attach.isra.0+0x16b0/0x16b0 [ 317.344396][T15618] ? lock_downgrade+0x6e0/0x6e0 [ 317.349357][T15618] ? wake_up_q+0x100/0x100 [ 317.353994][T15618] tun_chr_read_iter+0x100/0x260 [ 317.359045][T15618] new_sync_read+0x41e/0x6e0 [ 317.363655][T15618] ? ksys_lseek+0x1b0/0x1b0 [ 317.368172][T15618] ? __fget_files+0x266/0x3d0 [ 317.372992][T15618] vfs_read+0x35c/0x570 [ 317.377170][T15618] __x64_sys_pread64+0x1fd/0x250 [ 317.382127][T15618] ? ksys_pread64+0x1a0/0x1a0 [ 317.386853][T15618] ? syscall_enter_from_user_mode+0x27/0x70 [ 317.392786][T15618] do_syscall_64+0x3a/0xb0 [ 317.397309][T15618] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 317.403219][T15618] RIP: 0033:0x4665d9 [ 317.407134][T15618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 317.426947][T15618] RSP: 002b:00007f19122a2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 317.435847][T15618] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 317.443896][T15618] RDX: 000000000000000e RSI: 00000000200000c0 RDI: 0000000000000003 [ 317.451892][T15618] RBP: 00007f19122a21d0 R08: 0000000000000000 R09: 0000000000000000 [ 317.460063][T15618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 317.468437][T15618] R13: 00007ffd2a61da5f R14: 00007f19122a2300 R15: 0000000000022000 05:03:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x4000, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 317.636708][T15644] BPF:Unsupported section found [ 317.672330][T15648] BPF:Unsupported section found [ 317.723471][T15653] BPF:Unsupported section found [ 317.750706][T15648] BPF:Unsupported section found 05:03:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x8, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x4800, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:42 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:42 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 318.496168][T15676] net_ratelimit: 24 callbacks suppressed [ 318.496187][T15676] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xfffffffffffffdef, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 318.538805][T15679] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 318.585439][T15683] BPF:Unsupported section found [ 318.591041][T15682] BPF:Unsupported section found 05:03:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x4c00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 318.634364][T15687] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 318.683916][T15691] BPF:Unsupported section found 05:03:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0xa, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:42 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:42 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 318.814916][T15699] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x6000, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 318.926064][T15707] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 319.004977][T15714] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 319.007677][T15713] BPF:Unsupported section found [ 319.033776][T15715] BPF:Unsupported section found 05:03:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x11, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 319.107300][T15719] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 319.135370][T15721] BPF:Unsupported section found [ 319.305564][T15726] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 319.341499][T15727] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0x200000ce, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x6800, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:43 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:43 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xda, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x3c, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x2) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 320.101421][T15750] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 320.146086][T15757] BPF:Unsupported section found [ 320.160398][T15758] BPF:Unsupported section found 05:03:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x48, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 320.250256][T15769] BPF:Unsupported section found 05:03:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x6c00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:44 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xda, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:44 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x4c, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 320.513653][T15783] BPF:Unsupported section found 05:03:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x7400, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 320.606784][T15783] BPF:Unsupported section found [ 320.630985][T15792] BPF:Unsupported section found [ 320.730033][T15796] BPF:Unsupported section found 05:03:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r4, {0x2, 0x0, @dev}, 0x2}}, 0x2e) tee(r4, 0xffffffffffffffff, 0x0, 0xa) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:44 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:44 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x60, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x7a00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:44 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x1000000) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 321.218387][T15824] BPF:Unsupported section found 05:03:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x68, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 321.269799][T15830] BPF:Unsupported section found 05:03:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0xb20a, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:45 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 321.383853][T15837] BPF:Unsupported section found 05:03:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x2000000) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:45 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x6c, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 321.619389][T15852] BPF:Unsupported section found [ 321.761781][T15863] BPF:Unsupported section found [ 321.865202][T15868] BPF:Unsupported section found 05:03:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db0099d41d8bdcd213a066080506e0e4f5fc3d8b1a4119ce641967ef82028dcece41ac69d14aac693389844749c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0xffff, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x74, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:46 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:46 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:46 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x100000000000000) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x7a, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 322.665764][T15897] BPF:Unsupported section found [ 322.679232][T15899] BPF:Unsupported section found 05:03:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0xa, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 322.776719][T15906] BPF:Unsupported section found 05:03:46 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:46 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x300, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x63, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 323.035267][T15923] BPF:Unsupported section found [ 323.127475][T15924] BPF:Unsupported section found [ 323.203669][T15935] BPF:Unsupported section found 05:03:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e7c, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:47 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x500, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:47 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xc5d, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x200000000000000) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="02de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099bb1d8bdcd213a01967ef82028fcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f00000005c0)={{}, 0x0, 0x14, @inherit={0x58, &(0x7f0000000140)={0x1, 0x2, 0x6, 0x271, {0x1, 0x6, 0x29f91501, 0xfff, 0x6}, [0x5, 0x6]}}, @subvolid=0x5}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'team0\x00'}) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r2}, 0x8) openat$cgroup_ro(r3, &(0x7f0000000280)='freezer.state\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 324.062361][T15965] net_ratelimit: 22 callbacks suppressed [ 324.062381][T15965] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 324.093349][T15969] BPF:Unsupported section found [ 324.095235][T15970] BPF:Unsupported section found [ 324.136001][T15973] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 324.184801][T15977] BPF:Unsupported section found 05:03:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x600, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:48 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xc5e, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:48 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xc61, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 324.326356][T15984] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x1, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 324.458694][T15990] BPF:Unsupported section found [ 324.506633][T15995] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 324.525354][T15996] BPF:Unsupported section found [ 324.558158][T15998] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:48 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xc5f, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 324.598663][T16001] BPF:Unsupported section found [ 324.614630][T16002] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x700, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:48 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xc62, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 324.823264][T16012] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 324.842161][T16013] BPF:Unsupported section found [ 324.853759][T16014] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 324.884501][T16015] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 324.935998][T16019] BPF:Unsupported section found 05:03:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x2, 0x5, 0xc2}}}}}}}, 0x0) [ 325.002242][T16024] BPF:Unsupported section found [ 325.112699][T16028] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:49 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xc60, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0xa00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:49 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xc63, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x3, 0x5, 0xc2}}}}}}}, 0x0) 05:03:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a4108000000000000009a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) r2 = accept4$netrom(r1, 0x0, &(0x7f0000000000), 0x800) ioctl$sock_netrom_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={0x0, @bcast, @bpq0, 0x2, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4, 0x2, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 325.526211][T16050] BPF:Unsupported section found [ 325.538930][T16051] BPF:Unsupported section found 05:03:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x4, 0x5, 0xc2}}}}}}}, 0x0) 05:03:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0xaad, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 325.624795][T16055] BPF:Unsupported section found 05:03:49 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xc64, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:49 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x1f00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) read(r3, &(0x7f0000000300)=""/67, 0x43) sendfile(r3, r5, 0x0, 0x8000000000005) sendfile(r3, r4, 0x0, 0x10000000000a00) openat$cgroup_ro(r5, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r4}, 0x8) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'hsr0\x00'}) r7 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r8, &(0x7f0000000140)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r7, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x5, 0x5, 0xc2}}}}}}}, 0x0) 05:03:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x1100, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 325.930027][T16074] BPF:Unsupported section found [ 325.962301][T16077] BPF:Unsupported section found [ 326.050198][T16085] BPF:Unsupported section found 05:03:49 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x1f00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}}, 0x0) 05:03:49 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x1f00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 326.330018][T16099] BPF:Unsupported section found [ 326.371118][T16104] BPF:Unsupported section found [ 326.493758][T16107] BPF:Unsupported section found 05:03:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x201) 05:03:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x2000, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x7, 0x5, 0xc2}}}}}}}, 0x0) 05:03:50 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:50 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x2400, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000005c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c689a727ef48baefc000400000099d41d73dcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db473c5569da032237eb1d73fbfa26b91ca27a01b260c6159f573890414e5b5e9eb1fa791ca2770af69b5d46b2248a9f206b9d5ae3dbc0f2a372fa19a4e5643881898b4b5a361ec9b5ae574c32df23025b8954492a3c52890f8b78770fe75535d84096ed785ea3611367a44c0aabd14d6f21913dd989b428b6f64c5c0900d890fc2bfb5c687ec558dc2abc400b561c1c22f38ef8cd4f6aff17f2a5b32b9e09514ec51159eaf447cda3bf893f5e6ca55d15b74da1af54bb8034896fb2964f36b75b74dd779b58694bc204b1db234bcc15cd7b7886dff8140da4a4fcb28d00106e6d15e5a7ca4ead360c6f619f13988e0b1c5a936c4651ac3edf360e6e8d44b6ae2bc20a51130c504d0cde1ae228ce240bb8676fd448525a5b948d95fbcb9054971be18df5463dffe95fe1a028943851a611301d38feb055b3904a771c6e373c40188c924f977725b49f84fec92091f45588a7473c84d737eb7bfe63ccea11f09b96a029f1a51be1b1c7a041c4b90f0f1e7a063d66d01530a453fadb6eca718591c120f115a2a32da4411bfc0cfbc29574f73451ea02802db1356b74fff80b9459350b079df79c06337bc40af594d888e9a398fb400653c27aaadb424e019ff4d8a7c289720f67ebfd5df08a072f509cfa441b40f64e9bcad1b93176633a486a49e985621e354d02c3a2ea845be3537eba9f65577aad881dcd1d748f822c64a388ae084428e8ca708c3e890be1fcafe657f7f543c56cc9767e68c27db2b491df1d767e7a373aec0ae719f55d6e737f12f0ad50743ecc29f7959ed5dc469710880841bf45edab1d6b4d9a545a55b03c13b24b6c39f22766004b136878c98597d602a6db36d1b1071d756dc2866e364dba2bc91212b9"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x4, 0xc2}}}}}}}, 0x0) [ 326.874665][T16129] BPF:Unsupported section found [ 326.876396][T16130] BPF:Unsupported section found 05:03:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x3c00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 326.988049][T16139] BPF:Unsupported section found 05:03:50 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x2400, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:50 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0xc2}}}}}}}, 0x0) 05:03:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x3f00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 327.283268][T16155] BPF:Unsupported section found [ 327.340709][T16161] BPF:Unsupported section found [ 327.433861][T16166] BPF:Unsupported section found 05:03:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2}}}}}}}, 0x0) 05:03:51 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:51 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x3200, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x4000, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41acf4d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:51 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d6212862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x207) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 327.948840][T16188] BPF:Unsupported section found 05:03:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0xc2}}}}}}}, 0x0) [ 327.982056][T16190] BPF:Unsupported section found 05:03:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x4800, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 328.043210][T16197] BPF:Unsupported section found 05:03:51 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x3200, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:51 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x4c00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 328.318147][T16214] BPF:Unsupported section found [ 328.408789][T16215] BPF:Unsupported section found 05:03:52 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 328.473236][T16223] BPF:Unsupported section found [ 328.667921][T16230] BPF:Unsupported section found 05:03:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) accept4$alg(r1, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x2}}}}}}}, 0x0) 05:03:52 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:52 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x6000, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) read(r2, &(0x7f0000000300)=""/67, 0x43) sendfile(r2, r4, 0x0, 0x8000000000005) sendfile(r2, r3, 0x0, 0x10000000000a00) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000000)={0x1, 0x3, [@remote, @remote, @local]}) r5 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 329.332982][T16254] BPF:Unsupported section found [ 329.340208][T16255] BPF:Unsupported section found [ 329.376883][T16257] net_ratelimit: 26 callbacks suppressed [ 329.376902][T16257] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 329.401110][T16260] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:53 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 329.451832][T16266] BPF:Unsupported section found [ 329.470538][T16268] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x3}}}}}}}, 0x0) 05:03:53 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x5d0c, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x6800, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 329.692290][T16278] BPF:Unsupported section found [ 329.707547][T16279] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 329.793583][T16281] BPF:Unsupported section found 05:03:53 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x610c, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 329.824417][T16287] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x4}}}}}}}, 0x0) [ 329.865212][T16288] BPF:Unsupported section found [ 329.880850][T16289] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 330.034669][T16293] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 330.087694][T16294] BPF:Unsupported section found [ 330.167244][T16299] BPF:Unsupported section found 05:03:54 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x5e0c, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x6c00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x5}}}}}}}, 0x0) 05:03:54 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x620c, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x20044, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 330.718920][T16317] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 330.773676][T16319] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 330.815864][T16325] BPF:Unsupported section found [ 330.825132][T16327] BPF:Unsupported section found [ 330.841929][T16328] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x6}}}}}}}, 0x0) [ 330.934612][T16333] BPF:Unsupported section found 05:03:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000004440)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f00000005c0)={0x2, 0x2, {0x1ff, @usage=0x8000, 0x0, 0xa3d1, 0xc4, 0x20, 0x55, 0x0, 0x3a, @struct={0x10001, 0x7ff}, 0x1ff, 0x7, [0x8001, 0x34, 0xff, 0x80000001, 0x5, 0x8001]}, {0x3, @usage=0x2, 0x0, 0x8, 0xef50, 0x4, 0x3, 0x81, 0x4, @struct={0x9, 0x5}, 0x6, 0xff, [0xe0000000000, 0x6, 0x0, 0x2000000, 0x4, 0x100000000]}, {0x65, @struct={0xbb, 0x200}, 0x0, 0x0, 0x1, 0x0, 0x200000ffffffff, 0x2, 0x82, @usage=0x4, 0x0, 0x7, [0x10000, 0x7, 0x100000001, 0x3, 0xb, 0xfffffffffffffffd]}, {0x0, 0xec, 0x100000000}}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000009c0)={r3, 0x461, 0x9}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$pppl2tp(0x18, 0x1, 0x1) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r5, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @dev}, 0x2}}, 0x2e) sendfile(r4, r5, &(0x7f0000000000)=0x1, 0x0) r7 = socket$xdp(0x2c, 0x3, 0x0) clock_gettime(0x0, &(0x7f00000042c0)={0x0, 0x0}) recvmmsg(r7, &(0x7f0000004880)=[{{&(0x7f0000000280)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f00000028c0), 0x0, &(0x7f0000000380)=""/191, 0xbf}, 0x40}, {{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000dc0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/240, 0xf0}, {&(0x7f0000001dc0)=""/78, 0x4e}], 0x4, &(0x7f0000001e80)=""/28, 0x1c}, 0x7}, {{&(0x7f0000001ec0), 0x80, &(0x7f00000020c0)=[{&(0x7f0000001f40)=""/245, 0xf5}, {&(0x7f0000002040)=""/93, 0x5d}], 0x2, &(0x7f0000002100)=""/125, 0x7d}, 0xfff}, {{&(0x7f0000002180)=@qipcrtr, 0x2d, &(0x7f0000002900)=[{&(0x7f0000002200)=""/212, 0xd4}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/211, 0xd3}, {&(0x7f00000024c0)=""/224, 0xe0}, {&(0x7f00000025c0)=""/185, 0xb9}, {&(0x7f0000002680)=""/112, 0x70}, {&(0x7f0000002700)=""/197, 0xc5}, {&(0x7f0000002800)=""/164, 0xa4}, {&(0x7f00000028c0)}], 0x9, &(0x7f0000000140)=""/250, 0xfa}, 0x1}, {{&(0x7f0000002ac0)=@hci, 0x80, &(0x7f0000003e80)=[{&(0x7f0000004340)=""/226, 0xe2}, {&(0x7f0000002c40)=""/4096, 0x1000}, {&(0x7f0000003c40)=""/154, 0x9a}, {&(0x7f0000003d00)=""/70, 0x46}, {&(0x7f0000003d80)=""/245, 0xf5}], 0x5, &(0x7f0000003f00)=""/147, 0x93}, 0x2}, {{0x0, 0x0, &(0x7f0000004100)=[{&(0x7f0000003fc0)=""/208, 0xd0}, {&(0x7f00000040c0)=""/31, 0x1f}], 0x2}, 0xfffffffc}, {{0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f00000029c0)=""/84, 0x54}, {&(0x7f0000002b40)=""/208, 0xd0}, {&(0x7f0000000440)=""/43, 0x2b}, {&(0x7f0000004440)=""/134, 0x86}, {&(0x7f0000004500)=""/233, 0xe9}, {&(0x7f0000004600)=""/135, 0x87}, {&(0x7f00000046c0)=""/188, 0xbc}, {&(0x7f0000001e40)=""/56, 0x38}], 0x8, &(0x7f0000004780)=""/220, 0xdc}, 0xffffffff}], 0x7, 0x41, &(0x7f0000004300)={r8, r9+60000000}) r10 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r10, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:54 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x630c, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x7400, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:54 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x5f0c, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x7}}}}}}}, 0x0) [ 331.185471][T16350] BPF:Unsupported section found 05:03:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x7a00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 331.260717][T16354] BPF:Unsupported section found 05:03:55 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x640c, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 331.362559][T16362] BPF:Unsupported section found 05:03:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x8}}}}}}}, 0x0) 05:03:55 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0xad0a, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 331.584484][T16369] BPF:Unsupported section found [ 331.700477][T16380] BPF:Unsupported section found [ 331.792152][T16380] BPF:Unsupported section found 05:03:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x11}}}}}}}, 0x0) 05:03:55 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0xb6e3, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:55 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x600c, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) read(r1, &(0x7f0000000300)=""/67, 0x43) sendfile(r1, r3, 0x0, 0x8000000000005) sendfile(r1, r2, 0x0, 0x10000000000a00) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000001c0)={'netdevsim0\x00'}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'macsec0\x00'}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000140)=ANY=[@ANYRESOCT=r0, @ANYRES32, @ANYBLOB="0649b2d41d16940000000000000000514b9a727ef48baefc000400020099d41d8bdcd213a01967ef82028dcece41ac69d14a0f757fc4e5dd07db00"/69], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r5, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r6 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 332.184729][T16399] BPF:Unsupported section found [ 332.208942][T16405] BPF:Unsupported section found 05:03:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x3c}}}}}}}, 0x0) [ 332.267850][T16410] BPF:Unsupported section found 05:03:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0xe3b6, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:56 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 332.373578][T16416] BPF:Unsupported section found 05:03:56 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x48}}}}}}}, 0x0) 05:03:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0xffff, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 332.534121][T16429] BPF:Unsupported section found [ 332.582284][ T38] audit: type=1800 audit(1623733436.309:16): pid=16420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="memory.events" dev="sda1" ino=14225 res=0 errno=0 05:03:56 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 332.695922][T16442] BPF:Unsupported section found 05:03:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x4c}}}}}}}, 0x0) [ 332.797069][T16447] BPF:Unsupported section found [ 332.881189][T16453] BPF:Unsupported section found 05:03:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0xa, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de02407112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967693389844741c16df3c00abd7fc4e5dd07dbef0509b7b1127c038786b132ea946442705dbfbb8b68bff127ad88166216c88cf888710a8b0595d1e5a962f379a05d4c09fc5a6f2939281b4d6d6362c2557576cf0b2e398d46b0672e3c6df8c43427c15076dffcec0685bd46f3890956d8013e7be36ddee57515f8f1dfa4e6efd07eda25ef9769542b7adee0209796fbd421532f7e4d992858ecdc900f323c138535a5f2c2429eddb016fb28e16432d2dbef52ee"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) mmap(&(0x7f00009cd000/0x1000)=nil, 0x1000, 0x2000003, 0x50, r1, 0x21d78000) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) pipe(&(0x7f0000000000)) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x60}}}}}}}, 0x0) 05:03:56 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:56 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @dev}, 0x2}}, 0x2e) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32=r2, @ANYRES32=r2], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 333.274898][T16467] BPF:Unsupported section found 05:03:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x63, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 333.321727][T16481] BPF:Unsupported section found 05:03:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x68}}}}}}}, 0x0) 05:03:57 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xda00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 333.429551][T16489] BPF:Unsupported section found 05:03:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000000)='\x00', 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x1) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r3, 0x110, 0x5, &(0x7f00000000c0)=[0x3, 0x1], 0x2) pread64(r0, &(0x7f0000000140)=""/121, 0x79, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:57 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e7c, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 333.596409][T16499] BPF:Unsupported section found 05:03:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x6c}}}}}}}, 0x0) [ 333.709426][T16509] BPF:Unsupported section found [ 333.788835][T16509] BPF:Unsupported section found 05:03:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYRES32], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:57 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x74}}}}}}}, 0x0) 05:03:57 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x1, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x7a}}}}}}}, 0x0) [ 334.290162][T16539] BPF:Unsupported section found [ 334.309142][T16540] BPF:Unsupported section found [ 334.377515][T16545] BPF:Unsupported section found 05:03:58 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xda00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 334.431637][T16547] net_ratelimit: 25 callbacks suppressed [ 334.431656][T16547] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 334.505145][T16555] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 334.547161][T16557] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 334.619263][T16562] BPF:Unsupported section found 05:03:58 executing program 0: sendmsg$OSF_MSG_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000005c0)={0x175c, 0x0, 0x5, 0x100, 0x0, 0x0, {0x5, 0x0, 0x2}, [{{0x254, 0x1, {{0x1, 0x8e9d}, 0x20, 0x5, 0xc3, 0x1f, 0x1e, 'syz0\x00', "a158d1209c2b29274aa90b6f0fd55f6b582c8027122ffcd9f8dd82152073e35a", "f414ef9aa8b7158d12d407f26aceb6efa4d7bcd46e0ba1051b92af3f20164081", [{0x20, 0x4, {0x0, 0x2}}, {0x101, 0x1, {0x1, 0x8}}, {0x800, 0x9, {0x3, 0x6}}, {0x1ff, 0x1, {0x0, 0x10000}}, {0x1, 0x40, {0x1, 0x7fff}}, {0x401, 0x44, {0x2, 0xfffffffb}}, {0x8, 0x9, {0x2, 0x4}}, {0x8, 0xfff8, {0x2, 0x1}}, {0x8001, 0xf001, {0x1, 0x40}}, {0x401, 0x8, {0x1, 0x1}}, {0x0, 0x9, {0x2, 0x81}}, {0x3, 0xd6ef, {0x0, 0x3}}, {0xfff, 0x200, {0x0, 0x800000}}, {0x800, 0x7, {0x0, 0x80}}, {0x263e, 0xfffb, {0x1, 0x1f}}, {0x5, 0x80, {0x0, 0x3ff}}, {0x398c, 0x4, {0x1, 0x92}}, {0x7, 0x0, {0x1, 0x68}}, {0x8000, 0x400, {0x2, 0x7e330595}}, {0x1, 0xffff, {0x2, 0xc7e7}}, {0x0, 0x0, {0x3, 0xb1}}, {0x8, 0x9, {0x1, 0xb47}}, {0x3, 0x5, {0x2, 0xe5b5}}, {0x0, 0xf362, {0x3, 0x5}}, {0x0, 0x3, {0x2, 0x3c}}, {0x6, 0x9, {0x1, 0x80000001}}, {0xb2, 0x167, {0x3, 0x80}}, {0x1ff, 0x7, {0x1, 0x400}}, {0x7fff, 0xe0, {0x0, 0x81}}, {0x2, 0x8000, {0x3, 0x7fff}}, {0x2, 0xafd3, {0x0, 0x1ff}}, {0x5, 0x4, {0x1, 0x5620}}, {0x36, 0x2, {0x2, 0x7ff}}, {0xbc9, 0x9, {0x3, 0x1}}, {0x6, 0x6, {0x2, 0x9}}, {0x0, 0x8001, {0x2, 0x800}}, {0x6, 0x69d5, {0x0, 0x6}}, {0x4, 0x6, {0x2, 0x3}}, {0x16d, 0x2, {0x0, 0x9}}, {0x1ff, 0x6, {0x0, 0x3}}]}}}, {{0x254, 0x1, {{0x1, 0x5}, 0x7, 0x1, 0x458, 0x81, 0x16, 'syz0\x00', "f2c76292f66b9992af8e9fcc9bc9715d4671f32125ac52ba0b2124a3ff1da36d", "fccebfa449d6c6556100aaf014af9e1490af4b38068288f50f539d3c7d5c2faa", [{0x17b, 0x6, {0x6, 0xca}}, {0x0, 0x1, {0x2, 0x9}}, {0x0, 0x5, {0x3, 0x6}}, {0xb7d, 0x93be, {0x1, 0x9}}, {0x20, 0x400, {0x2, 0x8}}, {0x2, 0x0, {0x3, 0x4}}, {0x8, 0x40, {0x0, 0x85b}}, {0x6, 0x400, {0x2, 0xfcb}}, {0x0, 0x9, {0x0, 0xfffffffa}}, {0x2, 0x7f, {0x1}}, {0x9, 0x1, {0x1, 0x10000}}, {0x5, 0x5, {0x2, 0x6}}, {0x7, 0x10, {0x1, 0x9}}, {0x8, 0x8, {0x3, 0x9}}, {0x0, 0x4, {0x1}}, {0x101, 0x401, {0x1, 0x8}}, {0x800, 0x450f, {0x0, 0x5}}, {0x0, 0xfe, {0x0, 0x40}}, {0x9, 0x2, {0x0, 0x3f}}, {0x726c, 0x7ff, {0x3, 0x9}}, {0x8001, 0x2, {0x0, 0x7fff}}, {0x3, 0xffff, {0x0, 0x2}}, {0xff, 0x8, {0x7, 0x955}}, {0x5, 0x101, {0x2, 0x9}}, {0x200, 0x0, {0x1, 0x9}}, {0x8001, 0x1af, {0x3, 0x9}}, {0x7ff, 0x6, {0x2, 0x7fff}}, {0x7fff, 0x6, {0x0, 0x7}}, {0x1, 0x7f, {0x1, 0x9}}, {0x5, 0x3ff, {0x2, 0x7f}}, {0x9, 0x9, {0x2, 0x8001}}, {0x1, 0x10, {0x1, 0x5}}, {0x3, 0xff01, {0x0, 0x2}}, {0x4, 0x5, {0x3, 0x1ff}}, {0x0, 0x8, {0x1, 0x1000}}, {0xfffc, 0xf376, {0x3, 0x5}}, {0x7, 0x922, {0x3, 0x6}}, {0xd8, 0x8001, {0x0, 0x9}}, {0x3ff, 0x0, {0x1, 0xc5f4}}, {0xff, 0xfff, {0x2}}]}}}, {{0x254, 0x1, {{0x3, 0x2}, 0x0, 0x4, 0x7ff, 0x7, 0x18, 'syz0\x00', "e0683491987466269033529a418af670c4bf240bfda916347afdc82468ab40cb", "16d2b911217a7cef362f81f4be1930942e3b799db81f4132ebeb5853110d92f6", [{0x1f, 0x2, {0x0, 0x6}}, {0x200, 0x3, {0x3}}, {0x0, 0x6, {0x3, 0x3f}}, {0xffff, 0xfc2, {0x2, 0xbf6}}, {0xff, 0x3, {0x3}}, {0x200, 0xffff, {0x2, 0x5}}, {0x6, 0x9, {0x3, 0x9}}, {0x4, 0x6, {0x3}}, {0x8, 0xce, {0x2, 0xa5}}, {0xb258, 0x9, {0x3, 0x7ff}}, {0x0, 0x488, {0x2, 0x6}}, {0x0, 0x6e7, {0x2, 0x9}}, {0x6, 0x2, {0x0, 0x8}}, {0x9, 0x4, {0x3, 0x5}}, {0x6341, 0x151, {0x1, 0x100}}, {0x401, 0x1, {0x1, 0x9}}, {0x5f8, 0x8885, {0x3, 0xfffffffd}}, {0x414e, 0x4, {0x1, 0x5}}, {0x200, 0x0, {0x1, 0xcde}}, {0x86a, 0x9, {0x3, 0x3}}, {0xe51f, 0x0, {0x3, 0x8}}, {0xe5e5, 0x40, {0x1, 0x6}}, {0xc9ae, 0x20, {0x0, 0x2}}, {0x3, 0x6, {0x0, 0x8}}, {0x100, 0x9, {0x0, 0x6}}, {0x7, 0x9, {0x3, 0x7f}}, {0x0, 0x1f, {0x0, 0x5}}, {0x6, 0xfc, {0x2, 0xffffffff}}, {0x0, 0x3, {0x2, 0x1}}, {0x0, 0x7, {0x1, 0x9}}, {0x7f, 0x8, {0x2, 0x5}}, {0x6, 0x200, {0x1}}, {0x800, 0x7, {0x3, 0x1}}, {0x101, 0x7, {0x3, 0x401}}, {0xf877, 0x9, {0x1, 0x1}}, {0x0, 0x72}, {0x401f, 0x3, {0x1, 0x1}}, {0xf60b, 0x8001, {0x0, 0x7ff}}, {0x1, 0x5, {0x2, 0x9}}, {0x1, 0xff, {0x0, 0x8000}}]}}}, {{0x254, 0x1, {{0x2, 0x1c80}, 0x4, 0x23, 0x4, 0x446, 0x22, 'syz0\x00', "884f3bc6d92841972c4dc7eef4195001ae9524f842f1a8ab3fe33f1e8ac427b4", "04353489ae9b5ceb05f3ca895ba04bd05b51ae92bb0225d9b087c50ec32adcae", [{0x9, 0x1, {0x3, 0x25c}}, {0x3f, 0x1, {0x1, 0x7}}, {0x0, 0x4655, {0x3, 0xfffffe01}}, {0x8, 0x0, {0x2, 0x1}}, {0x4800, 0x80, {0x0, 0x4}}, {0x6, 0x3, {0x3, 0x1ef}}, {0x7ff, 0x6, {0x0, 0x9}}, {0x6, 0x20, {0x2, 0xfffffffd}}, {0x4, 0x2, {0x1, 0x8000}}, {0xe239, 0x3ff, {0x2, 0x101}}, {0x6, 0x1, {0x2, 0x7}}, {0x5, 0x7, {0x3, 0x3cb}}, {0x4, 0xfa, {0x0, 0xd2e}}, {0x0, 0x1, {0x1}}, {0x1, 0x4, {0x3, 0x9c}}, {0xff, 0x3, {0x3, 0x5}}, {0x3, 0xb40, {0x3, 0x48}}, {0x3, 0x3, {0x3, 0xfffffffc}}, {0x1, 0xfffa, {0x2, 0x3}}, {0x20, 0x5, {0x2, 0x10001}}, {0x5, 0x5, {0x1, 0xee3}}, {0xfffb, 0x1, {0x3, 0x2}}, {0xa9, 0x3, {0x3, 0x100}}, {0x6, 0x20, {0x3, 0x5}}, {0x22c9, 0x6, {0x0, 0x2}}, {0x3, 0x7, {0x3, 0x9}}, {0x4, 0x5, {0x1, 0xaa}}, {0xd51, 0x800, {0x0, 0xffffff57}}, {0x4, 0x9, {0x2, 0x401}}, {0x81, 0x9, {0x1, 0x401}}, {0x3, 0x80, {0x0, 0x7}}, {0x401, 0x4, {0x3, 0x1}}, {0x40, 0x8, {0x3}}, {0x1, 0x0, {0x1, 0x3}}, {0x401, 0x3, {0x3}}, {0x9, 0x0, {0x3, 0x1ff}}, {0x9, 0x1, {0x0, 0xffffffc0}}, {0x8e6, 0x1f, {0x0, 0x80}}, {0x9, 0x8001, {0x1, 0x9}}, {0x7ff, 0x0, {0x2, 0x1}}]}}}, {{0x254, 0x1, {{0xff38bb9db1d2f210, 0x800}, 0xb7, 0x6, 0x5, 0x9, 0x12, 'syz0\x00', "b0b0b335f8e56fd91720a7e58188b49befbd13e89f585fdc96780001c63b39a8", "8dff478e1ec257c77c63ce55358cb4c4cba7e5886bca2a80689bed53210e892c", [{0xfffa, 0x4, {0x2, 0xffffffff}}, {0x3ff, 0xff, {0x0, 0xbd1f}}, {0x683, 0x3, {0x2, 0x47b79bfe}}, {0x40, 0x1000, {0x1, 0x100}}, {0x3, 0x5, {0x1, 0x80000000}}, {0x1, 0xffff, {0x0, 0x5}}, {0x7, 0x302d, {0x0, 0x3}}, {0xad6, 0xfff, {0x2, 0x80}}, {0x9, 0x7319, {0x0, 0x3}}, {0x1000, 0x29b, {0x3}}, {0x9, 0x2, {0x0, 0x5}}, {0x400, 0x400, {0x2, 0x4}}, {0x9, 0x8000, {0x3, 0x8}}, {0x1000, 0x7, {0x3, 0x8}}, {0xcc, 0x9, {0x3, 0x7161}}, {0x800, 0x9, {0x0, 0x2}}, {0x401, 0xf667, {0x3, 0xfffffff7}}, {0x80, 0x8, {0x3, 0x7f}}, {0x47, 0xfff7, {0x1, 0x3}}, {0x1f, 0x70, {0x2, 0x6}}, {0x4, 0x0, {0x2, 0x2}}, {0x2, 0x1000, {0x1, 0x8001}}, {0x5, 0xc8, {0x2, 0x7}}, {0x7, 0x200, {0x2, 0x8}}, {0x1, 0x7, {0x1, 0x1}}, {0x5, 0x8, {0x3, 0x1000}}, {0xc1bc, 0x800, {0x0, 0x400}}, {0x9, 0x3, {0x0, 0x10000}}, {0x1, 0x200, {0x1, 0x7}}, {0x6, 0x0, {0x1, 0x7f}}, {0x3, 0x1fe0, {0x3}}, {0x0, 0x3, {0x1, 0x2}}, {0x3, 0xd6b, {0x3, 0x20}}, {0x2, 0x0, {0x1, 0x80}}, {0x6, 0x400, {0x2, 0xa95}}, {0x7, 0x3, {0x2, 0x20000}}, {0x6, 0x3ff}, {0xe7, 0x9, {0x0, 0x1}}, {0x3f, 0x9, {0x0, 0x6}}, {0xcca, 0x5, {0x0, 0x10001}}]}}}, {{0x254, 0x1, {{0x1, 0x2}, 0x7, 0x8, 0xd5d2, 0x81, 0x3, 'syz1\x00', "fbe20b3dc72788dbdf9b32ba75d71f7608a2f67a52a21e1b053d3e7edd4b9ee1", "a6738961504b0a7681ea2bdcfcc14e08004dec8edc893a4858db21376fdb74d3", [{0x8000, 0x2, {0x3, 0x6b5b}}, {0x9, 0x7, {0x0, 0x2}}, {0xa4e1, 0x1f, {0x2, 0x1}}, {0x7, 0xbde, {0x0, 0xacf4}}, {0x5, 0x7dbd, {0x2, 0x45b2}}, {0x1ff, 0x100, {0x3, 0x4}}, {0x7, 0x4, {0x3, 0x7}}, {0x0, 0xb3, {0x3}}, {0x3b, 0x2, {0x0, 0x5}}, {0x55e0, 0x0, {0x1, 0x4}}, {0x9b1, 0x7, {0x0, 0x2}}, {0x2, 0x1, {0x1, 0x400}}, {0xf590, 0x8, {0x1, 0x6}}, {0x7, 0x4, {0x3, 0xab3}}, {0x6, 0x1, {0x2, 0x7fff}}, {0x0, 0x8, {0x1, 0x4}}, {0x0, 0x6, {0x1, 0x8}}, {0x7f, 0x7, {0x1, 0x9}}, {0x5, 0x5, {0x2, 0x80000001}}, {0x0, 0x7, {0x1}}, {0x1, 0x800, {0x0, 0x7ff}}, {0x943c, 0x0, {0x1, 0x80000001}}, {0x800, 0x6, {0x0, 0x6}}, {0x81, 0x100, {0x0, 0x5}}, {0x7, 0xff, {0x1, 0x100}}, {0x4446, 0xffff, {0x0, 0x401}}, {0x2, 0x0, {0x1, 0x3}}, {0x4, 0x2, {0x1, 0x7}}, {0xed, 0xfff9, {0x0, 0x80000000}}, {0x3, 0x85e, {0x5, 0xfffff001}}, {0x6, 0x8, {0x1, 0x9}}, {0x5, 0x2, {0x1}}, {0x97d, 0x3, {0x0, 0x8}}, {0x4, 0x9a75, {0x2, 0x7}}, {0x540, 0xe8eb, {0x0, 0x8}}, {0x1, 0x8000, {0x2}}, {0x5, 0x8000, {0x2, 0x2}}, {0xfff, 0x2, {0x1, 0x7}}, {0x7ff, 0x3c, {0x3, 0xff}}, {0x2, 0x3, {0x3, 0xffffffff}}]}}}, {{0x254, 0x1, {{0x2, 0x8000}, 0x9, 0x4, 0xc38f, 0x1, 0x5, 'syz1\x00', "2301800c3a3109650717b294c6ef934e0b005160a16d8a09f36884d894fa7b92", "54624eb910e862faa63c64b000e0f07c3b1fb2324f6650abda7ac8fa3575f5e3", [{0x0, 0xa06b, {0x1, 0x6f}}, {0x2, 0x6, {0x4, 0x6}}, {0x4, 0x3f, {0x0, 0x7}}, {0x7, 0xe1, {0x1, 0xd2}}, {0x3ff, 0x0, {0x3, 0x8}}, {0x3ff, 0x7, {0x1, 0x9}}, {0xe41, 0x2, {0x1, 0x2}}, {0x9, 0x4, {0x1}}, {0xffff, 0x400, {0x1}}, {0xf68c, 0x920, {0x2, 0x30}}, {0x312, 0x5589, {0x0, 0x9}}, {0x200, 0x2, {0x1, 0x1f}}, {0xcda, 0x5b6e, {0x2, 0x7}}, {0xa6, 0x8, {0x1, 0x2}}, {0x5, 0x7, {0x0, 0x5}}, {0x6, 0x4, {0x2, 0x33}}, {0x6, 0x6, {0x3}}, {0x4, 0x0, {0x0, 0x9}}, {0x8001, 0x1, {0x0, 0x5}}, {0x6, 0x6, {0x0, 0x4}}, {0xa6fa, 0x9, {0x1, 0x220}}, {0x3, 0x81, {0x1, 0x7fffffff}}, {0x2, 0x0, {0x1}}, {0x1, 0x1000, {0x0, 0x5}}, {0x7ff, 0x7, {0x3, 0x2}}, {0x9, 0x40, {0x1, 0x2}}, {0x62, 0x5978, {0x0, 0xa30}}, {0x2, 0x9c33, {0x0, 0x1ff}}, {0x80, 0x6, {0x0, 0x20}}, {0x81, 0x581, {0x3, 0x6}}, {0xfff7, 0x2f8f}, {0x8, 0x9, {0x0, 0xffff}}, {0x9, 0x9, {0x2, 0xff}}, {0x5, 0x3ff, {0x3, 0xde2f}}, {0x101, 0x7, {0x3, 0x7110}}, {0x0, 0x1, {0x3, 0x8}}, {0x7, 0x8, {0x3, 0x5be}}, {0x5, 0x611c, {0x2}}, {0x4, 0x1, {0x3, 0x4}}, {0x1, 0xba40, {0x1, 0x10000}}]}}}, {{0x254, 0x1, {{0x1, 0x401}, 0x2, 0x2, 0x200, 0x769, 0x28, 'syz0\x00', "52009ee4bc8efb44878c944b74dd41b8ff6e280a00c5c22edfb046732b49a9f6", "d8c566b471986fd13d2a731a369f418992db72aa214e412c5fe423e004bff295", [{0x200, 0x6, {0x2, 0x3ff}}, {0x2, 0x3, {0x1}}, {0x2, 0xfff, {0x2, 0x23e3f113}}, {0x3819, 0xa85a, {0x1, 0xffffffff}}, {0x5, 0x9, {0x2, 0x2}}, {0xfffc, 0x6, {0x1, 0x1}}, {0x4, 0x7fff, {0x3, 0x100}}, {0x3, 0x5d6a, {0x2, 0x6}}, {0x40, 0x6, {0x0, 0x80}}, {0xffff, 0xb94e, {0x3, 0x80}}, {0x5, 0x791, {0x0, 0x6}}, {0x5, 0x7ff, {0x0, 0x1}}, {0x0, 0x1f, {0x3, 0x81}}, {0xffff, 0x6, {0x2, 0x5}}, {0x1, 0x200, {0x2, 0x7f}}, {0x80, 0x7, {0x3, 0xf1f}}, {0xffff, 0x9, {0x0, 0xec8200}}, {0x5, 0x1, {0x0, 0x100}}, {0x2, 0x400, {0x0, 0xffffffff}}, {0x7, 0x0, {0x1}}, {0x4f, 0x6, {0x3, 0x7}}, {0x8, 0x1, {0x2}}, {0xe000, 0x6, {0x3, 0x5}}, {0x7, 0x2ce, {0x1, 0x3}}, {0x101, 0x8, {0x3, 0xffff}}, {0x7, 0x1, {0x0, 0x8}}, {0x200, 0x8001, {0x0, 0x2}}, {0x2c68, 0x3, {0x0, 0xffff}}, {0x29, 0xfaa, {0x3, 0x200}}, {0x7, 0xf1, {0x0, 0x6}}, {0x3, 0x5, {0x1, 0xad7}}, {0x2, 0x0, {0x1, 0x38c}}, {0x0, 0x0, {0x0, 0xffff76ab}}, {0x9, 0xaf, {0x2, 0x3f}}, {0x1000, 0xfe00, {0x3, 0x1b7}}, {0x7e, 0xff, {0x0, 0x3}}, {0x1, 0x5, {0x1, 0x274}}, {0x8001, 0x3cd1, {0x0, 0x5}}, {0x1, 0x65, {0x0, 0x8}}, {0x6cec, 0xfff7, {0x2, 0x9}}]}}}, {{0x254, 0x1, {{0x1, 0x3f}, 0x51, 0x3, 0x3f, 0x822, 0x1c, 'syz0\x00', "64fa7294dfea540041072bf03d7f90309005d94cb1d0a6620c065d0067b5c110", "17df73d52383fab52872f25c0435f6bbda7398486f7521878a954872bc6544ac", [{0x4, 0x400, {0x3, 0x6}}, {0x401, 0xff, {0x2, 0x8}}, {0x1000, 0x81, {0x2, 0x5}}, {0x8, 0x3ff, {0x1, 0x6}}, {0x1000, 0x400, {0x0, 0x2}}, {0x1ff, 0x4}, {0x9, 0x3ff, {0x3, 0x1f}}, {0x1, 0x81, {0x1, 0x1}}, {0x5, 0x8000, {0x3, 0x3}}, {0x52a, 0x0, {0x2}}, {0xe74, 0x54b, {0x1, 0x8000}}, {0x1, 0x6, {0x1, 0xa25b720b}}, {0x80, 0x40, {0x3, 0x1000}}, {0x4, 0x2c6e, {0x3, 0x63b}}, {0x8, 0x7fff, {0x1, 0x6}}, {0x3, 0x5, {0x2, 0x4}}, {0xff, 0x40, {0x3, 0xfffff800}}, {0x3, 0x846, {0x1, 0x400}}, {0x0, 0x1f, {0x0, 0x7fffffff}}, {0x0, 0x4, {0x1, 0x3ff}}, {0xfff, 0x6, {0x3, 0x6}}, {0x1, 0x7f, {0x3, 0x7ff}}, {0x5, 0x20, {0x3}}, {0x8, 0x200, {0x0, 0x8}}, {0xd6, 0x36b, {0x3}}, {0x3, 0x9f5, {0x2, 0xda}}, {0x40, 0x40, {0x0, 0x3f}}, {0x20, 0x2, {0x0, 0xfff}}, {0x6, 0x400, {0x3, 0x88a7}}, {0x1000, 0x770, {0x1, 0x200}}, {0x3ff, 0x5}, {0x1, 0x1, {0x2}}, {0x8, 0xb0, {0x4, 0x8}}, {0x2, 0x7, {0x0, 0x20}}, {0x8, 0x1f, {0x1, 0x10001}}, {0x2, 0x8, {0x2, 0x8}}, {0x0, 0xbe, {0x1, 0x7}}, {0x1, 0x200, {0x2, 0xdde2}}, {0x0, 0x8, {0x2, 0xfffffff8}}, {0x8, 0x8000, {0x1, 0x2}}]}}}, {{0x254, 0x1, {{0x3}, 0x7, 0x20, 0x8, 0x5, 0xd, 'syz1\x00', "a29b31cf28207f2acdac33a2191b07a0f99687b6a6c2688d9ac9d025e1fc2537", "bd8e928cbcf53b854be2419d53b92b20d562fd0b94584f974aafaf4dc688c839", [{0x7fff, 0x7fff, {0x0, 0x1}}, {0x40, 0xfff7, {0x2, 0x10000}}, {0x3, 0x1, {0x1, 0x9}}, {0x0, 0x2, {0x1, 0x20}}, {0x8000, 0x4, {0x0, 0x10000}}, {0x6, 0x0, {0x3, 0x3ff}}, {0x80, 0xbb, {0x0, 0x4}}, {0x1000, 0xfd, {0x2, 0x9}}, {0x2, 0x1, {0x0, 0xffff0001}}, {0x0, 0xf801, {0x1, 0x1b9}}, {0x2, 0x5, {0x0, 0x3}}, {0x8, 0x400, {0x2, 0x20}}, {0xe6f, 0xffff, {0x2, 0x2}}, {0x6, 0x4}, {0x1, 0x1, {0x0, 0x80000000}}, {0x2, 0x33a, {0x2, 0x3ff}}, {0x4, 0x8, {0x3, 0x7f}}, {0x2, 0xff81, {0x3, 0xec}}, {0x4f, 0xd7, {0x1, 0xcc}}, {0xff, 0x401, {0x0, 0x80000000}}, {0x0, 0x2, {0x2, 0x3}}, {0xff, 0x421, {0x3, 0x3}}, {0x20, 0xff80, {0x3, 0x3ff}}, {0x3, 0x8, {0x2, 0x2}}, {0x3, 0x9, {0x0, 0x4}}, {0x2, 0x7ff, {0x1, 0x20}}, {0x7, 0xfeff, {0x0, 0xca7d}}, {0x2, 0x2, {0x2, 0x9}}, {0x200, 0x9, {0x0, 0xfff}}, {0x1f, 0x1, {0x1, 0x9}}, {0x800, 0x40, {0x1, 0x7ff}}, {0x8, 0x0, {0x2, 0x1}}, {0x77, 0xfffb, {0x1, 0x8}}, {0x2, 0x8, {0x1, 0x4}}, {0x7, 0x6, {0x2, 0x101}}, {0x3, 0x800}, {0x25, 0x3595, {0x0, 0x9}}, {0x5, 0x5, {0x2}}, {0x9, 0x101, {0x0, 0x7fffffff}}, {0xffff, 0xff, {0x2, 0x10001}}]}}}]}, 0x175c}, 0x1, 0x0, 0x0, 0x80}, 0x4040040) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:03:58 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xe0ffff, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x300}}}}}}}, 0x0) 05:03:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) r3 = accept4$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed}, &(0x7f0000000140)=0xe, 0x1000) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000180)=0x4e25) write$binfmt_aout(r2, &(0x7f00000005c0)={{0x107, 0x40, 0x0, 0x3c8, 0x33a, 0x4, 0x23a, 0x400}, "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa20) [ 334.745824][T16562] BPF:Unsupported section found 05:03:58 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 334.815848][T16571] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 334.855230][T16573] BPF:Unsupported section found [ 334.875767][T16577] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x500}}}}}}}, 0x0) [ 334.942942][T16586] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:58 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 335.056489][T16591] BPF:Unsupported section found 05:03:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x2, 0x5, 0xc2}}}}}}}, 0x0) [ 335.119993][T16591] BPF:Unsupported section found [ 335.138823][T16596] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 335.153456][T16597] BPF:Unsupported section found 05:03:58 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xe0ffff, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x600}}}}}}}, 0x0) 05:03:59 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 335.258590][T16604] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 335.328589][T16606] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 335.409684][T16612] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 335.427221][T16613] BPF:Unsupported section found [ 335.472023][T16613] BPF:Unsupported section found [ 335.500116][T16618] BPF:Unsupported section found 05:03:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x700}}}}}}}, 0x0) 05:03:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x3, 0x5, 0xc2}}}}}}}, 0x0) 05:03:59 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:59 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48b9c8ac803d944aefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2001, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000140)=r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) read(r3, &(0x7f0000000300)=""/67, 0x43) sendfile(r3, r5, 0x0, 0x8000000000005) sendfile(r3, r4, 0x0, 0x10000000000a00) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x44, 0x3, 0x3f, 0x5}, {0x3, 0x1, 0x9}]}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r6 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:03:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/67, 0x43) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000000000005) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000000000a00) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000180)=0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db1051c7350dd02111f04603f5b0be06011878bc39a28a1ab5df70f6f2ab1a865ac56b32ba63c5e32f5736b76b23307152bf5c9b0d"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r1, 0xf505, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x3c, r4, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xffffffffffff7fff}, @L2TP_ATTR_LNS_MODE={0x5}]}, 0x3c}}, 0x0) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX=r3], 0xc8) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) r5 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r5, 0x4008941a, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x8) [ 335.983421][T16637] BPF:Unsupported section found [ 335.990662][T16645] BPF:Unsupported section found [ 336.050052][T16651] BPF:Unsupported section found 05:03:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x4, 0x5, 0xc2}}}}}}}, 0x0) 05:03:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0xab2}}}}}}}, 0x0) 05:03:59 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:03:59 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x1100}}}}}}}, 0x0) 05:04:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x5, 0x5, 0xc2}}}}}}}, 0x0) [ 336.399268][T16675] BPF:Unsupported section found [ 336.413370][T16676] BPF:Unsupported section found 05:04:00 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 336.503258][T16683] BPF:Unsupported section found 05:04:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x1f00}}}}}}}, 0x0) 05:04:00 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}}, 0x0) [ 336.726931][T16688] BPF:Unsupported section found [ 336.792590][T16693] BPF:Unsupported section found [ 336.825920][T16699] BPF:Unsupported section found [ 336.930560][T16703] BPF:Unsupported section found 05:04:01 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:01 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.state\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48b92fc000400000067ef82028dcece411125b7b7d857c0c666ba4a111aac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r4, {0x2, 0x0, @dev}, 0x2}}, 0x2e) setsockopt$inet6_buf(r4, 0x29, 0x6, &(0x7f00000001c0)="47bcdfad7d1eadaf9eac02352eeb8ea74203508af4673299c482e2d2e857f3b4ad233f8a89257538054e9f194f4eff3188b6e64c0fa0e40b000826a9f76f6170da948706469ed92bcb81e9487d1648fd628546d812a06a3dbcb377847815018ffe020a7d8dd3179b7d9b27f6643352f30a669b6c", 0x74) 05:04:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[@ANYRES64, @ANYRESHEX=r0, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db7564e8c0cef880b72d253569edb1fe86c5eeb9955a8e4738d0041d6dd4d14d6f54da85d07f39436ee2248b1b53a59d6b5b72a3f85fbbe7febadf805543e8b18cf101f776a65613c2e1f9cc6e2672617e4045a2812091eda642236e99b1e5cadd668979f19808fd6c37f5ccf8204d21845643963759096188e832430980c19b"], 0x208e24b) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4f40, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000001c0)={'veth1_to_team\x00'}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)={'veth1_vlan\x00'}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000000, 0x28011, r1, 0x5d088000) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x3e) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'ipvlan0\x00'}) r4 = socket$netlink(0x10, 0x3, 0x12) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r5, 0x8912, 0x400308) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000003, 0x810, r5, 0xd1cfa000) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:01 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x2000}}}}}}}, 0x0) 05:04:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x7, 0x5, 0xc2}}}}}}}, 0x0) [ 337.407869][T16720] BPF:Unsupported section found [ 337.503463][T16731] BPF:Unsupported section found 05:04:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x4, 0xc2}}}}}}}, 0x0) 05:04:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x3c00}}}}}}}, 0x0) [ 337.591520][T16738] BPF:Unsupported section found 05:04:01 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:01 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan0\x00'}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a0e9c1d42a53626dd36bc75fd5852e3561e14f12233cc0b97d1967ef8202cdcece41ac69d14aac6933b85999a3063fd989844741c16d70"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) read(r3, &(0x7f0000000300)=""/67, 0x43) sendfile(r3, r5, 0x0, 0x8000000000005) sendfile(r3, r4, 0x0, 0x10000000000a00) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000000)=0x1) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:01 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40200, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) r3 = socket$inet_smc(0x2b, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x810, r3, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x3f00}}}}}}}, 0x0) 05:04:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0xc2}}}}}}}, 0x0) [ 337.900783][T16754] BPF:Unsupported section found [ 337.956007][T16760] BPF:Unsupported section found 05:04:01 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 338.051886][T16757] device syzkaller1 entered promiscuous mode [ 338.056246][T16770] BPF:Unsupported section found 05:04:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x4000}}}}}}}, 0x0) 05:04:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2}}}}}}}, 0x0) 05:04:01 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 338.296290][T16785] BPF:Unsupported section found 05:04:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x4800}}}}}}}, 0x0) [ 338.435707][T16793] BPF:Unsupported section found 05:04:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0xc2}}}}}}}, 0x0) 05:04:02 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 338.527004][T16797] BPF:Unsupported section found [ 338.703236][T16806] BPF:Unsupported section found 05:04:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f00004aa000/0x1000)=nil, 0x1000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:02 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 338.911004][T16817] BPF:Unsupported section found [ 338.966498][T16817] BPF:Unsupported section found 05:04:02 executing program 0: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000000)=0x9) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0xf000) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000140)={'team_slave_1\x00'}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x4c00}}}}}}}, 0x0) 05:04:02 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:02 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 339.282470][T16834] BPF:Unsupported section found 05:04:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x6000}}}}}}}, 0x0) [ 339.340039][T16840] BPF:Unsupported section found [ 339.374655][T16841] BPF:Unsupported section found 05:04:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x2}}}}}}}, 0x0) [ 339.451316][T16840] BPF:Unsupported section found 05:04:03 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 339.521579][T16849] net_ratelimit: 23 callbacks suppressed [ 339.521599][T16849] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:03 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x1f000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 339.628816][T16852] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x6800}}}}}}}, 0x0) [ 339.688983][T16857] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 339.711241][T16858] BPF:Unsupported section found [ 339.789145][T16862] BPF:Unsupported section found [ 339.823307][T16863] BPF:Unsupported section found [ 339.893489][T16867] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:04 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x3}}}}}}}, 0x0) 05:04:04 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x20000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x6c00}}}}}}}, 0x0) 05:04:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth0_to_team\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 340.684373][T16885] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 340.713367][T16889] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 340.720161][T16886] BPF:Unsupported section found [ 340.739653][T16893] BPF:Unsupported section found 05:04:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x7400}}}}}}}, 0x0) [ 340.780777][T16895] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 340.811348][T16898] BPF:Unsupported section found 05:04:04 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x1f000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:04 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x24000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x4}}}}}}}, 0x0) [ 341.009701][T16906] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dummy0\x00'}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x4d1, @private2, 0x4}}, 0x2000, 0x81}, &(0x7f0000000200)=0x90) [ 341.160504][T16914] BPF:Unsupported section found [ 341.161892][T16915] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x7a00}}}}}}}, 0x0) [ 341.208368][T16920] BPF:Unsupported section found [ 341.251552][T16921] BPF:Unsupported section found 05:04:05 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x20000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 341.302225][T16925] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:05 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x30000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 341.514365][T16933] BPF:Unsupported section found [ 341.535754][T16935] BPF:Unsupported section found 05:04:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0xb20a}}}}}}}, 0x0) 05:04:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x5}}}}}}}, 0x0) [ 341.577433][T16940] BPF:Unsupported section found 05:04:05 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x32000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:05 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x24000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0xffff}}}}}}}, 0x0) 05:04:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x6}}}}}}}, 0x0) [ 341.908377][T16951] BPF:Unsupported section found [ 341.991804][T16961] BPF:Unsupported section found 05:04:05 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 342.104206][T16966] BPF:Unsupported section found [ 342.290941][T16974] BPF:Unsupported section found 05:04:06 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:06 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x30000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x7}}}}}}}, 0x0) 05:04:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x2}}}}}}}, 0x0) 05:04:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64, @ANYRES32, @ANYRESOCT=r0], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x4) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'geneve1\x00', {0x2, 0x0, @remote}}) [ 342.851786][T16991] BPF:Unsupported section found [ 342.920607][T16999] BPF:Unsupported section found 05:04:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x8}}}}}}}, 0x0) [ 342.955432][T17001] BPF:Unsupported section found 05:04:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x3}}}}}}}, 0x0) 05:04:06 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x60000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:06 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x32000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91dee21c7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd203a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$FIONCLEX(r1, 0x5450) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0xa}}}}}}}, 0x0) [ 343.344518][T17020] BPF:Unsupported section found [ 343.348545][T17021] BPF:Unsupported section found 05:04:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x4}}}}}}}, 0x0) [ 343.427109][T17026] BPF:Unsupported section found 05:04:07 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:07 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x610c0000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x11}}}}}}}, 0x0) 05:04:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 343.782985][T17045] BPF:Unsupported section found [ 343.798861][T17046] BPF:Unsupported section found 05:04:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x3c}}}}}}}, 0x0) [ 343.887673][T17053] BPF:Unsupported section found [ 343.893958][T17046] BPF:Unsupported section found 05:04:07 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x620c0000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x6}}}}}}}, 0x0) 05:04:07 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x48}}}}}}}, 0x0) [ 344.214505][T17065] BPF:Unsupported section found [ 344.300972][T17070] BPF:Unsupported section found [ 344.397886][T17075] BPF:Unsupported section found 05:04:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="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"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x3c, r4, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xffffffffffff7fff}, @L2TP_ATTR_LNS_MODE={0x5}]}, 0x3c}}, 0x0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000400)=0x46aa3c53, 0x4) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xf0, 0x0, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9b53}]}, @TIPC_NLA_NET={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfb}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xcc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc5b}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_LINK={0x88, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xee8b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x80}, 0x4004000) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x7}}}}}}}, 0x0) 05:04:08 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x630c0000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:08 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x5d0c0000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x4c}}}}}}}, 0x0) [ 344.759447][T17086] net_ratelimit: 25 callbacks suppressed [ 344.759467][T17086] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 344.789606][T17089] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 344.796711][T17087] BPF:Unsupported section found [ 344.810714][T17088] BPF:Unsupported section found [ 344.871522][T17096] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 344.890562][T17098] BPF:Unsupported section found 05:04:08 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x640c0000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x8}}}}}}}, 0x0) 05:04:08 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x5e0c0000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x60}}}}}}}, 0x0) [ 345.073692][T17101] device syzkaller1 entered promiscuous mode [ 345.152358][T17110] BPF:Unsupported section found [ 345.190075][T17113] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 345.217523][T17117] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 345.227914][T17116] BPF:Unsupported section found [ 345.276125][T17120] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:09 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x11}}}}}}}, 0x0) [ 345.329766][T17122] BPF:Unsupported section found 05:04:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x68}}}}}}}, 0x0) [ 345.543515][T17128] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 345.558100][T17125] BPF:Unsupported section found [ 345.559869][T17131] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 345.663797][T17135] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000180)={{0x0, 0x10001, 0x4be0000, 0x8, 0x8000, 0xeab, 0x2, 0x2, 0xb1, 0xbc4, 0x4, 0x8, 0x3f, 0xffff000000, 0x252}, 0x18, [0x0, 0x0, 0x0]}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x50b141, 0x0) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000140)=0x1) socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) socket$l2tp6(0xa, 0x2, 0x73) r4 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000040)={'ipvlan1\x00', {0x2, 0x0, @remote}}) 05:04:09 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x5f0c0000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x3c}}}}}}}, 0x0) 05:04:09 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x6c}}}}}}}, 0x0) [ 346.218957][T17151] BPF:Unsupported section found [ 346.240692][T17154] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 346.242596][T17155] BPF:Unsupported section found 05:04:10 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x74}}}}}}}, 0x0) 05:04:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x48}}}}}}}, 0x0) [ 346.396610][T17162] BPF:Unsupported section found 05:04:10 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x60000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 346.548526][T17168] BPF:Unsupported section found 05:04:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x7a}}}}}}}, 0x0) 05:04:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x4c}}}}}}}, 0x0) 05:04:10 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 346.742606][T17182] BPF:Unsupported section found [ 346.867200][T17191] BPF:Unsupported section found [ 346.932968][T17194] BPF:Unsupported section found 05:04:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000000)={r2, 0x3, 0x0, 0x8}) openat$cgroup_ro(r3, &(0x7f0000000140)='pids.current\x00', 0x0, 0x0) 05:04:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x300}}}}}}}, 0x0) 05:04:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x60}}}}}}}, 0x0) 05:04:10 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x600c0000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:10 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xda000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 347.363492][T17215] BPF:Invalid section offset 05:04:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x68}}}}}}}, 0x0) [ 347.394189][T17217] BPF:Unsupported section found 05:04:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x500}}}}}}}, 0x0) [ 347.523781][T17224] BPF:Unsupported section found 05:04:11 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:11 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x6c}}}}}}}, 0x0) 05:04:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x600}}}}}}}, 0x0) [ 347.807815][T17238] BPF:Invalid section offset [ 347.842949][T17240] BPF:Unsupported section found [ 347.941100][T17247] BPF:Unsupported section found 05:04:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x74}}}}}}}, 0x0) 05:04:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x3c, r3, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xffffffffffff7fff}, @L2TP_ATTR_LNS_MODE={0x5}]}, 0x3c}}, 0x0) write$binfmt_aout(r2, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x478) r4 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:12 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffe000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:12 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x700}}}}}}}, 0x0) 05:04:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x7a}}}}}}}, 0x0) [ 348.764233][T17275] BPF:Invalid section offset [ 348.781437][T17274] BPF:Unsupported section found 05:04:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x300}}}}}}}, 0x0) 05:04:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0xa00}}}}}}}, 0x0) [ 348.903055][T17282] BPF:Unsupported section found 05:04:12 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:12 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0xaad}}}}}}}, 0x0) 05:04:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x500}}}}}}}, 0x0) [ 349.189440][T17296] BPF:Invalid section offset [ 349.204013][T17297] BPF:Unsupported section found [ 349.303719][T17302] BPF:Unsupported section found 05:04:13 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 349.553948][T17312] BPF:Unsupported section found 05:04:13 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x1408, 0x1}, 0x10}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYRES64, @ANYBLOB="386e6b0584319947df9395", @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a72d2db76d0c9e57a6c0c26b495ba7ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c169700b8f757fc4e51663e5"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r2, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r4 = socket$isdn(0x22, 0x3, 0x10) pread64(r4, &(0x7f0000000140)=""/117, 0x75, 0x80000000000002) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:13 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x1100}}}}}}}, 0x0) 05:04:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x600}}}}}}}, 0x0) 05:04:13 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 349.980315][T17323] net_ratelimit: 27 callbacks suppressed [ 349.980335][T17323] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 350.008009][T17326] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 350.058807][T17325] BPF:Unsupported section found [ 350.067930][T17332] BPF:Unsupported section found [ 350.115706][T17336] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:13 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 350.168097][T17340] BPF:Unsupported section found 05:04:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x700}}}}}}}, 0x0) 05:04:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x1f00}}}}}}}, 0x0) 05:04:14 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xda000000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 350.396304][T17347] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 350.415837][T17351] BPF:Unsupported section found [ 350.441565][T17353] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 350.456291][T17354] BPF:Invalid section offset [ 350.483649][T17357] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0xab2}}}}}}}, 0x0) 05:04:14 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x23, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 350.558000][T17361] BPF:Invalid section offset 05:04:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x2000}}}}}}}, 0x0) [ 350.738898][T17368] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 350.782983][T17367] BPF:Unsupported section found 05:04:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef820cb8cece419d69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:14 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x1100}}}}}}}, 0x0) [ 350.864028][T17376] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:14 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2b, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 350.943425][T17379] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 351.013852][T17383] BPF:Invalid section offset [ 351.060136][T17387] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 351.090505][T17388] BPF:Invalid section offset 05:04:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x3c00}}}}}}}, 0x0) [ 351.157867][T17394] BPF:Unsupported section found 05:04:14 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffe000, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x1f00}}}}}}}, 0x0) 05:04:15 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2d, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 351.429310][T17405] BPF:Invalid section offset 05:04:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x3f00}}}}}}}, 0x0) [ 351.498500][T17412] BPF:Invalid section offset 05:04:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x2000}}}}}}}, 0x0) [ 351.565105][T17413] BPF:Unsupported section found 05:04:15 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff00, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:15 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x32, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 351.865677][T17431] BPF:Invalid section offset [ 351.900219][T17433] BPF:Section overlap found [ 351.963329][T17436] BPF:Invalid section offset 05:04:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) r2 = accept$netrom(r1, &(0x7f0000000140)={{0x3, @netrom}, [@netrom, @rose, @netrom, @default, @rose, @netrom, @default, @rose]}, &(0x7f0000000000)=0x48) sendfile(r2, r0, &(0x7f00000001c0)=0x3e, 0x620d) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x4000}}}}}}}, 0x0) 05:04:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x3c00}}}}}}}, 0x0) 05:04:16 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:16 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x4800}}}}}}}, 0x0) 05:04:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x3f00}}}}}}}, 0x0) [ 352.470330][T17457] BPF:Unsupported section found [ 352.481351][T17458] BPF:Total section length too long [ 352.563802][T17463] BPF:Unsupported section found [ 352.593779][T17458] BPF:Total section length too long 05:04:16 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:16 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x36, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x4000}}}}}}}, 0x0) 05:04:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x4c00}}}}}}}, 0x0) [ 352.917971][T17481] BPF:Unsupported section found [ 352.944904][T17482] BPF:Total section length too long [ 353.005039][T17488] BPF:Unsupported section found 05:04:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x4800}}}}}}}, 0x0) 05:04:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ip6erspan0\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:17 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3b, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x6000}}}}}}}, 0x0) 05:04:17 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x4c00}}}}}}}, 0x0) [ 353.902942][T17510] BPF:Total section length too long [ 353.954484][T17518] BPF:Unsupported section found 05:04:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x6000}}}}}}}, 0x0) 05:04:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x6800}}}}}}}, 0x0) 05:04:17 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3fff8, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=@gettaction={0x130, 0x32, 0x20, 0x70bd27, 0x25dfdbfb, {}, [@action_gd=@TCA_ACT_TAB={0x54, 0x1, [{0xc, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0x10, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}, @action_gd=@TCA_ACT_TAB={0x34, 0x1, [{0xc, 0xe, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x15, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffe01}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x3f}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x8}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x3c, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}, {0x10, 0x2, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x152}}]}, @action_gd=@TCA_ACT_TAB={0x30, 0x1, [{0x14, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}]}, 0x130}, 0x1, 0x0, 0x0, 0xb3612a4a49ae11f6}, 0x20000080) [ 354.082128][T17523] BPF:Unsupported section found 05:04:17 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x23, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 354.265266][T17533] BPF:Total section length too long 05:04:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x6c00}}}}}}}, 0x0) 05:04:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x6800}}}}}}}, 0x0) 05:04:18 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x7, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 354.432596][T17544] BPF:Unsupported section found [ 354.521160][T17549] BPF:Unsupported section found 05:04:18 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2b, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 354.620634][T17557] BPF:Section overlap found 05:04:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x6c00}}}}}}}, 0x0) 05:04:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x7400}}}}}}}, 0x0) 05:04:18 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0xa, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 354.885785][T17571] BPF:Unsupported section found 05:04:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x7400}}}}}}}, 0x0) [ 354.932207][T17573] BPF:Section overlap found 05:04:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x7a00}}}}}}}, 0x0) [ 354.983502][T17575] BPF:Unsupported section found [ 355.053452][T17579] net_ratelimit: 28 callbacks suppressed [ 355.053473][T17579] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:18 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2d, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 355.186965][T17582] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 355.221053][T17585] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 355.272431][T17586] BPF:Unsupported section found [ 355.328722][T17589] BPF:Unsupported section found 05:04:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000475000/0x4000)=nil, 0x4000, 0xe, 0x40010, r0, 0x9fd8f000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000329000/0x4000)=nil, 0x4000, 0x1000007, 0x110, r1, 0x5c2dc000) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:19 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0xb, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x7a00}}}}}}}, 0x0) 05:04:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0xad0a}}}}}}}, 0x0) 05:04:19 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x32, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 355.652157][T17599] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 355.671603][T17600] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 355.706753][T17607] BPF:Section overlap found [ 355.710995][T17606] BPF:Section overlap found [ 355.733608][T17608] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 355.798093][T17613] BPF:Section overlap found 05:04:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0xb20a}}}}}}}, 0x0) 05:04:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0xb6e3}}}}}}}, 0x0) 05:04:19 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x23, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:19 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 356.033524][T17622] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 356.078241][T17624] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 356.129433][T17630] BPF:Section overlap found [ 356.167136][T17632] BPF:Total section length too long [ 356.178276][T17633] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:19 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x2b, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0xffff}}}}}}}, 0x0) 05:04:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0xe3b6}}}}}}}, 0x0) [ 356.288046][T17636] BPF:Total section length too long [ 356.456432][T17642] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 356.477914][T17643] BPF:Section overlap found 05:04:20 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x36, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:20 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x2d, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x6, @mcast1, 0x3}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0xffff}}}}}}}, 0x0) [ 356.989880][T17656] BPF:Total section length too long [ 357.015707][T17667] BPF:Section overlap found [ 357.059063][T17668] BPF:Total section length too long 05:04:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:20 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3b, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:20 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x32, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x79c6, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @dev}, 0x2}}, 0x2e) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) 05:04:21 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$packet_int(r2, 0x107, 0x48cbc46dd20348e1, &(0x7f0000000000)=0x8000, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x3c, r4, 0x1, 0x0, 0x0, {0x27}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x100, r4, 0x180, 0x70bd2b, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0xfff}, {0x6, 0x16, 0x6e2}, {0x5}, {0x6, 0x11, 0x800}, {0x8, 0xb, 0x3}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x8}, {0x6, 0x16, 0x7fff}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x4}, {0x8, 0xb, 0x5}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x5}, {0x6, 0x16, 0x9c42}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x81}, {0x8, 0xb, 0x4782}}]}, 0x100}, 0x1, 0x0, 0x0, 0x4}, 0x24008014) r5 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x2}}}}}}}, 0x0) [ 357.323285][T17685] BPF:Total section length too long [ 357.355912][T17687] BPF:Unsupported section found 05:04:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_netdev_private(r1, 0x89ff, &(0x7f0000001640)="2c145976b83467362f8447c9d08836dbdb883e4ab0c80450cf1244b63fc32035e00f78454cac002350d61419a912fb0b5ba6ab0a2dec427b9548fb965420414f8b6785f787373e952917b5372da0283566c9aedc81d658343fcd332f7f72dda2cd2249ec2ea5de1017") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) writev(r0, &(0x7f00000015c0)=[{&(0x7f00000001c0)="5755fc64f478403f791176e7ca54db656e1b13e46a02190adfa5efad6fe0b0d3c7a8a7666437621aab40d16a4f93740622687173f3924a3f881d38e7c251699639a10f6b83ab0cb6258dfc56ac6d63d96c606cc310a887fe57b4d908de5cfc51b75b851ada5cd0eaeaea24965b43fe46a9794de7e820b55d403fdc208f32783767e1b0f097093e9d3fbe221954dcb9594604a7878564e87fd787b7b000790bdf8e25fe91f7676ca3c3505d0e1fd1d954f997a5a8a026dc54a3c3eac3c2431a2d4f59d53e38afe36e945df2e5ad17cfb8e4053fe4b3e298cf06a8c700325d752b0bd561b8da", 0xe5}, {&(0x7f0000000080)="25991cf32f5fad66737a4789bb9ff168aae4c4c1d03168e44d2c5df2c9b18270b5dfeb91df3643688826744287e13f649ca8dc8ab4dcd195afedf5a66c85c8798cabc89dbe4ce41b93dfb5", 0x4b}, {&(0x7f00000002c0)="1443966fe58933923c8e425da954222e3e14c03de1f017cdebb685e930252c642053325ae3a73943f3304aa9c07407607e55ad18f193431dce4e3b958357d465c9ae5dc0af73a4e052ecaf9629e3f35cad33f599bc3725e54c59846e7937b31dffa0567f5477cc729d00e5dad97e37ad7022c9cc9552ea1a1702101c9e9f36a95ed566f4398dddf16b360a935968ac621bd7d83038b1b8a9c1847f5ed6cc8b912b9e142c25fa0b4d72a63e9fb42ec0bd43a079fac042d764e6c444e8a1799d05097cb9bad3dda260f8", 0xc9}, {&(0x7f00000003c0)="f44502c9beab5de86b3b2128449e9d471eb779005d7533781017d5a1dc9056ea0432e25c635e16003899be47fa98633abb04cc76cf0c6ae820da900b6759db4736a9d4e152a95e05ed59f8cdbe112d1dd4d5ed04b3efa3d91c1fc9aeb3420c814d249e6da49a65a841aefb15a9624c5e8e2b77206b5dfa9cc66173f3f096f7e3fce88e377f75ef2e2bff0618e6745521091d763e9c36502d817f898f7b86fb94dafce3bfd4252d53d600e42f4b0961529dea26bfabc8d6a2d474afe76ccf5e953779fb079349c08a8a94d1db3715af587a428861c05b16b551c8e430e1", 0xdd}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000000)="99b750875659779e", 0x8}, {&(0x7f00000014c0)="af5bc9be366064f0d0d426c3c6d3ac30cf2510ef31a4abe3ff8ae491db80c02bd3cc154b50a644c29626134b95913d6ec248806c3d475090a0bdb02f437db4b19be8e91d17217a27683f0ec514aefd91b39d98f328141746de4da28212af18ecde7b8065734ecb0ee78bf8ca128052c94a9c920ad8d906b4ddee4d92d35fcd0fe9952a7d25f1dd7735e40a762a07d0b5dd2cd706c105b490dacf4d5cb6593cb18a0dad8c3751e3065e55147bc2c8cd5fd72133dd4c513ff23d56b9816bb41c5c07d844ffc302ba320bbe8af70effe81b894a10c9", 0xd4}], 0x7) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000016c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabbbc3419a9421f8002000000bf7486dd6020920000142600fc030000000000200000000000000000fa8000000000000000000000000000aa00100000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) [ 357.427581][T17692] BPF:Total section length too long 05:04:21 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x34, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:21 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3fff8, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x3}}}}}}}, 0x0) 05:04:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e220aa65f49a4aaf0d9ea44a3883415c40448e04bf019e1e2e75b508b0184faa7b8b02471efac9a1e636752d18f1a5d21e3df58f909e8bda377146146a0cc1b79335de9f43fbb95932b78df6bce0f0c36a4a5e1a9b6644278ae85e1b6495bf15b7d95cebbf87832c105308237194ed3c891e284ca73a5919e835e9987b2cb81be8dcde017acc361bd0607289253c3af4943da0d75a09de4b0423cdd52cfa97633378d21be0c031831e2aa386d26f0b7763927e08a9844d24868478dfd", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) [ 357.723138][T17708] BPF:Invalid section offset [ 357.753346][T17710] BPF:Total section length too long 05:04:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x4}}}}}}}, 0x0) [ 357.850302][T17718] BPF:Total section length too long 05:04:21 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x36, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:21 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x7, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x7, 0x88000000, 0xc2, 0x5, 0x6}, 0x14) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 358.075431][T17728] BPF:Invalid section offset [ 358.163680][T17734] BPF:Section overlap found 05:04:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 358.278743][T17737] BPF:Section overlap found 05:04:22 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@can_newroute={0x44, 0x18, 0x200, 0x70bd2c, 0x25dfdbfe, {0x1d, 0x1, 0xa}, [@CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1, 0x1}, 0x8, 0x0, 0x0, 0x0, "aa370dd0b4bf605d"}, 0x5}}, @CGW_MOD_OR={0x15, 0x2, {{{0x3}, 0x0, 0x2, 0x0, 0x0, "4c5eff0be6fc1bc7"}, 0x5}}]}, 0x44}, 0x1, 0x0, 0x0, 0xc040}, 0x40081) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x275a, 0x0) read(r1, &(0x7f0000000300)=""/67, 0x43) sendfile(r1, r2, 0x0, 0x8000000000005) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000000)=0x3) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000180)=ANY=[@ANYRES64=r1, @ANYRES32=r2, @ANYRESOCT], 0x208e24b) mmap(&(0x7f000040f000/0x4000)=nil, 0x4000, 0x3000001, 0x28011, r3, 0x0) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r4, &(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x4e28, @empty}, 0x2, 0x0, 0x0, 0x5}}, 0x2e) sendmsg$NFNL_MSG_ACCT_DEL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c000000030703000000001a00003707599348835af0657e6c07000700000000050c000240000000001f00000000000000000000df1cc6df298bb28dc03090a451cd71ce34ad58087cecf2689796b87ed9c5cda9d9627eec3d33cc133190850e0830234247bc2e4d74fcb8d2e6e1756f90bd72bcd12ca2d738793c77d1f14605ce0f46cdce4ed5a0e6b55f972d2f3624fae8e63351aceee928406171f1505be04869"], 0x2c}, 0x1, 0x0, 0x0, 0x50}, 0x4040080) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) write$tun(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYRESHEX=r0, @ANYBLOB="520add8137e96839c90665d63b239f12b65b268992b6436466c75c6772414fcebb7aa236330c1d6138f7620526d6d9e8607b73b51b8832454d537b9535652026c6ebdcc4b99c8e7233eb8990048bf1bc7dd0e8c742712c682fe4f162ccca188e7cc5867bb02374a6c63d667a53652ce14279cc0a3824a43cd144532e61125145b125fbe127335652c66ace2907f0d3e0cced66af5ff50304bfcf96afcea72e8c072fe26c74cc8a65ad9c3f088388c33dbb811d2111b1d3e1ef8e206a476a28517f1efd12f63c6b73e0f714c5f071abacd792d98defa90d7358cae35c1e50f4668fcc3eda492c81aecc9258bb8ed2e347aad7a29656dd556992471fda57b0d23a647670a0cf69279c6737e1fff8d867803ac5c9c9c4215bf7e71290b649ae3a531600b55ada5aee8f1ade9fc345ab64f2cfc3a1afde380dd6859567b490f6070384c3fe7f7621edcf613b23fdc92318a626236e2724cadb669f54a405ec24e24242308623dc7f4485908ece642aa2be8d5841401c5512c9a004e5b355c86960cbfe953e52c8d2c4714cb909d454701050c24f1a409e65b53edd017c64e91265cc0d04275aa46aec7ce14eca039ebd2d3b5efc33ffa8569d83c164d8dd056eb571f20e861af849ff64a8da92662093f55521d986ac8ead637e66b5e9956ac63a9b6b1e2332306441300a95aebdd55103ea70838f7e0fbdf2ba0d449a73ae7f7b6d84bdfce1581377d9d41489f29b10c3c1a865fdeefe1767c50b36a25304b60b69f006fcbf78bcf023d12cae5e1d432bb5c7c2073ed1527434f97b66c1714861e1754ec034bf9069a76b122888824e71c0ea3e18ffe9f42ce5eefe853617c96d6bb003a4a5118c04a46d042adf288b36999e68ba19da1fe4ab4dedf640a57a707a07fa7774287374019866eada2ca251c146714b5adafa1712c4c84e3e397597d63c9f13d3dd2cd8e929679180efdacee29cf5cb69ccd0d31b60d2b096ceb64caa01e578e3231dfd63c028de2b42324ff7eabe18be3f9c86d1a9fb09f37872d8a77a1dbaaee0e4ff2ae834def1853da60688d1ce8227336801ffa0457d6503dd0a1a53ef044a9a23a0564c4d1dfc72bd36eea2de0d922bf56767f47fd05dc46242dfa578f42b698b47bc20fc93c4af63e3fbc993eb68862f48eeb488ccae12a9bb81069c516b520140c75236f49455900cb918e4161115fafbee8bec80395589d6375adee8691091931dd0fd7e0e7f4aa7317acd69c76c84ebb7fdba748e62df4c9953c39473c8affe89ecb03cec0a6c403da9a955ac3549f996ff1a7ad034a5d58445f1c27bc8c9794de7c51862521bbef9aac7389db893773dcd6c7ea4d21d10132319a7e9105663a92f37db388c44a4eb4201cef6ecbe0149737da794a2fd4d8d2910e090030dd28ab2d05e6489c39bf6945e59149522dd2c6499c804eb0ab30ab02c72ed13b04a4fc9a3e33b933f3c074d52985ae81de4042f29528cb2e3af4475bcd65792909e41fa5aa0645219841b665206a18fe7f2fca6b56659fe4bce021efbc34faab639dd9c725d1eb1fc1a3f1184ac0e5d0d0e8561c6e57410c215c9b5f93d2a89eece10787d8891fc17313c3449dd00d0d69dc9c02302351ae83aae2d394625b7905518655bd7b7ba17a70ea19295e7e7fda979efae22844dece28efddd69e615ddb50bbf889dc941f490139c44dab7a7aeb877d31ddde1cfbdccc29e50d8c5a25c007b68ad940ada6bbb79cd3cf3c7cdbca351a06fdd55a9064c9e62b62a416aed5668344daa49e66343bfd883ebdba815d19ad9f109d3fc60ff3a0a683b85ec7e4c44bee489a3d2cea6a9d51af843c02f101dff5f7199873d40217f3175b6574cde0ce35a6c84dbaace6d5d34fb73dd63399a4bedd2133cfa94a2d61432eaa1b9d027db983ba40004d39fd1a122f7b8abb5da2219d861fbbc176d2e15cf4632fd645bd27ec3583147b1b7a7c38c6820f156c29048db4cf43ef7d7b42875468b1793bec553e8b198fee3044218a2cc55007e0aa0320aea617599aeabf2fde7e928c4fbb0e343771559a5fa7314ef7fe011cb40f840c1f352182beaf284adeb483acb8875522c5d2c77ef468f071845498e13fd36dc3bf7e927050f3c62afbc77cc459001dc5ce7c1ea44f548b763608b64845583af1edeefbbe888b19afeb4a42163b960f1535befba5aaa014206f31864bc1ab13c895bc0e3e1cac27d03099a24d93f54da98fedd2b2982234d2862745995528a8bef0f812937f77e3ec5ff80b0eeec6aa9525bd6d8f128003028c80d7fe634c0a39c27aeb40f84cc448f36a802fb7e7d05556ca037c464c0c770b76416029385240a753be18c27737d1b1ef9be33501c31ad2e66785a5d29baca042d7e143a742cade6fc660002ff06684d828edd1b7dfe50bce77bb4ab3357015bf5f8ad25c29658533a2a225bf4b13f786eae2243be81d1be0a83545f34cf857dc2e6048bab7787474666261c80d52cd0d59ea679590e94f50f9136a7a1d24a97ba2045343f2361a9d3a47941d2b19e783d417043de20785fd27fcf84cd8c51a5625c9937d63ed32319bb7cf8fada08a85019df24c7464664c77b5daf06b645d1c53e7579af312f410529ca8b394d8f924fcac1caa034d5d573c5e8107a69196d15524bc7dd747d4ebcd612fb913cb5154759c3a41949466ff5555de59ec4875066b81ffbdeef9fdca9e1594396367dc8034223e6eef2a8e61f0a4fe95b6ff0f98233597e3eef44ea28fa1b31725ca56bbefda5efd2b0d0aeebd006d1a422fe20f93769ff3555604c79fee8e3c0029e335959537fa485ee8a9aece2c91e80195f69c471b28c99cec5fd015b0988a915109555a4c9df94291f452a6a683523a181d054a946ac64f8f56ba93fe1999fba33bf7f1cf618829b7703799eec56c1307e8a09816984a014cb78fe6ac1097a779ae02de50e89029bff9b08020c00131f513664161501033d308ccd8a9a11b673bc9d0ace77560c19f12c491e12439cad1bf7d4204579be13c4915b4e9aab791ebd8f780babb931d06c091680143e9730ce79037375e1a3a50752d71f2063a2cd21753ff874d576ee7c08d2647c91be98f1219994ae72de022a0f5602cd27206e71a9701fc327904b1bc219231c619b25b2eaa43265936ed77e62fb54d2153459a623f4b6e7058ac101843d63a9aa30b9024a5cedd9a3affa2a6b26135547399e121e9c148ee33ac7343e575f85c452ae438fa98f18f58d7b2586452d6a6e9d702310ad6f2645fc21df70205472399afbaf2b6ca4de8c71d5d5a126d4939d953a9e2dac4d40ea555e1e4ecc5e9e918ef83981e4b99186104ae266c12582e12ce3f4f0dcdd702395f94cc1c2742c6c5c4d2ddce33f0e9ab7b5ec96a58bf1c3e115ea5c6818fe65f21ee64360e01b26fd1e801a29b0e2ea8d54e927860e7bee463f81e759273abb28076c83b08626d6a874925febb9a8a505b8f3a6d25e9ec92151e8bce36335e347b475eff8677c37418e83c4f438fd38a4df07f1d415b55817b06c0bae494cafdadecdd3bfe0f2979d84bf5f42ef94d6a4666be2dd81f9df28f8bd456e43dbcb4c951934ba106ec537322146771b527d2824f02f5989d1e169bd6c41349962c8c63b67f68d17d18c6cbe695b79ada57ba5499add59031474d7ce55087fec49637bfb70c183eff313b7f5a4629e5fdad9b81b5b20aad6e648a79f8d8f25ad9825af308f0cd12a5aa583aeb449992389d41c8a64f501a40ecb268f0dacf8d95890352eb9663492e1b2f4609ff4ded19c9e7abd96e4ae22ea969d98ffad003839e5868deff229920f8e0d9876e5fe6f283df859933a0d4a98dc4964119d2e620fb4bef7e43dc5e4a23a773c48bcdc28ddf3f60c45d13d9212f655fe1efcd0a0f22e0811e91e71e9544c89e6296f7f232bef54e130a4f3df449565bff9ff57b6c50bc5216f3e475912b7771a1a56da1cb5b9cd76a4703788388f34a9dc91653b43e3c943e60a5376eb6d061ca811749a2cd1a0449d624b602c06e613e15e1160b32f3da6ced84002ae452eda18b1f65990f85ea56797d4d9372db2ca1340772c4314a1ed5ab37f2f9a38f6eb2e371e3ea325a0d4b7d4393b99f816a6bf61b9bf6986f5fbfb844a73dda9c7d5bb7a51d766c9660bd0df3ac83077ec928d4c411ebcf2fc980c63424cb4788ed719e36791be4a2f68f4b117ac733b71028952c26e92be37451a56ae3ab6f42a7741f5dc3cfdc66aab8d89c8b6a883506299b0d4da8ed011dd50a6b158b81014d51948acb28a8083f2386f2cecd79b8c0acd8297b9df53f7c164e12b19b6ec09f81fe5b8005ccbc4b9c8419ce52333085fd6fdba0ffffd6e43659dd7b4bf791eb86dd0ca6373e7c3d034bb1f08ce031d7328565bc14a07af6d185d433ef7c98aa572244ea6375796a889ab5939e1d63eeb2086f5d124dc8d77da21a8439f6e5fd3108a5ccaaa6b38911db43c511104f6622c63d08107696107cb44eb0bc805b68002390f5e3b0ed090d855885ee8b5771cde3b669a3ae1c5d7cc54cf2ddbe76c90f52bab1bf8740d58b9b63929945b181b663f91ffb66d7bbe74c5db7251f6ea254b22764c43af499b3b1cfabc06dd84382439cf34cd33f52311c21caa699ce4f05677827079088da7c1fec99bee56a814831980e698100e73e462013b7be43402efccf1c0f7d8ad8bfb722bc3f600501b954d47c7b41bc3a8f68d253f209a6f511bb2269803f60ab314a32feaaa14783db43d70bd927bf9aceea6a4745557e947e3a77a86b19ee9e0120c3d87d35c8984a4c9da14b1fd7905e6d1056bf159f05842fba2ab8bf25332e811a9e0d2d3183c6576c69fad73af1f9b702a28bf18219e74a1fdfd52a7aefe6a16a41811ae1997de139ac28d78b59e68195736a4168f90ced494f69398872c6ea12d065a8db27fd16c58ef2f9962680b39e6d4618b464752857d352557413293ae01746a689daa8704e2dfd339aa4420858fd865cdb340b2761035fe333ec5034c8a4c21562e713c97963e6276a19a0a044b7d147c2dc1f7eaaa3e30c7780225fc0e7577ece7bd55b23a847f2e1dc8e1aaace2b721789110728a458e1fc65032bf44cec370fc0902ef8db46814d35a5ac6fbe8fabfea928561f0fb3e156d311b1b937c0fe262b6ca7b6159daa8604ec13d26f473dc54a8695dca37e075b6414783b6289ff9b8c656fc0aa2a9f935b9cfc0c5695af18b850d30d939877044e4dbbb79f92bdc8b49f5cf6247040115c75cad549ce29c548bbb2dbad21a24203f4ac153390de202b016c4a6b9d32110614d16e4cd75ba61c30a2d37035a682b7f1c488bf7d858ed73aa2206849e865f0d777fbaca7a20e8a0e497621deea3c98399a8e4788ddde9917b18114b17c30a0a19d27a66338de6249de8b28fb370ce5a51442ddfd82d98940089ea61abab86edc8006e606c621232dfccff7e33c8ca59e4dc67b3bf3b599ccbdfa757788342d8134e69ae6aa7605280846006bcf6bc94582361ea3ea2d36dab0548880b4c8852941d570e6143e45183bc3b593187345cc0ec011cf4c4f7eaf5b1247f52a31eacce6dc2d7c30f4ad3797c940d98b3ad4a5cffaa6f7dd22e40c37eed6bb4801d338a802fce5114246ef16f5613e6ede127d3993527f96b20f95596426bcf932a07104f2d4492fe3a45abb96f31ac2653f973f7f7b7a08df6c739d0cde4770a88c6f047704a0ff9f76115a820582c4d85c9231c98cb7893b8c7b47e5af095a442329cf1df898e1d6db866100fa4e49eef79ac47d8d4"], 0x42) r6 = socket$netlink(0x10, 0x3, 0xc) pread64(r0, &(0x7f00000000c0)=""/122, 0xffffff00, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x6}}}}}}}, 0x0) 05:04:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c208000000003e"], 0x0) 05:04:22 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x3b, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:22 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0xa, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 358.793554][T17753] BPF:Invalid section offset [ 358.801939][T17760] BPF:Section overlap found 05:04:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x7}}}}}}}, 0x0) 05:04:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000500), 0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000540)='cubic\x00', 0x6) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd4720920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) [ 358.912412][T17766] BPF:Section overlap found 05:04:22 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x3fff8, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:22 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0xb, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x8}}}}}}}, 0x0) 05:04:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendmmsg(r0, &(0x7f0000003600)=[{{&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @remote}}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="b491879fe7e4987bcb9ed6acd8b946f458d3f3ca852750228c13294332387ca24a10a7ab68f2ac4562aa9a6ebca605d6d4a167be85c0ac71a07f7a89f6f2cf4f8395689d279d76dd2d2d4db6e684f95810ce01af2f62ead75238906a98c859702f2d818308a191a7012867", 0x6b}], 0x1, &(0x7f0000000240)=[{0xd8, 0x3a, 0x0, "f5747f4e8e785bfe7f719edf455808e7e68216f11c8def866e21804a5dd181b34df2d03225c23f08c04760f760a6bac10076162971b21ff8dca807629e73fb0cb54b063a5ce39c9e1cfef50d13e1041733e7a7480ad68945261abb3cf9d6ae212bd323815eec8d4bd814808c212d1e4ba7fbf6f44f9e140e66969a5e87e4ce61f4bfe0c1d01098474e2f33c775d93af5b5dbbef62b120e2ba5e8e588b1b3f4fefcc0a11875db87844cd33553365d5930b90aece99cbf1bf9968962b14d9ea1e03f6829b41f37"}, {0x48, 0x111, 0x8, "61fe536a9860ed07f40224da68f79bbbfa2dcd92485b1517d6294182269a2095129ddf38663d20726a5fd6d74b07da39b589"}, {0x1010, 0x0, 0x400, "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"}], 0x1130}}, {{0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000001380)="1ed8ae7228de92e9f70226f89c1d9c16795b64c21660b55f8f2eee7829605b6e461ce2ddb2923a91555bf0e2a84e6ac976ae7dc6cacde8a2b4ddb367545e6238c762e2f45413501d88e90277152e6360f6f436b78d497df3242584adedb93b795292c043f99fafb70a71f74ff35f2c6464edfa9840aed61f5ebbbe0a96c0fe308e71c55a11d65ca73403cdce054daee90efa516a6bbbe78797f067011856f1307260abff", 0xa4}, {&(0x7f0000001440)="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", 0x1000}, {&(0x7f0000000100)="cf35e4652c50696073835638e979ba33cc95e44d55544352475b0e", 0x1b}, {&(0x7f0000002440)="b93f908364252cd7c79b963e3e3e28f3cb607a7914c12e4a018b3482d15b27ac9ef5d39df98baa7fbc05ab498c51bd069bfe69af2c23535b0e29bc3258d74157", 0x40}, {&(0x7f0000002480)="0c292e92a24d695c7db0a71a6221a035b2e5c8bd72e2089d73a56c95a2f4fa", 0x1f}], 0x5, &(0x7f0000002540)=[{0xa8, 0x105, 0x401, "4ef6727c2228dbc61518d581c47a7bb3d36275feaac0741d79e76701ca2f30aab22a7f5572b302dc3a313bedd9b7e702452d8c59d61a29289b00a83e2e991739d365430e7afa3641ab7f9d6f27134a031bb70f0f348c5b53d0de5beb4240d19a7e695c6e5a29f03a5c731a5b025a3774bee85d4df60d9d0f5ce6f7d3a71a49416beffeaaee4fcc7bd5854e275c574d482caa28b38c85"}, {0x1010, 0x0, 0x40, "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"}], 0x10b8}}], 0x2, 0x24044884) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 359.174946][T17781] BPF:Invalid section offset [ 359.235009][T17785] BPF:Section overlap found [ 359.318036][T17794] BPF:Section overlap found 05:04:23 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 359.518501][T17797] BPF:Total section length too long 05:04:23 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0xa}}}}}}}, 0x0) 05:04:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000080)="5b0aefb1a77d4ed87ae523498dc8383507e40b1867464055281113f91d9b5f82e0db9955049f26d3a30b7e9e8fc4759f6c00fd1a45ee1b3ed2a4e947d389a9c4bcbd988602bb44d3afdea6ab0f3abdc9286d1507c48b32d03b5167152ae6f35c3acc4dd1221f13f5c05f1e80cd56c31f4c768142425cfa5bc81ab1b6d6bf788a64", &(0x7f0000000000)=@udp, 0x4}, 0x20) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:23 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x23, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 360.063465][T17815] net_ratelimit: 31 callbacks suppressed [ 360.063485][T17815] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.088308][T17817] BPF:Total section length too long 05:04:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x11}}}}}}}, 0x0) [ 360.135405][T17816] BPF:Section overlap found 05:04:23 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a723f7ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b00757fc4e5dd07"], 0x208e24b) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [{0x20, 'filter\x00'}, {0x20, 'u32\x00'}], 0xa, "d440abaf49eeda11d8b81c0ba42516fba9720d18d36336bbff5a999542906ea2eeed63c50244bd66f20dd8de369b9cd2bf1b08da830780704e8c7a94c3e0cc4f2b9c6c99775c9ad880ce1a9170da0be153c37a40179457daf3ea68b90364965086b8e158c3826a670f5861b078d3ad853d692699fc54cf37"}, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) r2 = accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10, 0x80000) ioctl$FITHAW(r2, 0xc0045878) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180)=0xffffffffffffffff, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@delchain={0x6fec, 0x65, 0x200, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x4, 0xb}, {0xffe0, 0x10}, {0x5, 0x8}}, [@TCA_CHAIN={0x8, 0xb, 0xa6}, @TCA_RATE={0x6, 0x5, {0xcc, 0x1}}, @filter_kind_options=@f_rsvp={{0x9}, {0x156c, 0x2, [@TCA_RSVP_POLICE={0x480, 0x5, [@TCA_POLICE_AVRATE={0x8, 0x4, 0xffffff00}, @TCA_POLICE_RESULT={0x8, 0x5, 0x1ff}, @TCA_POLICE_TBF={0x3c, 0x1, {0x7, 0x4, 0x3f, 0x6, 0xfffffff9, {0xfa, 0x0, 0x3, 0x7, 0xc90, 0x52}, {0x9, 0x0, 0xd3, 0x8, 0x401, 0x40}, 0x1000, 0xbfc, 0x4}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x8, 0x1, 0x1, 0x400, 0xfffff7ac, 0x7, 0x3ff, 0xfffffff7, 0xcd, 0x3, 0x266, 0x9, 0xff, 0x7, 0x4, 0x81, 0x3, 0x7ff, 0x8, 0x6, 0x20, 0xfffffff9, 0x1ff, 0x2, 0x40, 0x7ff, 0x2, 0x1, 0x1f, 0x7, 0x71, 0x6b, 0x80, 0x7, 0x3f, 0x0, 0x1ff, 0x1, 0x2c3040, 0x5, 0xf28, 0x5, 0x3, 0x100, 0x6, 0x10001, 0x120, 0x5, 0xc7e, 0x20, 0x8, 0x7ff, 0x30, 0x101, 0x94f, 0x4, 0xf0d1, 0x6f63, 0xc0a, 0xec, 0x28, 0x5, 0x0, 0x8, 0x7, 0x20, 0x10001, 0xfff, 0x0, 0x80, 0xe, 0xcc, 0x0, 0x6, 0x2, 0x8, 0xffffffe1, 0xa73, 0x7, 0x101, 0xc6f, 0x1, 0x6, 0x9, 0x1f, 0xfffffff8, 0x3078, 0x1a, 0x4, 0x1, 0x6, 0x6b4, 0x0, 0x4ce388a7, 0x8b7e, 0x8, 0x6, 0x0, 0x10000, 0x6, 0x5, 0x875, 0x7ff, 0x1, 0x4, 0xffffffff, 0xfffffff9, 0x4000, 0x8001, 0x95, 0xb067, 0xffffffff, 0xba7, 0x81, 0x40, 0x9, 0x7, 0x9, 0x0, 0xfff, 0x1, 0x800, 0x9, 0x3, 0x1, 0x3, 0x4, 0xdb, 0x20, 0x6d5, 0x4, 0x6, 0x74db, 0x0, 0x3, 0x101, 0x7ff, 0x8, 0x1bfb3a32, 0x7f, 0x2, 0x2, 0x0, 0x80000001, 0x20, 0x1ff, 0x2, 0x9, 0xfff, 0x0, 0xdb65, 0x4, 0x1, 0xb5b, 0x5, 0x5, 0x7, 0x7, 0x1, 0x9, 0xa69b, 0x3a9db92b, 0x10001, 0x200, 0x200, 0x2, 0xf05b, 0x2, 0xff, 0x7, 0x4, 0x40, 0x80000001, 0x8, 0x0, 0x200, 0x2, 0xf1ad, 0x0, 0x3, 0x2, 0x6, 0x4, 0x3, 0x100, 0x3, 0xc000, 0x80000001, 0x51d, 0x1, 0x5, 0x0, 0x3, 0xfffffff7, 0x2, 0x1, 0x1f, 0x7f, 0x8, 0x5, 0xffff, 0x3ff, 0x3, 0x6, 0x1, 0x80000000, 0x7f, 0xffffffff, 0x0, 0xfffffffc, 0x8a7, 0xb2c5, 0x9, 0xe5, 0xff, 0x1f, 0x8000, 0x0, 0xbf, 0x7ff, 0x81, 0x4, 0x5, 0x7, 0x7fff, 0xb8bd7f8, 0x8, 0xff, 0x9, 0x1, 0x7fffffff, 0x6d, 0x80, 0xffffffff, 0x9af, 0x4, 0x6, 0x7ff, 0x8000, 0xfff, 0x3, 0xffffff81, 0x10001, 0x975e, 0x2, 0x3, 0x8, 0x3ff, 0xd4, 0x9, 0xfffffffe, 0x101, 0x9, 0x20, 0x7c69, 0x5]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x2}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x1}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x1eeb}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x6a32ba21}]}, @TCA_RSVP_ACT={0x10c0, 0x6, [@m_ct={0x10bc, 0x9, 0x0, 0x0, {{0x7}, {0x94, 0x2, 0x0, 0x1, [@TCA_CT_MARK={0x8, 0x5, 0x2}, @TCA_CT_ZONE={0x6, 0x4, 0x4}, @TCA_CT_MARK_MASK={0x8, 0x6, 0xf88ac73}, @TCA_CT_PARMS={0x18, 0x1, {0x9, 0x5, 0x4, 0x9, 0x7}}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @loopback}, @TCA_CT_LABELS={0x14, 0x7, "eae6b811658fea32f80ee4e852691cbf"}, @TCA_CT_MARK={0x8, 0x5, 0x6}, @TCA_CT_ZONE={0x6, 0x4, 0x4}, @TCA_CT_LABELS_MASK={0x14, 0x8, "8caf0a65f285b19fb5088bb17a7d44b0"}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @ipv4={'\x00', '\xff\xff', @local}}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x6, 0x9, 0x6}, {0x0, 0x7, 0x2}, 0x84, 0x4, 0x80}}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0xfff2}}]}}, @TCA_CHAIN={0x8, 0xb, 0x6}, @TCA_RATE={0x6, 0x5, {0xee, 0x3}}, @TCA_RATE={0x6, 0x5, {0x1f, 0x7}}, @filter_kind_options=@f_u32={{0x8}, {0x5a20, 0x2, [@TCA_U32_CLASSID={0x8, 0x1, {0xfff2, 0xd}}, @TCA_U32_INDEV={0x14, 0x8, 'bond_slave_0\x00'}, @TCA_U32_LINK={0x8, 0x3, 0x7c}, @TCA_U32_ACT={0x2888, 0x7, [@m_mpls={0xb4, 0x0, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5, 0x6, 0x6}, @TCA_MPLS_TTL={0x5, 0x7, 0x9}, @TCA_MPLS_TTL={0x5}]}, {0x6e, 0x6, "c96d83bc87559f5d5c4f46b5b8b570dfcbea4c3cebfc5a6ac0ae349cfc79819c5300ca3413e898d55631006de72d4f41be13036c157fb356272388cc1c23f10087c15cffcb65bedc0314d700972fc1f33b8a576210c37a33de8e604f102dde1195d78139cce0dedb5da1"}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ipt={0x12c, 0xb, 0x0, 0x0, {{0x8}, {0x5c, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_TARG={0x33, 0x6, {0x3, 'security\x00', 0x1, 0x81, "7c4be3de7426e6dc6b"}}]}, {0xac, 0x6, "62f8f2cd919103881f07b3fd2c68ffa73af3b5a017b6ceec619bad6dc6b8bcc51e22a7bf3831e21ca1ff51f37489dc1e3da41b4d604aacdb1d7c22ff10b7f800a4cbfee8e68c206c4c52685d1939b8ce7ec06b74d4b73deae3042394de8c5df3891f3b5d64cd56f31c465edc5faa658c83467f6ae59d6e4f62e64584844b3c21cd9a4d75895c445078d9e39b0aa8a5e2dd17c1b68db082a10e452a1db32926094009c94f841af427"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_sample={0x154, 0xa, 0x0, 0x0, {{0xb}, {0x54, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x15}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x5}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x400}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x400}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x4}, @TCA_SAMPLE_TRUNC_SIZE={0x8}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x5c04}, @TCA_SAMPLE_RATE={0x8, 0x3, 0xffff}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x400}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x7}]}, {0xd7, 0x6, "d4c45a580167bbf80e051f8c1aad6034369e6c663512eb0b30df73fb2dc406dcd8b4366caa80eb0303bf26e8d5191b58d9c567d5c4b06c430cb0740e518f42f5a43029d6d2348cd9c0da843763baf845e399efd53632e2c0615b52bce3ab02c99b7efb7905d9524f26a08bdc5dca19b92eddc01f9fb86d02acac7f16ca07dd0208206f620ff4ed2ffa3574421420e2349297dd237d2820f23d873e0d73aefbc80f7f7262cb7b10510c2049e53ae461aad561affd9e452dd33fb458177b8d399bc0847c6e52b6665dc577eed02003d39fce0c73"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_ctinfo={0xac, 0x3, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x800}]}, {0x75, 0x6, "fd125aab3f64bc55a52064617beab36ad3289b457ad4c9394fe3d97138a7c921e1cea80e4afe747ac5b9c8393a49624a558f5bb1daeed0c2ac4cd5e2eb85d965a58220494719b22fec5733506c9b8ee01cbe31b7633fb37f821e0de466af42b0bfc73ac2986fac4a241ffbfe62d28e2ff3"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_connmark={0x12c, 0x16, 0x0, 0x0, {{0xd}, {0xc8, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0x9, 0x7, 0x9, 0xa}, 0x5}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x2, 0x5, 0x40, 0x2}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xeb, 0x1, 0x5, 0x4, 0xa66}, 0x1}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x5, 0x0, 0x7, 0x6, 0x1}, 0x400}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x5, 0x9, 0x7, 0x6, 0x2000000}, 0x9}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x5, 0x9, 0x20000000, 0x80, 0x5}, 0x800}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xce7, 0x6, 0x0, 0xbe, 0x8}, 0xfffd}}]}, {0x37, 0x6, "7bafe45fc074dfa7f3a148322127d681abc6c9fafd6596ca77d3cfcbd7e62988dd4d782d33933f48efd635b759822b8a55ce14"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_bpf={0xc4, 0x15, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x3, 0x72a51019, 0x3, 0x10000, 0x74}}, @TCA_ACT_BPF_FD={0x8, 0x5, r3}, @TCA_ACT_BPF_FD={0x8, 0x5, r2}]}, {0x73, 0x6, "c62f786e0aecda3c63ea07bf9b784562b3f4cb528e53afaf241a8cfbdcf25735c566ac2734aa562b7b6b880c4c6b70e43ad35d3efa82e6090f074d2b768ffd0c5d7543cdc69ed79fb18b503741a22b538fecfacee9210ab1a3b9d79298f668b1750c27c717bbd4f94765a9581f7cc3"}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}, @m_vlan={0x1088, 0x8, 0x0, 0x0, {{0x9}, {0x5c, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x40f}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x4, 0x7fffffff, 0x2, 0x2, 0xffff}, 0x3}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x9, 0x8df0, 0x0, 0x9}, 0x2}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x4}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0xc76}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}]}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x5, 0x1}}}}, @m_police={0x10c8, 0x6, 0x0, 0x0, {{0xb}, {0x1088, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x10001, 0x2, 0x0, 0x2, 0x2000, 0x8000, 0x7, 0x1, 0x40, 0x101, 0x100, 0x3ff, 0x6, 0x8, 0x0, 0x7, 0x6, 0x1, 0xf09, 0xffff, 0x9, 0x8, 0x10000, 0x80, 0x6, 0x6, 0x3, 0x5, 0x2, 0x9, 0x10, 0x7f, 0xbe, 0x7, 0x6, 0x8, 0x8, 0x1, 0x7fff, 0x1ff, 0x319, 0x8, 0x4a80b14f, 0xe61, 0x30, 0xbf, 0x200, 0xe8, 0x7, 0x0, 0x8001, 0x9, 0x4, 0x9, 0x28a4, 0xfffffff9, 0xb1ee, 0x10001, 0x7f, 0x400, 0x8, 0x30000000, 0xfff, 0x1ff, 0x3ff, 0x3, 0x400, 0xff, 0x1f, 0xda, 0x6, 0x2, 0x3f, 0x7fff, 0x12bd, 0x69c2, 0x0, 0x62, 0x5, 0x0, 0xfffeffff, 0xffff, 0x6, 0x2, 0x4, 0x80, 0xeac, 0x0, 0x8, 0x1, 0x0, 0x1, 0x78, 0x50, 0x81, 0x6, 0x8, 0xfffffff7, 0x1, 0x0, 0x6, 0x5, 0x34b, 0x8, 0x400, 0x7, 0x3f, 0x7, 0x8, 0x53cc, 0x1f, 0x1000, 0x1000, 0x57, 0xbf1c, 0x1, 0x8001, 0x4, 0x3ff, 0x3ab5, 0x4989dde, 0x80, 0x2, 0x9, 0x1, 0x401, 0x4, 0x0, 0xfffffffc, 0x4, 0x8, 0x3, 0xffffe2d0, 0x3f, 0x6, 0x7ff, 0x4, 0x7, 0x7, 0x1, 0x7, 0x3, 0x0, 0x56, 0x9, 0x2, 0x6, 0x5, 0x0, 0x81, 0x100, 0xd9a, 0x8001, 0x6, 0xa7c, 0x5, 0x0, 0x80000001, 0x800, 0x0, 0x3, 0x40, 0x8, 0xfff, 0x100, 0x2, 0x4, 0x1, 0x9, 0x2, 0x7, 0x0, 0xa9e, 0x9, 0x800, 0x1ff, 0x100, 0x1f, 0x60, 0x5, 0x9, 0xc0000000, 0x4, 0x3, 0x9, 0xfffffffc, 0x5, 0x7, 0x7f, 0x1, 0x80000001, 0x80, 0x2, 0x1, 0x9, 0xec, 0xe6, 0x9, 0x4, 0x39f, 0xf62e, 0x2, 0x2, 0x3, 0x2, 0x40, 0x8001, 0xf8ca, 0x3ff, 0x40, 0x4e, 0x2, 0xfd, 0x40, 0x20, 0x3f, 0x8, 0x7, 0x2, 0x4, 0x1, 0x0, 0x40, 0x6, 0x3f, 0xffffffff, 0x100, 0x2, 0x5, 0xffffffff, 0x8, 0x3ff, 0x9, 0x3, 0xcfc, 0x0, 0x82, 0x9, 0xfffffff9, 0x1, 0x80000000, 0x8, 0xff5, 0x1400, 0x89700000, 0x3, 0x6, 0x3f, 0x9, 0x1, 0x7, 0x5, 0x6, 0x3ff, 0x2, 0x80]}], [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x3}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x1}, @TCA_POLICE_TBF={0x3c, 0x1, {0x1ff, 0x2, 0x1, 0x1, 0x20, {0x7, 0x2, 0x1ff, 0x3, 0x6}, {0x0, 0x0, 0x80, 0x4, 0x3, 0x2}, 0xffff, 0x80000001, 0x3}}, @TCA_POLICE_RESULT={0x8, 0x5, 0x5}, @TCA_POLICE_RATE={0x404, 0x2, [0x8, 0x0, 0x101, 0x9, 0x3ff, 0x9, 0x8, 0x8, 0x52ed, 0x0, 0x3, 0x5, 0x8, 0x401, 0x2, 0x1, 0x20, 0x1f, 0x8, 0xd079, 0x4, 0x8, 0xfffffff9, 0xb93b, 0xfffffffa, 0xae, 0x20, 0x8, 0x7fffffff, 0x10001, 0x6, 0x8658, 0xfffffff7, 0xcef, 0x2, 0x4, 0x82, 0x885, 0x7fffffff, 0x800, 0x400, 0x559, 0x9f9d, 0x8, 0x5, 0x0, 0x80000001, 0x80000000, 0x2, 0x9, 0x0, 0x7, 0x20, 0x8, 0x0, 0x100, 0x7fff, 0x8, 0xffffffff, 0xffffff4b, 0x3, 0x1, 0x3c44, 0x8, 0x5, 0x7fff, 0x3, 0x8000, 0x1651e5ee, 0x40, 0x5, 0x966, 0x0, 0x7, 0x9b, 0x4, 0x3, 0xfc, 0x8, 0x16c, 0x1, 0x3ff, 0x1, 0x20, 0x101, 0x1, 0x8, 0x7, 0x7, 0xffff, 0x3, 0x3, 0xa4, 0x80000001, 0x7000, 0x40, 0x3, 0x4, 0x678e, 0x4, 0x6, 0x5, 0x3, 0x800, 0x2, 0x12, 0x0, 0x7, 0x81, 0xfffffe22, 0x9, 0x0, 0x7c, 0x41d878ea, 0x7, 0x10000, 0x9f, 0x2, 0x7, 0x8, 0x5, 0x5, 0x2, 0x7f, 0x9, 0x6, 0x8000, 0xa48, 0x3ff, 0x0, 0x81, 0x5, 0x7, 0x1f, 0x40, 0x1, 0x7c53, 0x7ff, 0x0, 0xc4e1, 0x9, 0x9, 0x0, 0x6, 0x1000, 0x2, 0x813, 0x8, 0x7, 0xbf4, 0x4, 0x1, 0xfffffff8, 0x0, 0x3ff, 0x5, 0x800, 0x2c2, 0x401, 0xc9, 0x5, 0x1ff, 0x5, 0xfffeffff, 0x80000000, 0xfffffc01, 0x9, 0xb7d1, 0x2, 0x3, 0xe010, 0x47, 0x101, 0x4, 0x5, 0x7fffffff, 0x80, 0x6, 0xfff, 0xff, 0x20, 0x482a, 0x2218, 0x9, 0x9, 0x1, 0x10000, 0x79b, 0x7fff, 0x15a, 0x80000000, 0x4, 0x1000000, 0x3f, 0x3f, 0x5, 0x8, 0x20, 0x8, 0x20, 0xf70f, 0x1, 0x0, 0x10000, 0xb7a9, 0x200, 0x9, 0x1f, 0xeb, 0x3, 0x4, 0x4, 0x9, 0x313, 0x401, 0x1, 0x6, 0x7, 0x1, 0x6, 0x7, 0x3ff, 0xffffff01, 0x3, 0x10000, 0x7, 0xfff, 0x9, 0x3, 0x8, 0x0, 0x9, 0x30b, 0x1, 0x3, 0xffff, 0x8, 0x4, 0x8, 0x10000, 0x0, 0x101, 0xc600, 0x8, 0x2, 0x4, 0x10001, 0xfffffff7, 0x6, 0x3ff, 0x4, 0x4, 0x0, 0x5, 0x7fff, 0x6]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x1ff}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x3d5}, @TCA_POLICE_RATE={0x404, 0x2, [0x7, 0x1d947340, 0x8, 0x7f, 0xffffffff, 0x99f, 0x4, 0x6, 0x6899, 0x20, 0x7fffffff, 0x3, 0x7, 0x2, 0xffffffff, 0xbe5, 0x3, 0x1ff, 0x401, 0xce1, 0x6252, 0xe7, 0x6, 0x1ff, 0x0, 0x2, 0x6, 0xef31, 0x1, 0x7, 0x5, 0x7f, 0x2, 0x0, 0x9, 0x1, 0x8, 0x6e26c1b7, 0x4, 0x400, 0x3, 0x96, 0x8001, 0x2, 0xd7a00, 0x3, 0x4, 0x10001, 0x1ff, 0x101, 0x4, 0x1, 0x8c, 0x1, 0x3ff, 0x2a448f9, 0x8, 0x1, 0x4, 0xa71, 0x8001, 0x8, 0x3, 0x96f5, 0x5, 0xb36c, 0x3, 0x1, 0x8, 0x6, 0x20, 0x8001, 0x6, 0x9b, 0xfff, 0x80, 0x3, 0x40, 0xff, 0xfff, 0x6, 0x80000001, 0xc0000000, 0x80000000, 0x20, 0x5, 0x8, 0x3, 0x6, 0x6, 0x6, 0x80000001, 0x7fffffff, 0x14df29b2, 0x0, 0x3ff, 0xf, 0x1, 0x8ff, 0x3, 0x1, 0x964a, 0x400, 0x1, 0x20, 0x7, 0x18de, 0x9, 0x7fffffff, 0x4d7, 0x200, 0x6, 0xfffffffd, 0x400, 0x4, 0x4, 0x0, 0x20, 0x1, 0x2, 0xff, 0x3, 0x6, 0x7f, 0x1, 0x5, 0x20, 0xff, 0x3, 0x20000000, 0xffffb80e, 0x80000000, 0x3, 0x9, 0xae3b, 0x7, 0x20, 0x3ff, 0x78fa, 0x7, 0xf76, 0x7, 0x3, 0x5ce, 0x7ff, 0x3, 0x6, 0x401, 0x8, 0x9, 0x20, 0xdd39, 0x9, 0x26cac106, 0x8001, 0x4, 0x6, 0x6d3d, 0x100, 0x5, 0x5880, 0x5, 0x2caa, 0xbf9f, 0x10001, 0x8, 0x4, 0x7fff, 0x3, 0x7fff, 0x7fff, 0x7ff, 0xc0000000, 0x8, 0x6, 0x10001, 0x10000000, 0x5, 0x8, 0x4, 0x0, 0x7, 0x6, 0xc84, 0x9, 0x0, 0x7, 0x1ff, 0x1f, 0x401, 0x1, 0x3ff, 0x3, 0x2, 0x5, 0x5, 0x8d, 0x8, 0x25, 0x4, 0x0, 0x1, 0x4, 0x7, 0x7, 0x9, 0x7f, 0x4, 0x101, 0x10000, 0xdcca, 0x2c9, 0x3ff, 0x10000, 0x3f, 0x5, 0xfffffff7, 0x2, 0x3, 0x8, 0x2, 0x7fffffff, 0x80000000, 0x0, 0x23aa4081, 0x4, 0x3ff, 0x74, 0x3, 0x3, 0x1c8be48b, 0x10000, 0x40, 0x3, 0x1ff, 0x5, 0x3, 0x9f9a, 0x7, 0xfffffffa, 0x7, 0x9, 0x400, 0x7d, 0x1, 0x7, 0x1, 0x6, 0x117, 0x5, 0x7, 0x2, 0x7f]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x10000}, @TCA_POLICE_RATE={0x404, 0x2, [0x66d4, 0x8001, 0x4, 0xffffff00, 0x9, 0x6, 0x2, 0x0, 0x5, 0x5, 0x1, 0x200, 0x401, 0x1, 0xffff, 0x1ff, 0x8, 0x4, 0x200, 0x7, 0xac12, 0x800, 0x0, 0x6, 0x4264, 0xc6a, 0x3, 0x9, 0x9, 0xf7d, 0x1, 0x7, 0x80000001, 0x1b, 0x6, 0xdea9, 0x4, 0x930b, 0x3, 0x9, 0x6, 0x9, 0x1f, 0x4, 0xffff, 0xb78b, 0x7, 0x2, 0x7fff, 0x1ff, 0x4, 0x7, 0x9, 0x0, 0x4, 0x7ff, 0xffffff80, 0x401, 0x4, 0xffff, 0x8000000, 0xffff, 0x1000, 0xf2, 0x4, 0x40, 0x7, 0x9, 0x1e, 0x9, 0xf, 0x5, 0x2, 0x7, 0x38, 0x10000, 0xfffffffb, 0x7f, 0x8, 0x3, 0x10001, 0x5, 0x370fab94, 0x3, 0xfff, 0x6, 0x1e32df5e, 0x7, 0x6, 0x8001, 0x9, 0x5, 0x9, 0x6, 0x94c, 0x401, 0x6, 0x9, 0xfffffff9, 0xffffffff, 0x3ff, 0xd0, 0x1, 0x2, 0x0, 0x0, 0x3ff, 0x48c, 0x400, 0x3af6, 0x1f, 0x62, 0x9, 0x59, 0x1ff, 0x3, 0x4, 0x1, 0x401, 0x8, 0x3, 0x8001, 0x4, 0x3, 0x608, 0x9, 0x615, 0x0, 0x40, 0x6, 0x2, 0xfff, 0x3f, 0xf67, 0x400, 0x0, 0xffffffff, 0x0, 0x0, 0x2e, 0x7, 0x595f, 0x7ff, 0x6, 0x3, 0x4, 0x80000000, 0xff, 0x2, 0x1847, 0x8, 0x3f, 0x4a39, 0x1, 0x400, 0x4d2396b0, 0x10000, 0x9b, 0x100, 0x8, 0x3, 0x0, 0x80000000, 0x3, 0xc16, 0x8, 0x9e47, 0x9, 0x6, 0x7, 0x3, 0x400, 0x8, 0x40, 0x80000000, 0x5, 0x5, 0x3f, 0x0, 0x9, 0x1, 0x1f, 0xf71, 0x6, 0x1951, 0x80, 0x0, 0x5, 0x8, 0x345, 0xe5, 0x6, 0x8000, 0x6, 0x25, 0xfff, 0x4, 0x1, 0x1, 0x17ba, 0x6, 0xb96, 0x9, 0x2, 0x0, 0x8, 0xfffffffe, 0x90, 0x6551, 0x8919, 0x7fffffff, 0x7228bf33, 0x2, 0x0, 0xbfa, 0x3e5723e1, 0x5f, 0x9, 0xffffffff, 0x8001, 0x6, 0x7f, 0xfffffffc, 0x0, 0x1, 0x1, 0x2000000, 0x5, 0x0, 0x7, 0xff, 0x2, 0x5, 0xfffffff7, 0xcf94, 0x101, 0x40, 0xfff, 0x80000000, 0x8, 0x4, 0x9, 0x80, 0x80000000, 0x3, 0x8, 0x9, 0x4, 0xfff, 0xf44, 0x8, 0x5, 0x6, 0xffff, 0x40, 0xcc3ebe88]}]]}, {0x18, 0x6, "a5125c81261c357028277b7d9ba00781d3604718"}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}, @m_skbmod={0x164, 0x16, 0x0, 0x0, {{0xb}, {0xac, 0x2, 0x0, 0x1, [@TCA_SKBMOD_SMAC={0xa, 0x4, @random="8c039f6bfb62"}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}, @TCA_SKBMOD_DMAC={0xa, 0x3, @local}, @TCA_SKBMOD_SMAC={0xa, 0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xb}}, @TCA_SKBMOD_SMAC={0xa}, @TCA_SKBMOD_DMAC={0xa, 0x3, @local}, @TCA_SKBMOD_SMAC={0xa, 0x4, @local}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x378, 0x599, 0x5, 0x3, 0x800}, 0x1}}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0xc4c, 0x0, 0x5, 0x300, 0x2}, 0x10}}, @TCA_SKBMOD_SMAC={0xa, 0x4, @remote}]}, {0x8d, 0x6, "fbb96ec3bc38b348f7949285a094970be44e9b9b40636cf6850125ee5b2af75e18b712f0da21d5f9ebf3def4cf730dc47bd2ad85660956df14417c51028ae19b09b50903d25a248f5dd7f05f8e8ba4582c75fdf5a5d2ef5c193807bc0b84ee1b45e2aada7ebcd372cabecca00aad0c88b2938bed09cd45246cd4ee9a99aa6122ae199173c16b4ceb2d"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}, @TCA_U32_SEL={0x194, 0x5, {0x5, 0x7, 0x6, 0xfffa, 0x8001, 0xff, 0x8, 0x9, [{0x6, 0xfff, 0x6, 0x1000}, {0xe1, 0x7, 0xc7e9, 0x1}, {0x6, 0x40, 0x200, 0x1}, {0x5, 0x9, 0x401, 0x101}, {0x0, 0x7f, 0xffffffc0, 0x4}, {0x7f, 0x3a92e60d, 0x5b, 0xffffffff}, {0x1000, 0x5, 0x83, 0x2}, {0x341d, 0x2e, 0x9, 0x4}, {0x1, 0x0, 0x6, 0x9}, {0x0, 0x1ff, 0x80000001, 0xffff}, {0x2, 0x2, 0xf1}, {0x9, 0x401, 0x9, 0x2}, {0x80000001, 0x27cb3bdc, 0x8, 0x8}, {0x3, 0x8, 0x2, 0x5}, {0xe6dd, 0x10001, 0x4, 0x900}, {0x600000, 0x10001, 0xaa79, 0x7}, {0x1, 0x20, 0x9, 0x9}, {0x85, 0x2, 0x8, 0x7}, {0x6, 0x3, 0x1, 0x1}, {0x6, 0x3f, 0x7, 0xfffff801}, {0x3ff, 0x80000001, 0xa691, 0x2}, {0x7f, 0x3, 0xff, 0xfff}, {0x4, 0x400, 0x1f, 0x1}, {0x8000, 0x6efec9e5, 0x0, 0x9}]}}, @TCA_U32_ACT={0x2fcc, 0x7, [@m_tunnel_key={0x1078, 0xf, 0x0, 0x0, {{0xf}, {0x48, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x8, 0x7, 0x6, 0x401, 0x15a}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @mcast1}]}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x3, 0x2}}}}, @m_simple={0xfc, 0x15, 0x0, 0x0, {{0xb}, {0x44, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x6, 0x3, '&\x00'}, @TCA_DEF_DATA={0xa, 0x3, '^j)\')\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x1f, 0x5, 0x6, 0x40, 0x78}}, @TCA_DEF_DATA={0x11, 0x3, '/dev/net/tun\x00'}]}, {0x8f, 0x6, "a5f855263ee0acf2ad8ec9ebfd89e679e686ac0131559b173c261e75f4b5e7ccfaebcd678f55d93c4a66dcd4e9bac437bcb14234d3c4c96bcb34e06a14f255d72c5bacec88c976f9ce4f3d05b8daee143ada681712a5f69dbf3ff4f29b7cab39fabf3e52fea1341c0f8d41c8222c5e1ec0f714f0956d0ab7706f16c4d8170bf79130fabddb8f4d9b969e4b"}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}, @m_police={0x1a34, 0xc, 0x0, 0x0, {{0xb}, {0x1964, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE64={0xc, 0x8, 0x5}, @TCA_POLICE_RATE={0x404, 0x2, [0x101, 0x3, 0x52f, 0x9, 0x3, 0x5, 0x7, 0x7, 0x4, 0x64d, 0x2, 0x1ff, 0x8, 0x2, 0x8, 0x4, 0x0, 0x200, 0x3ff, 0x7, 0xffffffff, 0x9, 0x1, 0x1, 0x6, 0x2, 0x1, 0x1, 0x3, 0x5, 0x4, 0x1ff, 0x4b3c18e9, 0x800, 0x2, 0x1ff, 0xb91, 0x6, 0x8, 0xffffffff, 0x5, 0xc5, 0x7a, 0x4, 0x9, 0xd2e, 0x9, 0x3, 0x3000, 0x0, 0x20000000, 0x10001, 0xfffff800, 0x277c, 0x1f9, 0x9, 0xb25, 0x4b, 0x2, 0x9, 0x4, 0x101, 0x7f, 0xa69, 0xfffffff8, 0x9, 0x1f, 0x830f, 0xffffffff, 0x0, 0x3ff, 0x1, 0x3f, 0x1, 0xa6, 0x3, 0x3, 0x4, 0x3, 0x81, 0x100, 0x3, 0x101, 0x8, 0x4, 0x9, 0x80000000, 0x4, 0x0, 0x9, 0x81, 0x169, 0x8, 0x5, 0x3, 0x10001, 0x1, 0x1, 0x3, 0x3, 0x7fffffff, 0x7, 0x7, 0x4, 0x3, 0x8000, 0x8000800, 0x7, 0x3, 0x401, 0x2, 0x8000, 0x1, 0x4, 0x5, 0x9ec, 0x6, 0x7, 0x8, 0xcea, 0x8001, 0x0, 0x10001, 0x0, 0x15882c5f, 0x5, 0x0, 0x80000001, 0x80000001, 0x77f7, 0x2, 0x534, 0x16f, 0x0, 0x80, 0x10001, 0x9, 0x7fffffff, 0x2, 0x1, 0x8, 0x1000, 0x67, 0x4, 0x80, 0x2, 0x9, 0x3, 0x8f, 0x3ff, 0xf3, 0x7, 0x0, 0x6, 0x8, 0x5, 0x3ff, 0x7, 0x3, 0x8, 0xe7, 0x8, 0x9, 0x4, 0x0, 0x3, 0x9, 0xffffff00, 0x2669, 0x20, 0x6f4, 0x188, 0x4, 0x1, 0x80000001, 0x7, 0x7, 0x773a, 0xabbc, 0xa7, 0x1, 0x8001, 0x3, 0x0, 0x3, 0x7, 0x735, 0xfff, 0x0, 0x2, 0x0, 0x8, 0x1, 0xd1a3, 0x1, 0x7, 0x9, 0x0, 0x3, 0x2, 0x40, 0x9, 0x5f, 0x81, 0x0, 0x1, 0x8001, 0xfffffffa, 0x1, 0x7, 0x6, 0xffffff1c, 0x0, 0x50, 0x5ffa787d, 0x2, 0x8, 0x7, 0x80, 0x8, 0x0, 0xffffff8e, 0xff, 0xd5, 0x2, 0x0, 0xfffffffd, 0x1, 0x1, 0x6, 0x6, 0x3, 0x10000, 0x10001, 0x1, 0x5, 0x4, 0x2, 0xffffffe0, 0x7, 0x6, 0x6, 0x5, 0x80000001, 0x0, 0x9, 0x1, 0x100, 0x7fff, 0x7, 0x7fff, 0x6, 0x1, 0x7, 0x2, 0x1000]}, @TCA_POLICE_TBF={0x3c, 0x1, {0xcff3, 0x10000000, 0x6, 0x9, 0xf0, {0x80, 0x1, 0x3ff, 0x7, 0xfff, 0x4}, {0x7, 0x4, 0x3, 0x5, 0x9, 0x401}, 0x7b81, 0x7fff, 0x5}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x9}, @TCA_POLICE_PEAKRATE64={0xc}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0xfffffffffffffc01}], [@TCA_POLICE_RATE={0x404, 0x2, [0xfff, 0x7, 0x3, 0xff, 0x1000, 0xff, 0x4, 0x9, 0x1, 0x5, 0x2, 0x101, 0x9cc, 0x0, 0x7, 0x7, 0x6, 0x8, 0xc9, 0x1e5, 0x1ff, 0x8001, 0x5, 0xffda, 0x10001, 0x3ff, 0xfffffffd, 0x1, 0x7, 0x9, 0x7c, 0x3, 0x10000, 0x6, 0x3, 0x4, 0xfffffffb, 0x9, 0x6, 0x9, 0x150, 0x7cef8000, 0xea5, 0x6, 0xffffffff, 0x40, 0x9, 0x4a, 0x401, 0x7fff, 0x80000000, 0x2, 0x1, 0x1, 0x70000000, 0xae9, 0x3, 0x5, 0x2, 0x7, 0xffffffff, 0x400, 0x7, 0x6, 0x8, 0x3f, 0xfff, 0x0, 0x0, 0xe2, 0x9, 0x800, 0x0, 0x9, 0x1, 0x3ff, 0x9, 0x9, 0x2, 0x8, 0x6, 0x1, 0x7, 0xfffffffe, 0x10001, 0x1, 0x6, 0xde8, 0xd424, 0xffffffff, 0x2, 0x7fff, 0xfff, 0x8, 0x5a0, 0x7, 0x1, 0x7fff, 0xfffffffc, 0x7fffffff, 0x9, 0x7, 0x200, 0x200, 0x1, 0x8000, 0x80000001, 0xfffffff9, 0x400, 0x200, 0x7, 0x8001, 0x100, 0x6d0, 0x4, 0x135, 0x6ff, 0x1f0e, 0x4538da87, 0x1000, 0x5, 0x7, 0x7, 0x9, 0x4, 0x7ff, 0x3, 0x400, 0x101, 0x100, 0x1, 0xffffffe1, 0x81, 0x8, 0x4, 0x4e, 0xf9a, 0x7, 0x0, 0xffffffff, 0xfffffffc, 0x7, 0x1, 0x4, 0x1, 0x8590, 0x6, 0x0, 0xc9, 0x10001, 0x7f, 0x3e, 0xffffffff, 0x2, 0xba2, 0xbd4, 0x3f, 0x3, 0x3, 0x2, 0x80, 0x7, 0x3, 0xffffc177, 0x1, 0x1000, 0x3, 0xff, 0x4c, 0x6, 0x6, 0x8, 0xfffffff9, 0x8, 0x4, 0xfffffe00, 0x0, 0x100, 0x6, 0x4, 0x24f8a64d, 0x80, 0x6, 0x3, 0x86, 0x5, 0x0, 0x90b, 0x80000000, 0x6a1e, 0xfffffffe, 0x7cd7, 0xfe000000, 0x2d6, 0x100, 0x60000000, 0x80, 0x500, 0xff, 0xfff, 0x10001, 0x0, 0x6, 0x2, 0x6, 0xdfc5, 0x0, 0x3, 0x101, 0xfffffffa, 0x2, 0x5, 0x9, 0x0, 0x7f, 0x5, 0x5, 0x1, 0xffff, 0xf976, 0xc94d, 0x8, 0xffff8000, 0x0, 0x8, 0x1, 0x3, 0x0, 0x200, 0x4, 0x3f8, 0x8001, 0xffffffc0, 0xffffff81, 0x201c, 0x9, 0xfffeffff, 0x3, 0x9, 0x0, 0x6, 0x1, 0x3a, 0x401, 0xff, 0x80000000, 0x6, 0xf1, 0x20, 0x7ff, 0x7, 0x0, 0x800, 0x7fff, 0x0, 0x80000000]}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x6, 0x1, 0x80000000, 0x1, 0x2cf0, 0x0, 0x10000, 0x4a6c, 0x1, 0x9, 0x80000000, 0x2, 0x10001, 0x6420, 0x5, 0x8000, 0xfff, 0x0, 0x7, 0x8, 0x2, 0x2, 0xfff, 0x1, 0x2, 0x28, 0x644e, 0x800, 0x6, 0x7, 0x1, 0x8, 0x80, 0x100, 0x7ff, 0x8, 0x4, 0x9, 0x30, 0x0, 0xffffffff, 0x3a, 0x8, 0xffffffd3, 0xff, 0x4, 0x0, 0x401, 0xb690, 0x8, 0x738, 0x1, 0x6, 0x6, 0x7ad, 0x7f, 0xfffffffb, 0x7, 0xfffffc01, 0x5, 0x1, 0x2, 0x80000000, 0x1, 0x200, 0x80000000, 0x40, 0x80000001, 0x4, 0x4374f59a, 0x8, 0x7f, 0x4, 0x4, 0x80000001, 0x8000, 0x3f, 0xfffffffd, 0x101, 0x4, 0x2, 0xfffffffb, 0x0, 0x8, 0x8, 0x9, 0xed, 0x9ea8, 0xa0, 0x3f, 0x100, 0x1, 0x1000, 0x10000, 0x8001, 0x1ad6, 0x400000, 0x8, 0x8000, 0x40, 0x101, 0x20, 0xf5f0, 0x1, 0x49ea, 0x1, 0x4, 0x0, 0x8, 0x2, 0x10, 0xffffffff, 0x3, 0x2, 0x101, 0x8, 0x10001, 0x1, 0x57a, 0x401, 0x7, 0x5, 0x3f, 0x8, 0x742, 0x4, 0xffffffff, 0xb0, 0x8, 0x4, 0xfffffffc, 0xd931, 0x2, 0x2, 0xffffffff, 0x7, 0x80000001, 0x484, 0x8, 0xdd5, 0x1f, 0x5, 0x3, 0x7fff, 0x5, 0x1e, 0x1bb, 0x0, 0x3c81b3cb, 0xc0000, 0x3, 0x1f, 0x1, 0xffffffff, 0x2, 0x4, 0x2, 0x400, 0x2, 0x4, 0x2, 0x2, 0xffffffe0, 0x800, 0x7, 0xff, 0x9, 0xcf, 0x3, 0x7, 0xfff, 0x2, 0x1824d5be, 0x8, 0x7, 0x5, 0x3e8, 0x3, 0x4, 0xfffffffd, 0x8000, 0xfffffff9, 0x3, 0x8001, 0x8, 0x3f, 0xabc, 0x0, 0x81, 0x4, 0x4, 0xe153f85, 0x49071a6f, 0x3, 0xc3, 0x4, 0x5, 0x2, 0x0, 0x6, 0x8, 0x8, 0x0, 0x3, 0x3, 0x5, 0x7, 0x9, 0x8, 0x6, 0x4, 0x9, 0xdb, 0x9, 0x9, 0xeb, 0x8, 0x800, 0x1000, 0xff, 0x4, 0x2, 0x7, 0x10001, 0x8000, 0x0, 0x1a, 0x5, 0x80, 0x7, 0x6, 0x101, 0x1000, 0x800, 0x6, 0x6, 0x3f, 0x3, 0x0, 0x7, 0x4, 0x9, 0x2, 0x2, 0x3, 0x1, 0x80000000, 0x2, 0x9, 0x1, 0x24000, 0x9, 0x7fff, 0x9, 0x7fffffff, 0x1]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1, 0xffffff17, 0x4, 0x1, 0x1c000, 0x1000, 0x2a, 0x0, 0x6, 0x9, 0x5, 0x4, 0x24a471, 0xfffffffe, 0x1, 0x1, 0x77f, 0x784, 0x56, 0x0, 0x2, 0x10, 0x970, 0xe2a, 0xf8d, 0x6, 0xffffffff, 0x3f, 0xac, 0x1, 0x6, 0x9, 0x6, 0x7, 0x0, 0x0, 0x9, 0x7f, 0xf5, 0xebe8, 0x5, 0xfffffffc, 0x6, 0x0, 0x78f6, 0x5, 0x5, 0x6, 0x6, 0xfff, 0x8000, 0x2, 0x93, 0x8001, 0x0, 0x9, 0x7, 0xff, 0x4, 0x1ff, 0x5, 0x0, 0x4, 0x2, 0x7, 0xa96, 0x7, 0x3, 0xffffff3b, 0x1ff, 0x8, 0x2, 0x3, 0x100, 0x100, 0xff, 0x0, 0xc, 0xbb, 0xffffffff, 0x1, 0x3, 0xd9, 0x800, 0x8001, 0x4, 0x1, 0x5, 0xfffffff8, 0x5, 0x101, 0x140, 0x800, 0x2, 0x9, 0x6, 0x56, 0x5, 0x19e, 0x1, 0xb21, 0x8, 0xfc, 0x9, 0x0, 0x40, 0x7, 0x6, 0x1, 0x5, 0x1, 0x8, 0x81, 0x2765, 0x0, 0x1f000000, 0x0, 0x4, 0x2, 0x400, 0x49d9, 0x7, 0x5, 0x10001, 0x0, 0x200, 0x0, 0x6, 0x1, 0x200, 0x80000000, 0x4, 0x8001, 0x5, 0x7517, 0xb6, 0x9, 0x4, 0x1, 0x101, 0x80, 0x3, 0x1, 0x7f, 0x8, 0xfffff664, 0x2, 0x800, 0x9, 0x300, 0x81, 0x0, 0x7000, 0x3f, 0x8001, 0x1, 0xffff8001, 0xa11d, 0x8e, 0xff, 0x5, 0x4fdc, 0x0, 0x7ff, 0xfff, 0x2, 0x78, 0x325b, 0x8, 0x6, 0x8, 0x7, 0x3b, 0x6, 0x8000, 0x7fff, 0x8, 0x401, 0x7ff, 0xffff, 0x938, 0x0, 0x1ff, 0x1f, 0x7fffffff, 0x5, 0x200, 0xc0e6, 0x80000001, 0x53, 0x323, 0x9, 0x9, 0x40, 0x7fff, 0x0, 0x7d88a19f, 0x6, 0x3, 0x1, 0x49b7, 0x9, 0x8, 0x4, 0xed74, 0x7, 0xff, 0x1, 0x3ff, 0xfff, 0x2, 0x7, 0x2, 0xff, 0x3f, 0x9e, 0x6, 0xffffff2a, 0x7, 0x6, 0x4, 0x3, 0xfff, 0x40af, 0x7, 0x9, 0xfffffbff, 0x7dc, 0x88000, 0xff, 0x7, 0x5, 0x4, 0x2, 0x3, 0x9b81, 0x2, 0xfffffffb, 0x2, 0x0, 0x5, 0x7ff, 0x3ff, 0x0, 0x7f, 0x84b3, 0x2, 0x7, 0x9, 0xc9f, 0xffff8001, 0xe4bb, 0xb5c8, 0xaf, 0x3, 0xfffff9ef]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x9, 0x2, 0xff, 0x6800, 0x80, {0xff, 0x2, 0x2c0a, 0x4, 0x4, 0x3e}, {0x0, 0x2, 0x3f, 0x5, 0x5, 0x5}, 0x1, 0x9, 0x6}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x6}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x4}], [@TCA_POLICE_RATE64={0xc, 0x8, 0xfff}, @TCA_POLICE_RATE64={0xc, 0x8, 0x7ff}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x6}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x5}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x2, 0x5, 0xff, 0x2, 0x0, 0x7fffffff, 0x4, 0xffffffff, 0xfff, 0x5, 0x8, 0x3, 0x9, 0xdf0, 0x8, 0xea1, 0x1e0, 0xdb8, 0x69, 0x7, 0x1, 0x7, 0x80000000, 0x7f, 0x8000, 0x9, 0xff, 0x100, 0x2, 0x7a, 0x3ff, 0x3, 0x1, 0x800, 0x1d, 0x10000, 0x1, 0xfff, 0x3f, 0x1000, 0xff, 0x6, 0x5, 0x8, 0x1, 0x6, 0x1000, 0x2, 0x10001, 0x3ff, 0x8, 0x0, 0xe70, 0x81, 0x1f, 0x7, 0x5, 0x8, 0x80000001, 0x8, 0x8, 0x8000, 0x480, 0x5, 0x6, 0x7, 0x3, 0x6, 0x8001, 0x8, 0x3f, 0x3, 0x401, 0x0, 0x2, 0x7, 0x5, 0x2, 0x4, 0x1, 0x40, 0x400, 0x3ff, 0x5, 0x80000000, 0x1ff, 0x8000, 0x5, 0x200, 0x1, 0x1000, 0x81, 0xffffffff, 0x0, 0xb5, 0x6, 0x7f, 0xfffff800, 0x9, 0x7, 0x9, 0x3, 0x1, 0x93f9, 0xfffffff7, 0x7fff, 0x3, 0x7f, 0xff, 0x3, 0x0, 0x88be, 0x5, 0xffff, 0xe4ba, 0x8, 0x8, 0x9, 0x7, 0xde0, 0x18000, 0x1, 0xff, 0x8, 0x1, 0x3f, 0x7, 0x3, 0x2, 0x9, 0x5, 0x4, 0x92ae, 0x9, 0x81, 0xf2, 0x7, 0x4, 0x17d, 0x4, 0x9, 0x7, 0x0, 0x268, 0x80, 0x23, 0x1, 0x3, 0x800, 0xe747, 0x81, 0x6, 0x8167, 0x10001, 0x3, 0x7, 0x3, 0x800, 0x101, 0xffff, 0x2, 0xaa74, 0x9, 0x9, 0x3, 0xfffffffd, 0x1e3, 0xc8, 0x0, 0x9, 0xe6, 0x7f, 0x5, 0x2, 0x2, 0x5, 0x6, 0x6, 0xfffffff7, 0x3, 0xf50, 0x20000, 0x10001, 0xfff, 0x3, 0x9, 0x100, 0x4, 0x3, 0x8f35, 0x0, 0x9, 0x200, 0x0, 0x2321, 0x7, 0x7fffffff, 0x0, 0x5, 0x8, 0x4c, 0x10, 0xed, 0x100, 0x0, 0xfc, 0xff, 0xc8, 0xa629dad, 0x0, 0x1, 0x2, 0x7, 0x1, 0x7, 0x3, 0x0, 0x1, 0x2, 0x7, 0x2, 0x68026e8b, 0x1, 0x5, 0x80000001, 0xfdf874e, 0x10001, 0x8, 0x10001, 0x7f, 0x445, 0x3, 0x1ff, 0xfffffff8, 0x3, 0x2, 0x400, 0x2, 0xdae2, 0x20, 0x1000000, 0x6, 0x5, 0x9, 0x6, 0x3, 0x4, 0x7, 0x6c4, 0x7fff, 0x6, 0xdbb, 0xfff, 0x6, 0x5]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x4, 0x2, 0x3, 0x2, 0x8, {0xff, 0x1, 0x1000, 0x6, 0x5, 0x6}, {0x7f, 0x1, 0x2, 0x8001, 0x3, 0xffffffff}, 0x8000, 0x40, 0xa35a}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x3f, 0x9, 0x2, 0x1, 0x1ff, 0x7, 0x4, 0xbe, 0x3ff, 0x81, 0x3ff, 0x8, 0x995, 0xfff, 0xff, 0x8cf3, 0x1, 0x7fc00000, 0x6, 0x5, 0x7, 0x8, 0x3f, 0x5, 0x7ff, 0xa7cd, 0x6, 0x2, 0x8, 0x6, 0x3, 0x3, 0x401, 0x20, 0x7, 0x8, 0x0, 0x7fffffff, 0x0, 0x2, 0xfffff4fe, 0x401, 0x2, 0x0, 0x7, 0x7, 0x0, 0x20, 0x5, 0x1, 0x81, 0xae22, 0xfff, 0x4, 0x8000, 0x7e992c42, 0x95, 0x4, 0x2, 0x5fc, 0x8, 0x6, 0x20, 0x8, 0x1, 0x8000, 0xfffffc01, 0x9, 0x0, 0x46726efa, 0x4, 0x9, 0xffff85c3, 0x0, 0x7, 0x401, 0x20, 0x10000, 0x80, 0x7fff, 0xfffffbff, 0x7fff, 0x80, 0x6, 0x7, 0x325, 0x8, 0x96, 0x5, 0x0, 0x7, 0x7, 0x1, 0x9, 0x8, 0x0, 0x7ff, 0xb5, 0x6, 0xd839, 0x6, 0x0, 0x3ff, 0x3, 0x10000, 0x43, 0x1000, 0x40, 0x400, 0xfffffffd, 0x8, 0x0, 0x4, 0xff, 0xe44, 0xb992, 0x8b, 0x8, 0x6, 0x5, 0x4, 0x10000, 0x10001, 0x400, 0x5, 0x9, 0x0, 0x4, 0x83e, 0x91, 0x2, 0x2, 0xdff3, 0xfffffff7, 0x7, 0xcb4c, 0x8000, 0x9, 0x81, 0x64f5, 0xff, 0x9, 0xc49, 0xfff, 0x8000, 0x8000, 0xfffffff9, 0x0, 0x4, 0x1, 0xffc00000, 0x9, 0x5, 0x3, 0x81, 0xed25, 0x4, 0x0, 0x63, 0x81, 0x3, 0xb3, 0xfff, 0x400, 0xffffffff, 0x4, 0x1, 0x3, 0x7, 0x5, 0x0, 0x1ff, 0x3, 0xfffffff8, 0x5, 0x3ff, 0x7, 0x20, 0x2, 0x5, 0x2, 0x7f, 0x3f, 0xf42c, 0x3, 0xfffffffc, 0x2, 0x3ff, 0x3, 0x1ff, 0x18d1, 0x100, 0x6, 0x100, 0xb6c, 0x7, 0x6, 0x3, 0x6, 0x7fffffff, 0x477a, 0x1, 0x9, 0x1000, 0x2, 0x4, 0x8, 0x2, 0x3ff, 0x0, 0x42879b9b, 0xfffff982, 0x9, 0x6064, 0x1f, 0x0, 0x20000, 0x6, 0x1, 0x0, 0x200, 0x8001, 0x40, 0x9, 0x7, 0xfffff73f, 0x10001, 0x1, 0x7ff, 0x1, 0x100, 0x4, 0x10000, 0x81, 0xfff, 0x7a, 0x1d, 0x80000001, 0x7ff, 0x7fffffff, 0x3f, 0x5, 0x1, 0x2, 0x0, 0x0, 0x6, 0x6de5, 0x54, 0x411, 0x4, 0x2, 0xfffffff9, 0x800, 0x9, 0x4]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x1}], [@TCA_POLICE_RATE64={0xc, 0x8, 0xfffffffffffffff7}, @TCA_POLICE_RATE64={0xc, 0x8, 0x14b}, @TCA_POLICE_RESULT={0x8, 0x5, 0x6}]]}, {0xa5, 0x6, "acaeb462a6aaa5422e46a42984900196bf87f33b1125527b9750ef51133590dd02bb882eaa8763f3795e8e656cb1894694f48c7ee5fa0baf362ab23ae1e770973b0d29bb2bc25aa031d5c5ded3c3319ea9d3b794aa13a27e56be43e0962db3f25a45172b39424039c120d132bf2b16cd36fa353f71c2afb871246e002aa50083b6e85a4def811a49bc4bd27ceb60ae9c2603e20904d8c948e0e072d34cbe3a18cc"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}, @m_connmark={0xa8, 0x1f, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1f, 0x6, 0x0, 0x4, 0x4}}}]}, {0x5c, 0x6, "161cebc57c7ed9dd45178f5cb9b77108e26b5fce02393b523d268a3b0904e722597b8babefe8ce182e56c24b60245270928111f33d10817c6e8f8f1299736634a6bf8ad720ec95212f7b10bfe9811411aac582b445dfb01e"}, {0xc}, {0xc, 0x8, {0x3, 0x2}}}}, @m_ctinfo={0xf0, 0x6, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_ZONE={0x6, 0x4, 0x7fff}, @TCA_CTINFO_ACT={0x18, 0x3, {0xc9cf, 0x2, 0x0, 0x3, 0x3}}]}, {0xa2, 0x6, "ee9f0e3a98ac85a57c0b7610f60c1980e3bf85be9771f8d4834e2b08f39b2de234f000391f8a93963bf5ecf9bbe7aae034bdf3e0ddc3c3fd3d2221a32eae908a6f7b129f8b34a5f7f9b03536e991f8901976b2bc8fdc5f1ece0a57bdfa85793265ce8202ccc7907819ae1b41520c1843358dc4b1e309b0f4b5d7dcee35e15f4dccd53360d5f01d1c2b2f03f3a97f90281a8d41cfe4ddb6698fc343574fef"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_ife={0x44, 0xc, 0x0, 0x0, {{0x8}, {0x4}, {0x1b, 0x6, "befb9c5077559bf97991d934fcb89c95d3bd32b85eb0da"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_xt={0xfc, 0xf, 0x0, 0x0, {{0x7}, {0xc, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8, 0x3, 0xb867}]}, {0xca, 0x6, "4ae48b8a342451e4384582a9a9b912c04ba74fee46c4ac71692b2a00bd0709556f159e814b49d0bb8570a488ccb396227a7a4bb1661c633dd419c5ff1e2f64743d3c1227e5d302f56477af99744da00a1b39f9797f834620de6efb0e01f7d3595f40976edb97a6aeb61df13f7f99b395302ee2c00a20502c41373051577f82d215893d287169b9611316c5c05d1fc3d4846c2a0de3ae58d4ed518363459d2ab67627730d6a8b6b9f8755b046d435be98474d22d0b65f16812f87d22e152c886c8c50f4e34054"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_simple={0x148, 0x15, 0x0, 0x0, {{0xb}, {0x68, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0xef9cda67, 0x4, 0x3, 0x20, 0xf4}}, @TCA_DEF_DATA={0x17, 0x3, 'cgroup.controllers\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x6, 0x90d, 0x20000000, 0x3, 0x7}}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_DATA={0x6, 0x3, '#\x00'}, @TCA_DEF_DATA={0xc, 0x3, '[&}\\)@.\x00'}]}, {0xb5, 0x6, "d7fe1585b4b36236be5f66783254a0333050570e029c805dc0a7fb6f2561a2395a7b66de1c3165dbc67df2ff4e58ee4273649196908099c5a189563de7a102537d799df0876d0e932d9102d0ade3ba8e8e9af8bc44dbb271027020c66815a2c2991039819180c6499070ee092156504a970390b5ff2818125b42eba380e1e62cf228a250a25e19ace37d7f7f89f442bfbb6770d6c895693f89c3f2ea9e91ef46e5873d9c0c3ca64ec2bbec95faf21b323d"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}]}, @TCA_U32_LINK={0x8, 0x3, 0x1}, @TCA_U32_FLAGS={0x8, 0xb, 0x7}]}}]}, 0x6fec}, 0x1, 0x0, 0x0, 0x44810}, 0x1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_IBSS(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)={0x34, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_BSS_BASIC_RATES={0x6, 0x24, [{0x48}, {}]}, @NL80211_ATTR_SSID={0x5, 0x34, @random="82"}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_GET_SURVEY(r1, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000400)={&(0x7f0000000280)={0x20, r6, 0x300, 0x70bd28, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x0, 0x15}}}}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x8000) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x102) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:23 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x7, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 360.199674][T17822] BPF:Section overlap found 05:04:23 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x0, r1}, &(0x7f0000002840)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f00000001c0)={r1, 0x7ff, 0xef, "ea0c6fa91b960907a3cd230dc889fff0b83d4e2207f674fcd36719affde84a5fa15295fd59a26f3a9aa1494af6f90a005c446b7e278a6b73e4e3119d44b0d3206237c2e5c0a15f9cbf0e436ada202a3effef7392e1118968ca4c088a98302927ba50eb986d6242f303b602717e2b3b5588872e093b7efd4455e52da11268220162c44bb25566961ab22b589a35f5b4da5a6ba595d22cb7bda9f87c3411784a2c9bddbd21d81fa5002745d248ba51579eec4f141e076d972e8fe68dd591a6a6e62afb3acb3357941c483470178c963fed6e29990955ef7d1710ab5ad3d6ba7bb0a913fa1b820a2d56fbac010822c2f8"}, 0xf7) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:24 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x2b, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 360.280641][T17827] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.355076][T17833] BPF:Total section length too long [ 360.363715][T17835] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.381029][T17836] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.465707][T17839] BPF:Section overlap found 05:04:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x3c}}}}}}}, 0x0) [ 360.531841][T17847] BPF:Section overlap found 05:04:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x3c, r2, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xffffffffffff7fff}, @L2TP_ATTR_LNS_MODE={0x5}]}, 0x3c}}, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 05:04:24 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x8, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:24 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x2d, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 360.670633][T17850] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.734291][T17853] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.747929][T17854] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.822518][T17854] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.832056][T17859] BPF:Total section length too long 05:04:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x48}}}}}}}, 0x0) [ 360.927433][T17865] BPF:Section overlap found [ 360.958931][T17867] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:24 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xa9, &(0x7f00000001c0)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x10}, @void, {@generic={0x88f7, "4f559a9b6016ca2e2d2e483b9ec940ff39333417dd016cfd3dab0c2240d8acf52c4e050ed9c4418aa5764beb87099f292a4602d255fdb7dededc65a5e009b73b6b9263dbc3ff42cb792aa55a1f2a3d9873399e82c0902590f92b9092d66a81018956e62d135db6861fe8c8a139f81b5ad32e5339d3cee0fa8dae6e801b8dd8e3f04d1c1a8523accb8d2bc775288d237ac80f0a207bb3621d72c275"}}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000000)) [ 361.037160][T17870] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 361.056685][T17871] BPF:Section overlap found 05:04:24 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x32, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 361.259047][T17878] BPF:Total section length too long [ 361.363124][T17884] BPF:Unsupported section found [ 361.448945][T17886] BPF:Unsupported section found 05:04:25 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x13, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x4c}}}}}}}, 0x0) 05:04:25 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:25 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x34, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x20, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x0, {[@sack_perm={0x4, 0x2}, @window={0x3, 0x3, 0x3}, @sack_perm={0x4, 0x2}, @nop, @nop]}}}}}}}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) [ 362.043758][T17898] BPF:Invalid section offset [ 362.054650][T17905] BPF:Total section length too long 05:04:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x60}}}}}}}, 0x0) [ 362.112702][T17910] BPF:Invalid section offset 05:04:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000001c0)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) accept4(r2, 0x0, &(0x7f0000000000), 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0xfc}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:26 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x36, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:26 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xc, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x68}}}}}}}, 0x0) [ 362.444564][T17929] BPF:Invalid section offset [ 362.471207][T17930] BPF:Total section length too long 05:04:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x40, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xe27e}, @in6={0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, '\x00', 0x44}, 0x80000000}, @in={0x2, 0x4e22, @loopback}], 0x48) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x9d, &(0x7f0000000080)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x10}, @remote, @void, {@llc_tr={0x11, {@snap={0xab, 0xab, "df", "e4d3d8", 0x88e5, "9aed5ecb07b4f6b5d11ad26ef99603da8127a29ad60f860f0482035d16ce6cabe69cc85f49d42287ff4cf1097ed98b2056741b1de3a774c870be67a3ace215e71cfa2cba125ce58d7fd31f17ee39ded64f7f98f3144ec7201a34638abf2b95d4624fe0b48cca2808b29d1ef5ffccf7292cc673211817613ae46dc661e29210dd9ca82f1dce050f"}}}}}, 0x0) [ 362.530008][T17933] BPF:Invalid section offset 05:04:26 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x3b, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 362.824599][T17944] BPF:Invalid section offset [ 362.878490][T17944] BPF:Invalid section offset 05:04:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de02db7c68514b9a720d62477039ca82fe000099d41d8bdcd213a01967ef50929cf1c43ed89ef9c91f82028dcece41ac69d14aac693389844741c1"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:26 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xd, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x6c}}}}}}}, 0x0) 05:04:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000640)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet(0x2, 0x70baef531c1f4370, 0x7) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@empty, @in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x4e24, 0xfffb, 0x4e22, 0x8, 0xa, 0x20, 0xa0, 0x2b, 0x0, r2}, {0x80000001, 0xffffffffffffff01, 0x6, 0x7, 0x6, 0x8d34, 0x4, 0x2}, {0x3, 0x2, 0x7fff, 0x4000000}, 0x4, 0x6e6bb8, 0x2, 0x1, 0x3, 0x1}, {{@in6=@rand_addr=' \x01\x00', 0x4d4, 0x2b}, 0xa, @in=@local, 0x3504, 0x2, 0x2, 0x0, 0xe0000000, 0x40, 0x3}}, 0xe8) r3 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000200), 0x4924924924926d3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@loopback, @in6=@empty}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f00000007c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/138, 0x8a, 0x0, &(0x7f0000000400)={0x11, 0xf6, r4, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x5f, &(0x7f0000000540)={@local, @remote, @void, {@llc={0x4, {@snap={0x1, 0xab, 'l~', "ac1781", 0x8100, "9bfff927980d6ef63af47ede7a954aba11e0c995a56db803103d9bc277fce56a1e0badda420d8975610f7db2209940c5634727422cd96a8ad7d2e25509f9713aa9248bbef4edbbd2"}}}}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@deltaction={0x40, 0x31, 0xde44f242c6efada4, 0x70bd25, 0x25dfdbfb, {}, [@TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}, {0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0xc, 0x18, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x30c0}}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4041) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000680)) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000007040)={&(0x7f0000005140)={0x2c, r7, 0x1, 0x0, 0x0, {0x5}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000140), 0xc, &(0x7f00000005c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="34000041dbc30076b4046b5c9cacd7c39de875b869519ac20d2b4ec39c65a8c5201b8bda56aa2340c94e379368f93b31ed8f58219779d0766fce3a3075b1fba0914a81bc2b0471aca189b8b52fbd4fe69922875e55bbba13aa537852ca6aa00cda163406000000000000498a6faf2300000014220edfc22eeb82f684ce4c7ebe3674fcc1e854b9a580d4459aa1bf9f572364e38668ead6f0994652e5d54d", @ANYRES16=r7, @ANYBLOB="100027bd7000fcdbdf2505000000080005000070000005000200ff00000008000500fbffffff0500060000000000"], 0x34}, 0x1, 0x0, 0x0, 0x4008000}, 0x4c0d5) 05:04:26 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x3fff8, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 363.340781][T17956] BPF:Total section length too long [ 363.356896][T17965] BPF:Invalid section offset 05:04:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x74}}}}}}}, 0x0) [ 363.431053][T17971] BPF:Invalid section offset 05:04:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="6cc2006d91780000"], 0x0) 05:04:27 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xe, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:27 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x7a}}}}}}}, 0x0) [ 363.715734][T17986] BPF:Total section length too long 05:04:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) sendto$inet6(r2, &(0x7f0000000000)="39c055cff73aa7c284a8df2e8303bc16763f12eb71258335a71a252ac70abfa82a61af8b8b0d0e8db3d46961314ec560", 0x30, 0x10, &(0x7f0000000080)={0xa, 0x4e20, 0x5, @mcast1, 0x7}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaa9aaaaaaabb86dd6020920000140600fc020000000000000000000000fe8000000000000000000000000000aa00004e22000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) 05:04:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x30, r0, 0xde2d0000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:27 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xf, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xd6, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @udp={0xc, 0x6, '\x00', 0xa0, 0x11, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, {[@dstopts={0x1d, 0x4, '\x00', [@hao={0xc9, 0x10, @loopback}, @pad1, @enc_lim={0x4, 0x1, 0x5}, @ra={0x5, 0x2, 0x12f}, @ra={0x5, 0x2, 0x5}, @padn={0x1, 0x2, [0x0, 0x0]}]}, @routing={0x3a, 0x4, 0x1, 0x8, 0x0, [@mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}], {0x4e20, 0x4e22, 0x48, 0x0, @wg=@cookie={0x3, 0x4, "ba69d9bb324ec96df873027d2461ab2872feba1723773682", "940a533a6aeea31cade3ff1b1fb7d7a4dbe2cef6679fb7854cd842d638c25d55"}}}}}}}, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10, 0x0) bind(r1, &(0x7f00000000c0)=@l2={0x1f, 0x979, @any, 0x3, 0x2}, 0x80) 05:04:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x300}}}}}}}, 0x0) [ 363.989187][T18001] BPF:Total section length too long [ 364.069880][T18001] BPF:Total section length too long [ 364.085723][T18010] BPF:Total section length too long 05:04:27 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:28 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x10, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x500}}}}}}}, 0x0) [ 364.386752][T18023] BPF:Total section length too long [ 364.453300][T18023] BPF:Total section length too long [ 364.507475][T18026] BPF:Total section length too long 05:04:28 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x7, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x600}}}}}}}, 0x0) [ 364.701805][T18038] BPF:Total section length too long 05:04:28 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x1d, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 364.787500][T18043] BPF:Total section length too long 05:04:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x700}}}}}}}, 0x0) 05:04:28 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x8, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 364.900077][T18044] BPF:Total section length too long [ 364.961723][T18046] BPF:Total section length too long [ 365.090020][T18056] BPF:Total section length too long [ 365.160134][T18056] BPF:Total section length too long 05:04:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) r3 = socket$phonet(0x23, 0x2, 0x1) ioctl$INCFS_IOC_FILL_BLOCKS(r3, 0x80106720, &(0x7f00000003c0)={0x4, &(0x7f0000000340)=[{0x3, 0xeb, &(0x7f0000000140)="00a20ffc3a84626efa70b039ff88ea75475ab9209bec36f55dc557a939114a466d5c9c66cd757dc5df54979796752e6b5465deb66067a8a7dcfee93c1dcef4e6b27f9fc7765e458f5ed40b43f559295aa9c136eef244fb22e3395b88396dcd88f5418d37cfd2e1d42b9db4365811a6a19f13344d6f2b346e331471ca74d47f996e9271261787569b3744e0a3543224e01098d929e7fbbc719434c8bece790fe026ca8c9cc565e3b48f08c64dbb6b1253241941bfa856326cca8f30642e9b4a9e79cd66ebdad5477d0023113e16981c46631d8ce8e7b144c6c64bfae8ffb91bd5eeafe4063cd1012e3592e8", 0x1, 0x1}, {0x8, 0x2b, &(0x7f0000000000)="67833a043d02df3c5ee09e47b7187e259fca67ca0bbdea63c16e3fd8b4b51cc41cd25883a8d12f8a367cab"}, {0x78a, 0x1000, &(0x7f00000005c0)="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", 0x1, 0x1}, {0x400, 0x4d, &(0x7f0000000240)="7d6616eb2c10d7c5e53672f484528882857e21a1768411bd046468619b5baa1dc3055337b50cbeb2a5190d467215a03c081d30a121436868fc884743b812af4ac7449bc4b45f7c1d29ace936b6", 0x1, 0x1}]}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:29 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x34, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0xa00}}}}}}}, 0x0) 05:04:29 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 365.414259][T18069] net_ratelimit: 21 callbacks suppressed [ 365.414284][T18069] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 365.452247][T18072] BPF:Total section length too long [ 365.470813][T18073] BPF:Total section length too long [ 365.534690][T18079] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 365.557221][T18082] BPF:Total section length too long 05:04:29 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x36, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:29 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0xaad}}}}}}}, 0x0) [ 365.863202][T18091] BPF:Total section length too long [ 365.883722][T18092] BPF:Total section length too long [ 365.899708][T18093] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 365.956143][T18096] BPF:Total section length too long [ 365.976193][T18098] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:29 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3b, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:29 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xc, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x1100}}}}}}}, 0x0) [ 366.270087][T18102] BPF:Total section length too long [ 366.301226][T18109] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 366.319243][T18110] BPF:Total section length too long [ 366.338987][T18111] BPF:Total section length too long [ 366.375293][T18113] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:30 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xd, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:30 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x63, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 366.645587][T18118] BPF:Total section length too long [ 366.708791][T18123] BPF:Total section length too long [ 366.712454][T18128] BPF:Total section length too long 05:04:30 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db6a8e8f9df013e1679d043de9deae2268d2639c655f4e05a4aa78967427245a140f87cc796b84440965365f96ec45b9249c0d8ae3108a72b1802d8c6692717ae89862a4fc3648ed737eaef8f19d25c20562ba88f6f7b5b2f964d5d15cd16d6d5e9676c90cd7ccc014045dc31168a1564f4649b66d967aae23db0e3b68bb2a2575737042065f9364807b3ebba5649c37c683c5fdb60a5cac4a43de46027ec1"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x1f00}}}}}}}, 0x0) 05:04:30 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xe, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:30 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x7ffff, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 366.923928][T18135] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 367.031456][T18143] BPF:Total section length too long [ 367.057206][T18146] BPF:Total section length too long 05:04:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x2000}}}}}}}, 0x0) [ 367.128391][T18151] BPF:Total section length too long 05:04:31 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xf, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:31 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 367.244068][T18154] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 367.326891][T18155] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x3c00}}}}}}}, 0x0) [ 367.501354][T18163] BPF:Total section length too long [ 367.512873][T18164] BPF: (anon) type_id=2 bits_offset=0 [ 367.537834][T18164] BPF: [ 367.551096][T18164] BPF:Member exceeds struct_size [ 367.578044][T18164] BPF: [ 367.578044][T18164] [ 367.593760][T18167] BPF:Total section length too long [ 367.649626][T18170] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:31 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x10, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:31 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x2}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x3f00}}}}}}}, 0x0) [ 367.921016][T18178] BPF:Total section length too long [ 367.992015][T18184] BPF:[1] Invalid name_offset:2 [ 368.013376][T18186] BPF:Total section length too long 05:04:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x4000}}}}}}}, 0x0) 05:04:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x4800}}}}}}}, 0x0) 05:04:32 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x1d, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:32 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x3}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r1, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd2138dcece41ace9d14aac693389844741c16d700b8f757fc4e5dd07db000000000000"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r4, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r5 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'ipvlan0\x00'}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r5, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @dev}, 0x2}}, 0x2e) pread64(r5, &(0x7f0000000140)=""/123, 0x7b, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 368.517804][T18205] BPF:[1] Invalid name_offset:3 [ 368.529177][T18206] BPF:Total section length too long 05:04:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x4c00}}}}}}}, 0x0) [ 368.619030][T18213] BPF:Total section length too long 05:04:32 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x4}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:32 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x34, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x6000}}}}}}}, 0x0) 05:04:32 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112000000000000000068514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700ba8757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 368.904777][T18225] BPF:[1] Invalid name_offset:4 [ 368.997386][T18234] BPF:Total section length too long 05:04:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x6800}}}}}}}, 0x0) 05:04:32 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x5}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 369.110000][T18237] BPF:Total section length too long 05:04:33 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x36, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 369.324300][T18248] BPF:[1] Invalid name_offset:5 05:04:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x6c00}}}}}}}, 0x0) [ 369.445237][T18256] BPF:Total section length too long 05:04:33 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x6}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 369.539914][T18260] BPF:Total section length too long 05:04:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x7400}}}}}}}, 0x0) 05:04:33 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3b, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 369.721182][T18265] BPF:[1] Invalid name_offset:6 05:04:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x7a00}}}}}}}, 0x0) [ 369.864748][T18274] BPF:Total section length too long 05:04:33 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x7}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 369.949772][T18277] BPF:Total section length too long 05:04:33 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x63, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0xad0a}}}}}}}, 0x0) [ 370.159702][T18285] BPF:[1] Invalid name_offset:7 [ 370.250847][T18282] BPF:[1] Invalid name_offset:7 [ 370.284130][T18293] BPF:Total section length too long [ 370.373653][T18297] BPF:Total section length too long 05:04:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x6}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000180)={r3, 0xfff}, 0x8) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91db7c68514b9a727ef48baefc00000099d41d8bdccece27ac69d15020d75c547c848d0a7f464448b99e1f4aac69338984c4e5dd07db0000ff00"/74], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r4 = socket$netlink(0x10, 0x3, 0xc) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:34 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0xb6e3}}}}}}}, 0x0) 05:04:34 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x8}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 370.579919][T18301] net_ratelimit: 21 callbacks suppressed [ 370.579939][T18301] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 370.664447][T18307] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 370.677076][T18308] BPF:[1] Invalid name_offset:8 [ 370.725818][T18313] BPF: (anon) type_id=2 bits_offset=0 [ 370.752206][T18313] BPF: [ 370.771823][T18313] BPF:Member exceeds struct_size [ 370.790496][T18313] BPF: [ 370.790496][T18313] 05:04:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0xe3b6}}}}}}}, 0x0) 05:04:34 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xa}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 370.880788][T18318] BPF: (anon) type_id=2 bits_offset=0 [ 370.906687][T18318] BPF: [ 370.919889][T18318] BPF:Member exceeds struct_size [ 370.943488][T18318] BPF: [ 370.943488][T18318] [ 370.993948][T18324] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 371.047150][T18327] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:34 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x2}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f000062a000/0x3000)=nil, 0x3000, 0x2000002, 0x110, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) ioctl$F2FS_IOC_RESIZE_FS(r2, 0x4008f510, &(0x7f0000000000)=0x4) r3 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 371.090341][T18328] BPF:[1] Invalid name_offset:10 05:04:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0xffff}}}}}}}, 0x0) 05:04:35 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x24}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 371.346724][T18334] BPF:[1] Invalid name_offset:2 [ 371.411242][T18343] BPF:[1] Invalid name_offset:2 [ 371.422600][T18344] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 371.485404][T18345] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:35 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x3}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 371.540108][T18348] BPF:[1] Invalid name_offset:36 05:04:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) 05:04:35 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x30}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 371.785090][T18356] BPF:[1] Invalid name_offset:3 [ 371.865748][T18361] BPF:[1] Invalid name_offset:3 05:04:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x70, @private1, 0x1}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22bd50a56dea13bc11f4a4d4ad", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) [ 371.930932][T18364] BPF:[1] Invalid name_offset:48 05:04:35 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x4}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:35 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x32}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xce, &(0x7f0000000000)=0x3, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5080363e0eae8ac2"], 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) [ 372.242315][T18376] BPF:[1] Invalid name_offset:4 [ 372.335037][T18381] BPF:[1] Invalid name_offset:50 [ 372.351161][T18383] BPF:[1] Invalid name_offset:4 05:04:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) accept4$x25(r1, &(0x7f0000000000), &(0x7f0000000140)=0x12, 0x80000) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000000)=0x80, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000005440)='hugetlb.2MB.limit_in_bytes\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000005480)={0x0, 0x101, 0xc0, "2b8a3c38b06aa10efda4273d3bfadcf0b1f1bba447c1fcea2e0f8c1311d402c63ae8c4a3da18fd5686c65bc69455194ed6abf61c97f0889cfd357d0b3f5d3cb9a2784a1c8f341e95e89783e8fb868393136fb3cdb68ee05cc5db1c22ac63114b19f4916e57ace57218afce7053bdebf2fcf3b93a99f5a73dcf1a2eb365c821f0c69d5fc3c84e90160b04754bc8ffdb4ac81b2c90ac2d9e43e4b01b38e22fb273c9ed309944fff47bb9749c1de4b91f7de05d72993f744e310ae63f0c1f4bd8b2"}, 0xc8) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x0, r5}, &(0x7f0000002840)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000080)={r5, 0x100}, 0x8) 05:04:36 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x5}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:36 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x48}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 372.641817][T18392] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 372.722487][T18400] BPF:[1] Invalid name_offset:5 [ 372.775940][T18402] BPF:[1] Invalid name_offset:72 05:04:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e24, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 372.804991][T18400] BPF:[1] Invalid name_offset:5 05:04:36 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x6}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:36 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x4c}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = accept4$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c, 0x80800) setsockopt$inet6_int(r1, 0x29, 0x1c9, &(0x7f0000000200)=0x101, 0x4) listen(r0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e21, 0xffffffff, @remote, 0x2}, {0xa, 0x4e20, 0x3, @empty, 0x8}, 0x7550, [0x1, 0x7, 0x10001, 0x1000, 0x2, 0x6, 0x6, 0x5dc]}, 0x5c) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 373.150002][T18417] BPF:[1] Invalid name_offset:6 [ 373.215146][T18422] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 373.239131][T18423] BPF:[1] Invalid name_offset:6 [ 373.240864][T18424] BPF:[1] Invalid name_offset:76 05:04:37 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x7}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="6fc2e59c90780000"], 0x0) 05:04:37 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x60}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 373.579557][T18436] BPF:[1] Invalid name_offset:7 05:04:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="00ffffff080000000833931b7d2240b58d071633c79b303132648c9ba6bbc99b6ef60200005c159482f82b010eec1f9bfcf52c77f3d2b294bf459ecd1fe9f46d60409afbc00f308827cf0e7364b0718b911dd4ae31fe642b082a93fe1b59664b278f76edfe14d25baa593841e809467d31682d082e95efc7117564314ae926892e86936897ad6ae9e515db2596d99c0cb572f2e826161f2db5081aa6f06b1a1c33f82c6c63820f96c83d64497ec7002bb6ce65325bcfdb46a1c2ef5fbb8c791ce8dfb3253f34256ef1e34e1ed9ad"], 0x0) [ 373.678244][T18440] BPF:[1] Invalid name_offset:7 [ 373.681267][T18441] BPF:[1] Invalid name_offset:96 05:04:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @dev}, 0x2}}, 0x2e) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r2, 0xf504, 0x0) openat$cgroup_ro(r1, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)=0x1) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) sendto$inet6(r2, &(0x7f00000001c0)="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", 0x1000, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @local, 0x6}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50bf000092780000"], 0x0) 05:04:37 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x8}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:37 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x68}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 374.183598][T18463] BPF:[1] Invalid name_offset:104 [ 374.213318][T18464] BPF:[1] Invalid name_offset:8 05:04:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @loopback}, 0x2}}, 0x2e) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f00000001c0)={0xa, 0x4e21, 0x1ff, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x7ff}, 0x1c) [ 374.303978][T18471] BPF:[1] Invalid name_offset:8 05:04:38 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x6c}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:38 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xa}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 374.412954][T18473] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 374.457186][T18475] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000080)=0xfff, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000540600fc020000000000000000000000000000ff02000000000000000000000000000100004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780001fe06e2d4c3d90204018002040700131273efc4763560587d331f11b5474bddef03030e1e0306050e00000005530545d00000007f09009340bc600ca486000000"], 0x0) [ 374.616195][T18479] BPF:[1] Invalid name_offset:108 [ 374.686844][T18482] BPF:[1] Invalid name_offset:10 05:04:38 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x74}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 374.769029][T18489] BPF:[1] Invalid name_offset:10 05:04:38 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x24}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaa0000aaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe80000000004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) [ 374.981985][T18497] BPF:[1] Invalid name_offset:116 [ 375.063222][T18502] BPF:[1] Invalid name_offset:36 [ 375.082050][T18497] BPF:[1] Invalid name_offset:116 05:04:38 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x7a}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 375.159070][T18507] BPF:[1] Invalid name_offset:36 [ 375.338031][T18513] BPF:[1] Invalid name_offset:122 05:04:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x131, &(0x7f00000001c0)={@remote, @local, @val={@void, {0x8100, 0x6, 0x0, 0x2}}, {@ipv4={0x800, @generic={{0x27, 0x4, 0x2, 0x11, 0x11f, 0x64, 0x0, 0x3, 0xc, 0x0, @broadcast, @rand_addr=0x64010101, {[@cipso={0x86, 0x4d, 0x0, [{0x6, 0xb, "d251b97f84de78af44"}, {0x1, 0xb, "883fbad2206316db7f"}, {0x7, 0x9, "b579bed096724a"}, {0x5, 0x11, "eefc0f257243d3b0fe91f94ce62cf6"}, {0x0, 0x5, "5f856c"}, {0x0, 0x4, "a0c4"}, {0x0, 0xe, "8e1338c50d9f0209acb0eda3"}]}, @timestamp_addr={0x44, 0x24, 0x40, 0x1, 0x5, [{@multicast2, 0x4000000}, {@empty, 0x9}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x8}, {@loopback, 0xb}]}, @lsrr={0x83, 0x17, 0x2a, [@dev={0xac, 0x14, 0x14, 0x17}, @dev={0xac, 0x14, 0x14, 0xc}, @local, @remote, @empty]}]}}, "801d8cacc77be3173b7a2271c040976f824930932ae6111b42a49861c467d091c7740f9c46766b3713d044ac225372da9655c9a9fadff168eaa866e7aa83bb5efea63404d318ef03bf2d196841199ddbc86fae4ef33abf6ad1bf88a565447833f295e6f4fa707e5abfa10ba1781f00415bb9309635bdddf3d087d629df083b4cba2346"}}}}, &(0x7f0000000080)={0x1, 0x3, [0x38, 0x5e1, 0xdd9, 0x39]}) 05:04:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000140)='pids.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r3 = socket$netlink(0x10, 0x3, 0x15) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000)={0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x8e, &(0x7f00000001c0)=ANY=[@ANYBLOB="754dcb6c523d0180c200000086dd600a3ff200580600fe8000000000000000000000000000bbfe80000000064b978974aeaa294d147adf00000000000000000000aa00004e229b0f661c8d83ce2d3772b20142034eefbce976bd41430a404580a40e5630e84df4ad5095f9ce1d47e8f1494a3807f45617dbf8001e1f7bae63d33b55da601f4b4eeec07ddb581af21cb139a7df28ed14b8e2c8c0637598f28fcb1223fa086e8c05323264097ab5a1c812e8947ecca118e03c1984b5c3066633adbb3b8708809ee24813760d", @ANYRES32=r1, @ANYRES32=0x41424344, @ANYBLOB="6000000090780000000821a46dd78c10fe13f989e0cffe7890cd59491b01d1a84a9596fe06e2d4c3d9fe0ef989825d64015449fe33de7522021e102000"/76], 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r4, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$pppl2tp(r2, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x1, 0x1, 0x0, 0x1, {0xa, 0x4e21, 0x8, @mcast2, 0xfffffff8}}}, 0x3a) sendto$inet6(r3, &(0x7f0000000300)="4dd9cf21ee05067cd3ddfcbf3c52370c687deda944ce8340243a2781f1361995d28af6bde2b2199749719b7ce3480738e6c89bd5d8efe42bc948f74cec1c59ab4c11dabadfd6d957c4db7c558d7a8a739889a6e9a0", 0x55, 0x4010, &(0x7f00000000c0)={0xa, 0x4e22, 0x6, @local, 0xfffffe01}, 0x1c) syz_emit_ethernet(0x62, &(0x7f0000000100)={@local, @link_local, @val={@void, {0x8100, 0x1, 0x0, 0x2}}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x28, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, r1, 0x41424344, 0x0, 0x0, 0xa, 0xc2, 0x0, 0x0, 0x0, {[@generic={0x13, 0xe, "cfbbb4874f951acbfe6b7490"}, @eol, @sack_perm={0x4, 0x2}]}}}}}}}}, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) 05:04:39 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x30}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:39 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xda}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 375.562435][T18522] BPF:[1] Invalid name_offset:48 [ 375.625797][T18532] BPF:[1] Invalid name_offset:48 05:04:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0) 05:04:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c21a59fe5fc96c"], 0x0) syz_emit_ethernet(0x7c, &(0x7f0000000080)={@multicast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}, @val={@void, {0x8100, 0x7, 0x1, 0x3}}, {@ipv6={0x86dd, @tipc_packet={0x6, 0x6, "33feb9", 0x42, 0x6, 0x0, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {[@srh={0x32, 0x4, 0x4, 0x2, 0x3f, 0x30, 0x3, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @remote]}], @payload_conn={{{0x1a, 0x0, 0x0, 0x0, 0x1, 0x6, 0x0, 0x2, 0x401, 0x0, 0x3, 0x3, 0x0, 0x0, 0xffff, 0x5, 0x4, 0x4e20, 0x4e20}}, [0x0, 0x0]}}}}}}, &(0x7f0000000000)={0x0, 0x2, [0xdb1, 0xbec, 0x96c, 0xb6e]}) 05:04:39 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x32}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 375.729409][T18536] BPF:[1] Invalid name_offset:218 05:04:39 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x300}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) bind(r1, &(0x7f0000000080)=@phonet={0x23, 0x7f, 0x20, 0x80}, 0x80) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="56c2000890780000"], 0x0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000100)=0x40) 05:04:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_STA_SUPPORTED_CHANNELS={0x6, 0xbd, [0x3f]}, @NL80211_ATTR_STA_VLAN={0x8}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2000c040}, 0x8001) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000080)=@qipcrtr, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/72, 0x48}, {&(0x7f0000000240)=""/205, 0xcd}, {&(0x7f0000000340)=""/233, 0xe9}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x4, &(0x7f0000001440)=""/252, 0xfc}, 0x8}, {{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001980)=[{&(0x7f00000015c0)=""/85, 0x55}, {&(0x7f0000000100)=""/61, 0x3d}, {&(0x7f0000001640)=""/187, 0xbb}, {&(0x7f0000001700)=""/5, 0x5}, {&(0x7f0000001740)=""/241, 0xf1}, {&(0x7f0000001840)=""/35, 0x23}, {&(0x7f0000001880)=""/182, 0xb6}, {&(0x7f0000001940)}], 0x8}, 0x40}, {{&(0x7f0000001a00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001a80)=""/58, 0x3a}, {&(0x7f0000001ac0)=""/252, 0xfc}, {&(0x7f0000001bc0)=""/197, 0xc5}, {&(0x7f0000001cc0)=""/164, 0xa4}, {&(0x7f0000001d80)=""/37, 0x25}], 0x5, 0xffffffffffffffff}, 0x790}, {{&(0x7f0000001e40)=@sco={0x1f, @none}, 0x80, &(0x7f0000002240)=[{&(0x7f0000001ec0)=""/220, 0xdc}, {&(0x7f0000001fc0)=""/28, 0x1c}, {&(0x7f0000002000)=""/73, 0x49}, {&(0x7f0000002080)=""/185, 0xb9}, {&(0x7f0000002140)=""/109, 0x6d}, {&(0x7f00000021c0)=""/15, 0xf}, {&(0x7f0000002200)=""/30, 0x1e}], 0x7, &(0x7f00000022c0)=""/49, 0x31}, 0x6}, {{&(0x7f0000002300)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000002700)=[{&(0x7f0000002380)=""/112, 0x70}, {&(0x7f0000002400)=""/99, 0x63}, {&(0x7f0000002480)=""/63, 0x3f}, {&(0x7f00000024c0)=""/116, 0x74}, {&(0x7f0000002540)=""/44, 0x2c}, {&(0x7f0000002580)=""/141, 0x8d}, {&(0x7f0000002640)=""/44, 0x2c}, {&(0x7f0000002680)=""/45, 0x2d}, {&(0x7f00000026c0)=""/7, 0x7}], 0x9, &(0x7f00000027c0)=""/165, 0xa5}, 0x4}, {{&(0x7f0000002880)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000002900)=""/249, 0xf9}, {&(0x7f0000002a00)=""/14, 0xe}, {&(0x7f0000002a40)=""/73, 0x49}, {&(0x7f0000002ac0)=""/125, 0x7d}, {&(0x7f0000002b40)=""/139, 0x8b}, {&(0x7f0000002c00)=""/156, 0x9c}], 0x6, &(0x7f0000002d40)=""/4, 0x4}, 0x9}], 0x6, 0x141, &(0x7f0000002f00)={0x0, 0x989680}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000030c0)={'gre0\x00', &(0x7f0000002f80)={'tunl0\x00', 0x0, 0x10, 0x10, 0x9, 0x3, {{0x40, 0x4, 0x3, 0x6, 0x100, 0x67, 0x0, 0x0, 0x29, 0x0, @local, @remote, {[@lsrr={0x83, 0x1b, 0x48, [@multicast1, @loopback, @rand_addr=0x64010101, @rand_addr=0x64010100, @loopback, @empty]}, @noop, @timestamp_prespec={0x44, 0x1c, 0x5f, 0x3, 0x3, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7}, {@multicast1, 0x7}, {@dev={0xac, 0x14, 0x14, 0x37}}]}, @lsrr={0x83, 0x27, 0xff, [@remote, @multicast1, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @multicast1, @rand_addr=0x64010100, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_prespec={0x44, 0x44, 0x53, 0x3, 0x2, [{@private=0xa010101, 0x5}, {@local, 0x200}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0xfffffffa}, {@rand_addr=0x64010102, 0x4}, {@multicast2, 0x9}, {@rand_addr=0x64010100, 0x5}, {@multicast1, 0xffffff55}, {@rand_addr=0x64010102, 0x40}]}, @lsrr={0x83, 0x1b, 0xc, [@empty, @dev={0xac, 0x14, 0x14, 0x27}, @broadcast, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ssrr={0x89, 0xb, 0xfa, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x31}]}, @timestamp={0x44, 0x10, 0x14, 0x0, 0x6, [0x1, 0x0, 0xffff]}, @lsrr={0x83, 0xf, 0x2c, [@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2]}, @ra={0x94, 0x4}]}}}}}) sendmsg$nl_route_sched(r1, &(0x7f00000031c0)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000003180)={&(0x7f0000003100)=@gettfilter={0x6c, 0x2e, 0x8, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x6, 0x8}, {0xe, 0xc}, {0x6, 0xfff3}}, [{0x8, 0xb, 0xffff0000}, {0x8, 0xb, 0x4}, {0x8, 0xb, 0x8000}, {0x8, 0xb, 0x544}, {0x8, 0xb, 0x7}, {0x8, 0xb, 0x55}, {0x8, 0xb, 0x3}, {0x8, 0xb, 0x6}, {0x8, 0xb, 0xffff0000}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4040090}, 0x20000000) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 375.988322][T18552] BPF:[1] Invalid name_offset:50 [ 376.076917][T18552] BPF:[1] Invalid name_offset:50 05:04:39 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x48}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 376.156833][T18561] net_ratelimit: 2 callbacks suppressed [ 376.156853][T18561] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 376.169860][T18563] BPF:[1] Invalid name_offset:768 05:04:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000440)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)="baf86eaad17d8c01a3c08f062730b2900a9ab109edea21773eb7e63d09683ff394afb46818e10772b6be5a22d51351ad707a3d2aa34fbcaac5b764202cad15f759c47f5249066d66acd9a756d8cca554191d6d1bf4bbd8f81c3f45d177820a1ae8858bc99a770b73bbb3636c7540e7c958f37c9428ae4731e6dd8da894f253b515d388aca2b744d87dfd7595714c8350870917b85e95b50530f9ff29c507961e965a47c23bcedeebbcc2a0b5067508e831a691751bdbb828b9cbe59d9d00bc6d0b4ceba8f23c498fcd", 0xc9}, {&(0x7f00000002c0)="b39495270c315945017f2a2ad578f3b2837793c3916dff56dfe25038d0cd29d90674f877e393f0acf4a968e4a7f878761f79b5373d142b42ba79a029e875793961cdc19a3350e691ac84325619798f4206aab1cf1cb6612ded05269c99b07726d578ea892327da9a793324ab0a1882c2f366dac6bd0cc1b395db638cef72dab89207436bc102bf5e43b1f115cc94832b1236cb4c881ef1850bf77b051285805e6f534a7ac93679c6890448cafc6018a8e5a8327daf4ceeed12836ee83d8756aca9d54d0ce5ac0845899588cbafa7dc7ed0be07a69653", 0xd6}, {&(0x7f00000000c0)}, {&(0x7f0000000100)}], 0x4, &(0x7f0000000400)=[@dstopts_2292={{0x20, 0x29, 0x4, {0x62, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x1}]}}}, @rthdr_2292={{0x18, 0x29, 0x39, {0x0, 0x0, 0x1, 0xcc}}}], 0x38}}], 0x1, 0x20040044) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) listen(r0, 0x8) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) [ 376.274138][T18568] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:40 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x500}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 376.402514][T18573] BPF:[1] Invalid name_offset:72 05:04:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000140)=@gcm_128={{0x304}, "752f32f3a03195d0", "4ef68802e94e7bdbfa359e28fe4eed4f", "93743c46", "6d8b4d1482e9ff2b"}, 0x28) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) socketpair(0x29, 0x3, 0x5, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route_sched(r3, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@getchain={0x2c, 0x66, 0x8, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0xfff3, 0x4}, {0x5, 0xe}, {0x7, 0xf}}, [{0x8, 0xb, 0xfffffffa}]}, 0x2c}}, 0x40800) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) listen(r0, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="614d2fcaadbb25d4af377c26461b08143b021b46ad43164957a8e9e6abd65d07b78cbe2418334df8d6316d8a4c3ae6819d28283cac978fbd0fd58cf22386f0d4ca6cf1177653d169b1d21f12c14bfa389b9d051419b9540c019e086da3d1fb86f8b5bbe67458659dcb7edd5354aebff349800bcd6b6071d9a8fe86333395ec55587dbb018ea1264b413a1374f0d7dbdac56cdf2a7e248e78688fcdedf54008dbb97b0301455da47467dbb691d994b67fae703ff4afd4f72ed588cddb5cb19d4352fe839d63a876c2f3c69cb5f9b3cae8f2843b9e6d22815a8ea521cbd06fa82fe57085fdadc6ac4170dcacf542d1104245dad3", 0xf3, 0x4080, &(0x7f0000000000)={0xa, 0x4e20, 0x80000001, @loopback, 0x40}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="00000000000000004d54ec3872f8f919fe6c8627a3a0fb3deb4d6b2d39903ed21a49e7a4187c2518214e83aade308bed5be0ef437aff007a3c6463516946b0a853e1012b852f6b7aa8a3a5ab6f56f4011774e4a601903cb9fc0a83f0a6ca17cab2cb67d58ee8ec91ec7252bcf044fe"], 0x0) [ 376.483492][T18580] BPF:[1] Invalid name_offset:72 [ 376.499755][T18578] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:40 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x4c}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 376.675773][T18587] BPF:[1] Invalid name_offset:1280 [ 376.758315][T18587] BPF:[1] Invalid name_offset:1280 [ 376.779971][T18595] BPF:[1] Invalid name_offset:76 [ 376.876095][T18597] BPF:[1] Invalid name_offset:76 05:04:40 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x600}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:40 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x60}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 377.078440][T18603] BPF:[1] Invalid name_offset:1536 05:04:40 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x700}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 377.230403][T18607] BPF:[1] Invalid name_offset:96 [ 377.312566][T18612] BPF:[1] Invalid name_offset:96 [ 377.449761][T18618] BPF:[1] Invalid name_offset:1792 05:04:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c001d00", @ANYRES16=r1, @ANYBLOB="010000000000000000000700000014000800000000000000000000000000000000000c001600ff7fffffffffffff0500140000000000"], 0x3c}}, 0x0) recvmmsg(r0, &(0x7f0000002880)=[{{&(0x7f0000000140)=@alg, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000580)=""/249, 0xf9}, 0x1}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000680)=""/117, 0x75}, {&(0x7f0000000700)=""/99, 0x63}, {&(0x7f0000000780)=""/88, 0x58}, {&(0x7f0000000800)=""/1, 0x1}], 0x4, &(0x7f0000000880)=""/171, 0xab}, 0xfffffffa}, {{&(0x7f0000000940)=@x25, 0x80, &(0x7f0000000f40)=[{&(0x7f00000009c0)=""/135, 0x87}, {&(0x7f0000000a80)=""/156, 0x9c}, {&(0x7f0000000b40)=""/216, 0xd8}, {&(0x7f0000000c40)=""/176, 0xb0}, {&(0x7f0000000d00)=""/162, 0xa2}, {&(0x7f0000000dc0)=""/85, 0x55}, {&(0x7f0000000e40)=""/217, 0xd9}], 0x7, &(0x7f0000000fc0)=""/104, 0x68}, 0xd9}, {{&(0x7f0000001040)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f00000013c0)=[{&(0x7f00000010c0)=""/141, 0x8d}, {&(0x7f0000001180)=""/194, 0xc2}, {&(0x7f0000001280)=""/90, 0x5a}, {&(0x7f0000001300)=""/139, 0x8b}], 0x4}, 0xffffffff}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001400)=""/29, 0x1d}, {&(0x7f0000001440)=""/4088, 0xff8}, {&(0x7f0000002440)=""/100, 0x64}, {&(0x7f00000024c0)=""/4, 0x4}, {&(0x7f0000002500)=""/68, 0x44}, {&(0x7f0000002580)=""/202, 0xca}, {&(0x7f0000002680)=""/183, 0xb7}, {&(0x7f0000002740)}], 0x8, &(0x7f0000002800)=""/73, 0x49}}], 0x5, 0x10000, &(0x7f00000029c0)={0x0, 0x3938700}) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ip_vti0\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x84880}, 0xc004) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc220000000000000000000400000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="502a46f7b98fdfd6eb009022cd8344f85ec5d65f150e26cc0e659fa0560d94e38c486615e395c9096a331f9803b2386a07041918c4cc3ba2170b19765495fc13afb9a00c6d9f5a1ca67a5a3b8a9e2a8da891c342033d0cc8c8288210eb16c39a3fb5887a737423a178e037c57defb1804f32ffaf9b07d0c0d20ca1fb00"/134], 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000340)=""/94, 0x5e}], 0x1, &(0x7f00000003c0)=""/60, 0x3c}, 0x40000001) sendto$inet6(r3, &(0x7f00000001c0)="90342e3eea85f04aa155ef7167f0c57d80890ed07142f93f030c57abec7ac057a4062d2ad30cc057ba49d19031fc8a383c40efb6ed76ad058d7f5482d0fe632fac91dbd0b295d65c9aab5bc4c7d5e63928de6f2d6fbabcf8c38ac7af46df2a7e9e91a89077ff895783edbb3655a2f7ed77923cce2d33a0a1a8825abfcca6d165fe514cf6fc34a457feb54b761221c4036e7bf81e8ef25fd85529a537b619b9392696bf05c372f3f91628420ce8e2e7", 0xaf, 0x800, &(0x7f0000000280)={0xa, 0x4e23, 0x402c, @mcast2, 0x5f77}, 0x1c) 05:04:41 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x68}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:41 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xa00}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @dev}, 0x2}}, 0x2e) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRES64=r0, @ANYRES32=r0, @ANYRESHEX=r3], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 377.659911][T18623] BPF:[1] Invalid name_offset:104 [ 377.723922][T18631] BPF:[1] Invalid name_offset:104 05:04:41 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x6c}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 377.855464][T18636] BPF:[1] Invalid name_offset:2560 [ 378.018431][T18641] BPF:[1] Invalid name_offset:108 05:04:41 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xc61}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 378.083905][T18645] BPF:[1] Invalid name_offset:108 05:04:41 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x74}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) write$cgroup_int(r1, &(0x7f0000000240)=0x6, 0x12) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'veth0_to_team\x00'}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x3c, r5, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xffffffffffff7fff}, @L2TP_ATTR_LNS_MODE={0x5}]}, 0x3c}}, 0x0) read(r4, &(0x7f0000000340)=""/116, 0x74) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x3c, r7, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xffffffffffff7fff}, @L2TP_ATTR_LNS_MODE={0x5}]}, 0x3c}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r6, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x804}, 0x800) r8 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 378.217810][T18650] BPF:[1] Invalid name_offset:3169 [ 378.244331][ T3250] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.250721][ T3250] ieee802154 phy1 wpan1: encryption failed: -22 [ 378.372017][T18658] BPF:[1] Invalid name_offset:116 05:04:42 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xc62}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 378.459263][T18664] BPF:[1] Invalid name_offset:116 05:04:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x52, &(0x7f0000000080)={@local, @remote, @val={@val={0x9100, 0x0, 0x1, 0x3}, {0x8100, 0x5, 0x0, 0x1}}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private1, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:42 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x7a}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 378.635612][T18672] BPF:[1] Invalid name_offset:3170 05:04:42 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xc63}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab27c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 378.824230][T18679] BPF:[1] Invalid name_offset:122 [ 378.917643][T18683] BPF:[1] Invalid name_offset:122 05:04:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000004480)={r1, 0x3, 0x5, 0x5}) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c) r3 = socket$nl_crypto(0x10, 0x3, 0x15) bind(r3, &(0x7f0000007500)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @multicast2}}, 0x80) listen(r0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000080), &(0x7f00000000c0)=0x10) syz_emit_ethernet(0x30d, &(0x7f0000000580)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6e08d82e02d73a00fe80000000000000000000000000001000000000000000000000000000000001010000000000000001050000000000006c0000000000000005020004000100000114040a0420001020010000000000000000000000000001fe80000000000000000000000000002afc010000000000000000000000000000ff010000000000000000000000000001ff02000000000000000000000000000100000000000000000000ffffac1e0001fc020000000000000000000000000001fc000000000000000000000000000001ff0200000000000000000000000000010000000000000000000000000000000101029078010000006a00000000092ffffc020000000000000000000000000001fe88000000000000000000000000000100000008680000003c0f000000000000207647684a6f21d67c1e9952d9598b6171c5539920a30ef42dbdc579d16eb9667605858167c6864105c4612bfae523ddcd4d0f2fb0456a46fb4df21b830d9a7a489b57b8ec79ef3c44a6a5555bbcf96a1ecac312b386474c1ef585b99f6360ac79d400812822531c56cf5a07c9bc34175b984795e15814182d0c000300000000fe880000000000000000000000000001fe8000000000000000000000000000bbfe8000000000000000000000000000bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffac1414bbb6c54cdfd2adc2b94d6f469a5d08e7f3a460c62a8f4a53f8782114e9f7e1182123d97e64424024b253a9b3ff4503b4e4bcb95fc56bad524d4c7736efebbc3bd0ec828be8879acce1afd8d2d99ce31146caba16f24697283b5ef72ba423d40c09edfadc84e5818094d98c743439f0cdd041421de105c662142c8ee03fb6ea696837c7731fca33065deec6768f78711ae009394091b7ea20025a46f7dd369363599b748272c06a50afa34564a6a7f53427ff70c5e4dabc546aa864813e98ddc9b0cb9716024612940c3d4505ae7d0ffd78788d13d2fa1a37c0dce3078ff015660b547408291d98422546efc1f26e5eff7d6d2f71661d9ef23e3ec3819c6a9f7cc9c27147d5a1cd1714bcb29aa373e7ba66a8ba1c68e8e68b94648f531c5e588417f2c4c89e4fc9c9fa961bbb11af2111736a95ffdc5f336bf97b02971223df003291a2bdbc1e3ac0be17cc6e7140bec74264af82846d249fded27a72f0a10b1243aa3a04b729fa4015d835f39d83a9548dc3"], 0x0) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x24080010, &(0x7f0000000140)={0xa, 0x4e20, 0x1ff, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000007380)=[{{&(0x7f0000000180)=@pptp={0x18, 0x2, {0x0, @private=0xa010100}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)="8d6e2cc5e1358b82d49751ce05f6cfd7c006ce2b6a56e2f50410616f1861361632b8e133a9b40ab81c79c533be3ab2dec9ce0560cafeadb83e0eb85e9f7c376b9b78c8e4527eaeb6507a817d5c735fc0e1cbefc71b6e3ce6fd8e7f99bdabe2e269759759014b0788d1e361b7d8e702a15bdb26a74231a8cccd57f7d6238ba71c37af39f019c711561a53d5a3490c69b951044e92712d827b57aa2c670e6ad0fb40a6aa8bc4d98dc87c2350404be618f88b5334623649029d537d0378191f2297448357b581eaa811f74b7753", 0xcc}, {&(0x7f0000000100)="0a7e6cc427520b59991f1d4820806c0e466a95769b1d1faa5e03d7e152df3afd47e10f677076a36a6a57dc7644c451a5e2ddcdd1ca6937d70d1f1baf", 0x3c}, {&(0x7f0000000300)="a158e12eaf536b46e9b50573154b0e6e527f9835e16b2f8806d777ab63f9dbb486fd81615857bcbaa56cc242d43f83b4d9f9762beab8867e0034228d6cf7f140b0295120a221068883983caf20e725dae18f3247e98dba5aadff689af91f16866e54293f1664701508ba23745748713e8fbcbdc4c30d33d7963820e9b64f5a3b7e6ce5d5fe02ba135e2c122c02f6b4bd76feb92e6381fd6ba9851369ce0c6840fb73b8fcc4e44b83f05a37ed640f078e4ac77b10c05802141c7d10441f0f8a5dca5d9cfcac51f597c3de0595ce21a8357460185af28841969b90a6bcf8ac928de63e617de83548dd618d1c8c38a6687d7f599e0db24e1a7882", 0xf9}], 0x3, &(0x7f0000000940)=[{0xb0, 0x117, 0xffffab14, "98060bfa3a138bdf70a3f1fc3acef0fcdee1ed4c1793e247b544039c15ffcae6cf70663546b28fd601c296b5d29d79b9e96de3bf1fa1e5d8d13622524c43260d31a3af0e700c3e977de58356920a572f8d7d26def5b1a195007354e49c4fb10fc90911814d9da00c0a72c0197bce2433e8a81582241d598ac3248d0ce08fd447d84855cc91a61ae4aeba508169caafa694a95f6a147d58caa8f67ef03952a613"}, {0x68, 0x109, 0x5, "c530520cc23e98a43cf60a2fa6a3a2b80389aae0e9d4071a439b3179010cd5edc61906eddd31da38172d11efc56467ec64b6c412f23ad3230617638827e40b09ac0ed6a5ddb16dcd848d80750aacd270e8971c15d6e3"}, {0xb8, 0x109, 0x9, "db72f38db5a818ecaebc364492f7a497f5fd55d4ee0d44ff62595b5efe78bd506122467302a2c7224fa1338d939f3d72383a203cf455302d323464027fb3a99b9f592a5a6241bd5a7ca9afc9ed6c47d151c93f470fca45d98c9430744ad7776ca2ddea74c65d73c3e5c6074a1f0265622e7abee8906608272bca5b1e9384757bab0b0d15b161b3cf3a967cbaf73a86cfc1d90401075ec77bce394ba3b09fb336b0"}, {0xb0, 0xff, 0xfffffff8, "4ca5feb4c6db380d2f3695e1167b86c7ec6a66afebda1fe300d38a56747e199e5fd70ad8a7d97733000933d0ecd4a410a8f3c8e9e9d05f49255c09df8b4713d64124a8f05430ff30ddca167cd513d748f11a6d2a72fdb49a251a020e12032f37ec90f53d967235d1924a763994e330975decea2cd98c98e57baa06f192ef4099c07c60f3993f84d4908fda6e8acc208d2ca0518b8cb0bd853804e275e5ea"}, {0x1010, 0x1, 0xc7e, "c954b6bc3ba85d1039cd8b982f43eeac3226a32813bb001b7a08b8dcb45a96cddaf92b78972020c4fb18001837a17ad4ece64b6c41f665bb97cdf74f3323e30562deaaa2bb527520092553e35c3195dced59c3eaed39b012071a4d284f49844b1d3366afc6ab5717bfcd41a95d4017dfab643a98df52af8ff4bccc6af42ad91ce023062433820d925b5911a426d995b2923b0052fcda51ea47d92322065cb85f9497d56a79be907a6d20a73cc16f756f5273df427deb93d270b41dde9d6f2d3445a9447d3044c17dbb569d6013026c828e67a6d2f6fcc4d84fe39d9f8b204ecd0d08f577677dcb850d0170e56285fd5d5ffb0a422a39fe113a23a9c69368378b89dabf3a1872820be8a3daa8cc3013e7f6868bfa4f334cf506362360873d88ed0e8b8101268b79507d9d4f2bdf5622b81d7b2cb90b365e93fc36383c0c8dd2a806204b4eebf4a0005bf0f852b175e13e810b8e7490279a4671d3649bf227766e68828a3834c5b01db5e504c2efacbd4730e33bb1cec810b945398b2939c3493f0b75c0592c64c82b3a00cae21c56dda85676a0c01c6d08dc53345e12ab85a11081cc87a4029c8e879a1f775ddc48686b79a6bd74b61ebd45414959b46cf8045785cef9a62fe85143be4bd400de70fa84a8c3c2e2dd084f992595ced0601c363d6e620cb67beac4adc21f43e6c4e7292e59541bcbb88b25bcda3d01a1c22d9b7a3273d2523445a6298337d743ecad6b459e8c0af727a967bfa25ad9ab3a16a64c7bd9b722573b1d79ce92cf09db31447a80fdcc1ac1a3ec6ceabc2224bb6e319042ea9cb9e5ab87ea1fadf3bd74116f488df1a474e45601d1e776087f4dadbcaa9237c8c91cee37d314fd6c94dfe1d3a8940baa9ef434e02b256dc1b91d857997405c5bd2d2ef8c0cd14551c2cbb498352656e10150911f5ff9324ffd06005b408701195b13918e1202a618ba4340618f6a45b674ddb3af96a2e848c6a66094869ee056841f0d357c1283f2b6f584d8afbbc067d9f9df7746ff8bb6c92ab78cdaa7aee8f564ea9aaaf33639f4aaf5cfc9786fb50890ccd40b87e6414a427d47bec52fbf9589490693dd817ac210389ceeee11b5503ec71817dea01575b219e1b1efe20a3a3be826231540baecaea79934b421acad1e1c146c5d6b315a2929ff5182757533978d29f96e5aa184a9b9cb918b4d2dc7f3e4bdc20ec8738726ac9cf8234d2cbde76662e975c11fd4af6094b2311d3217fd69e33d0a375df3d267cfe234150dd12a6d855ec87599a0103f3e97136c1567083182894209825e4f9e5c9f5571a4cdf5f0927a50f1840172e73edd4c1575a982add700e667420ae2baafca11f47deb398dd0657ba7aa377363a7c569d992254c2fc67ab69dad2c7a3ec3e3257b19933dc10bb246c96dd21f0860e350476f04636dc7eddf5149e5794c065095ff14b7a51f546f2bff431d92aae8c16483a375b3478e47dc3636e6bb148f22bce8b8e538900ad763b3a1f4e6ac9e8a74b2c4e7438a824cb9e3111b09e5e40897c0d82798e3cad68ba051f642535859a59e402ebfbd49033670fb64b24534fe045ea0610c9a0d40f9e60c603491f23a852d4553664e2504434e6c5aeb56ad0f8ce84089531ae2b1d0d940382516e14fdf0030cf7516da701aeb99550f41cf8181af26fa13901ca23636c7f770bfe6e990fae68923f7c279f15871d1ae2f92d01515df9297ba81ecfd52fb21ecb56243d5bc9271201ab8f6d23c61c7bdecfbe721c5ac6514d93c98c0086078e01274e939077d69245d2104e495c774d37a49e7e469a28296f280ca94f70c8c26dbdb71954c74f16b54b5f65773c5ea7e263087a1bb07c283e8c3a1cacfed2c6a93c44be223c1b2c5b0d60a621a7cccac728745395da729d2dd357582f3d8bb11d8ae5c774dc969f46dee51bdcdeb937489111d886533ca77c5502685b0330b9c4f34230fbaaede2825b2ece10f5bbe7a1642e11d8f68813c8d723b45fe3b1b01848b613138965ea56787401d02346a62256764c45533c75c9e0f49cbbc6f430fdbd35aceaf7619ded0522b6baabdeda40cb80937bdb7cdf086e1373a112d213142e2c3ee472ddcfb7bf88b235b46cd89bb979759e38dbcdfa678816b6cdd7106fb840f54362cb59697627ea14367b0173cb2ca5bded47359b6d871f669963a5b115896fd5a1325306ef26631d602ee47d5a5ec651238ad7f3bb9309e01aa384e26ec9a6133e053f14a637a3f77fc676b2e76e9c6fcb7ff73d1621cd4d0ec9cd40d56d88ca9620b969acb15c7ccd851071729435c8c046e8848dc195100eb7d3e5c4a76a02bdbe611060d2d5dbc96ee202c71f10bc8a0e76e33fd159f8204426b18a0b793e177ab0cbed92b1e56194400e68c232209602e426f3e13e16ef876bdba7e0d020483f384a6a145b9c621228843d9d7b96e1083b4ec104c11770bf17f96473d367c101d1c158a2586a76b1878df516eab2ed180f7de2dc96564936ce46b0a779789b202d3ba17936c04c1ecb3d57c06be7a313f45b23999b5683bd76ffd2642c44167f86a1c30caca683a446aede26dabdcecaae0b15af0b92df8eea4aa197ba9f88459c838328c6dffc96725490d0d600d98f52d2de224829ff0dd7adf17b0f14365dc5c94d647b19c44bf161ef53b422f2bf8fe1664600cd458fe2de288be90d07d70c33d3f338d17eb69a46fe3ec31a7ed5ecfd4a8d7fc4ae80181e4775414cd7a6597453e5f2f1c4eb1b5f25eda153b0a498941345c1ef6122a1cae430470eb72549c30c1fbe0cc026c00cfd8067236cefbb9d5cd27f6ecd2be71bd66e992684d39a966d9f25c6d368508c17764cd9efd4caa8e51d023c1c26d9c034083a7418d77e87e1e4acb99cef6914bcfcecdcb510ea1e203e250dc47d0c886304bb535940f0f98dda5447256dfe427075e007c0e577e4b536adbf7896c874cb0d1b4d8b9e826d93d7d4bfffb81a93c41725f37b5630041b99df94a70cf63aa5862438cc22f8c90ac8468ea4f07192ca9728ec5b6bf933506ccb048d6a0d16fb4f29555555b66f07c95370fc2a0d4d3cfeed1c87efdac7d6ddd353850398f900a441f12fbdfa8324fe74ef9b2532ff8ce3e50ccccee37fa6112301cb823be0bcbeb837747a1e35557fb28f648194146f29f907559fa9c784a12fccb4941c94a4579324d1cdf01c6022ae38ddbf2eae3ae72b2324fbc6da67c797561afa29ea9790b46454a090b84b96f263c05c3532927628c0770cfe7279200b9c4108cb10f58d2d350bed6b54228bda971fed014a25eeab9c6b849fc20e5ef1c4f64d5752c653edb10992a6d0971da124610024cd8bb5c008559b0c753a2a2e2df6bdfedb4b4d8fc113a881d17d426a1ba3723a5dfb017dd75cc08e2c62961eda3c1bf05406f6eb4f6be21dbc3ffd035eb8c408db3dc5fcf8200350dc1e136c32ffd664aed4e79e756224635de09dbddfea076839d9e6a52b807280d8b57d1873ed62c3347a8bf82b6a829820d4112ae74dccf41b3460d1aaf7045b748b563d081f576fcca04826f0ee51c38dcacd729e735eeb1ad3777201fabecb4a99dff75cc8e5cd76237c33f2d98e701ab05ac95c3126495fc838e46518ed34b3fe0d76638662272962d974dfe5c0c00a92272ccbc31105b8916ca09a24b78ab826a1eaa7b30708d7b8bf052070062afd512415d53d56c97ed9133ddd85d44b8bed9949bd5b3ad068c5c639d8efd412fe69d6e3cb0d6fd2abd8381a44d20db6b21f92503e98bffaad62a664d7284dba0c06b6ed44382a6e60d9f6feac24e3d6d2f2edac8bf58138d3e859038886a260e4a3e2c35beb1a7a38b5fadb09cb92287ee7b03254dce0320dc00e1f715e793b8ba0fbfbcd646ef58ddba378539753b5e88daf15b8514ae3ef6a6db636f0bd73634dded739221ca49ccb9d64bee0b9199a5bae2107a20c57fbbf256891cff541f0391ecf8271fbd55a6a1888f0b1bcfe162bd36c84ee7d16f60e706068ef27229a23b09ceaf52a8686435be0da7f9f8854abb1e3e15fdfa5ba002481826824d3eaeac4dab856e1a533bed3e22a1c46d082c4e88a30cf5741511f8d77827e268c8722e00d0a19807d62defe86a0e5ee469c1e656324d3d870d839056d26324d51e93dea39701b99fa208c0e42c05bb81fc86af87be3818f8d24c4b7a8084edbc46de094020d8c1a4ec489a851691393179b1ed210ca19e9e5c57645cbfea25d7395c151cbd5c7173e3d1f4dd56c31dca59e21cfc627d964b30c84b6e2e445b50fe5d580fdce7c5a2621a56755e63a51898176aa11c70f96cb79745a02c6d34406fa38197e1b0f0a4631d25440f90450de076d5182bce545205fd65243e37349ddc22756caba51d2985b66d02b577d3aabade060b8ac4254f736de7a5ccf2c431d53222e5067404afa792182368c31236f7dbae22193ae2467d8afe2c6bba88c5180ed8e44bb5718a7199a03f2907fb2ea8a94a953837c40a9d04c53de7c61a5e8d8b34b213635d9810234d99f91edbcf5788b1891ec772461a2df812ec2c686b570fc70ddb93a5b0e5637f2853dec8a57b2072a515d486c73148ab381314d36817171f29d1e29ec95cdfd809a9dfc590f933811806485c1c4a0e37414fdb9fbe8ac551f040e5247d58cf3836307c81c8802c3721cf35fb52e1e7ab8efdc88ab362d744a060ce189cf81745f63de68fbc2feaa6a6e5afb4108063ff1d59f724fec7f03591ef71bead30bf35eb5db3729225b714d0f1bf535c1f2b92d171c14e0adf98cb799dac8e6e1b2d443393d7845ed78f14335f273a836a9ae9a13f6718313a88c7a74939f837ec1e128d38868a6a28d644a1323387e1ea589fa6cd1b7924d1e3b218448be02d6fd3c2d2e5e1bfa0a949aa72c8105eb939126c65bf7b6b197e04d65d0e8de1c581086c1bb4b09a7097a6976a19d008bbc1de3bf75035479118aa204346aedb5df42031164671f83c2afd6e52760e69ab4cec36aa6dcdb5e323d8d6181abfe8fe240af364470a5d9b443a4d0f2959def6c9a449b8bb1d39c7a7896c58fa90d9e89b7c6cc22037fa04654ff85041fe6d75f35d7304e063bec91844076403562297e1744056e077c17ee1e3ec980f85bdef757c2d632fb90471f07ec6f1b8b762b57775a0f03517d9e6224a3ae8ea9718460661cd71a1c818f3025827f5e350cb9da190def9328574f8a810a1f3759d8cfd35524250c56d23678c9e42ef46505c0c97585b551da1c63403d8ef3ddd6ada549a57788ec4a91295d2cc2fb0e7ccbf064b5135d429d1b263f52d27f097f0d35f4f8035d7d63d76b27e6f8ae3208b5a7954611e64fe4b64ef3b623f597b0bb97961ba5e19dd61cf86c85eb081b5d4a779cf9a852fc8489d0d6cd561f5df8c05022c1d1ddf91af76b4aa0c4728a3cf09c35a49cc9c9684c3b4e81a2e822d80580a3147b47fd6f49f121b8479ca32e0c7c954cc661de4a6f3b7fd9a5d0dad60736da619b690327f364c4332d42c7e330316bfadb25ee0b081849d279f9526b40a439d23049eb9bfcb3cbd66ea9ab60333115d4c580b57318448dea9ff0ca497604c00a0ad38f056833ce8dda29064344abcbc6a3da0043700491ea16f34af9aad7c382929cc166caca5cccf518dea6cd9f681df8a0c664808ea24e6ff8fd821502aa035f2753c4203ececbdd470298f27c07d620e6d5e61a79e89c310bd16a86c45d2f408eb80787035d3ee7b84e45c38284c238c43fa9d0179cf73d07892148ee08c3b0045aa34621c1242336f83c151870b9939d2"}, {0xc0, 0x116, 0x2, "8acaa295401dd2de15db5e085e753009dd4d2b625dfbf1cf31ca108ad7f0d99b8b14b58b77d3eb998a178fd3b277cd955f9777997dfd9a8f1b7a869041fd855c2accba09656e7c1a78290d0a809926009ca6bf09e524d5b4c4308cb6b62c992378276ed150386e15fa9d8de60d0263c72f42c141f68dafb2d5651fd576b1162123c039eace6d5908a8f0c8e59227ec125024f2d9195ee4f052cef006b73c2403b2df574f502bd47f3c0a42"}, {0x40, 0x1, 0x2, "24fbb13babfd8db0490eb68c5c12c0b3d3db81c8343dccb3570e73b5039d2d4a268d47ac730dc22b59eebfb0d380"}], 0x1390}}, {{&(0x7f0000000440)=@nfc_llcp={0x27, 0x1, 0x1, 0x1, 0xd8, 0x8, "40700f0f06de9e7ce52598ec5224df2cc0fa3f6937cd513e9e62d980ea823f078a7c3b5dc055f928c00b8dc580155bae3aba3f1c88a6f6edf0c99203d3988c", 0x19}, 0x80, &(0x7f0000003000)=[{&(0x7f00000004c0)="20841587a6fcf240cf60433c8dad1a7e0bcded7489bc1975c6e0b50580e90c61eccdf3d5ee34df62cdf737eaf3ba63d634d55b77d1280de5fe1897f302f5e51938e36deb49af1ddb8d4618687ab8dbf655ed47f677d31eaf2c1034daa16e405814102baf5aa75c59c71ab34258817a3ff0bf9268b71f7b7fed24899f1d157e597349c74f61b70bdbcbe6d5ac0062f2", 0x8f}, {&(0x7f0000001d00)="2dc7fa619239ed79435f4f16c5c8b531b20ad21999f5f757ba448efcd9957cbb0f23384d6c1a4984161da95c5a87179e0416aece71b7a567618da23c405897f6d334ac7ab8d96ca03fba234735b912cf6393cd76d85e3a256cf9389da15360a197ae7f65747fa5b83820604c53555aa325ee67093acb1e9f08fe2fb190575ac21956a478da081c2e69a1b1beb6f7cb36304b707a8b4a3fd76a8cf65a849875a2586aa8d9ce697a5ccbe961c150c26eac6ed9746cb8286085a8d9f188510fe5f2ecd35ac5ca96049a519801a1b8789c15f72d1b4d87e2dfb9c6eb073a92b97f82e17ce8c9bd57f65400c044bb49", 0xed}, {&(0x7f0000001e00)="0089f667d150e40dfa00513437a219ac3496bdbac0b4cc93cb67d3ed7543e0e2c64725de51e408dd80fa9c731977a80c800336a798d6ff3aa397276ea09787373a3e4833fea7c64711c767b813e7e4295eb7ea895039ebe23315e4b1aff65c35241d5b3ac1644d7a626b131206e68c939515e4ba840b327f2490b17defbc2d9263a7d896c20cd7eef26bebc0a373f663e396fe7610196a9a842d971b03b536878314960eb0a8595acccc7b32a83936d3c1ad", 0xb2}, {&(0x7f0000001ec0)="e14368987519bbda9af423dc13aac5627560684d957b6594e84e2342e8e8217dfceee85361bebe187193fb7a92d04c0599f748d7de451c20c4468a", 0x3b}, {&(0x7f0000001f00)="34c34ec294bf47d4149b7f867358d0b1c82c8b4f2d3ef47ba8917e7fdd2ad2b2034dd0697b01fcf5364d6f8586987d46db964dfbe4fb4620afe3ca3127d83e1a448d7ef53cb82269dccb2e88d4bcdaaa93005ff0b37cfb19a2ad915619a0f15dc4b2eccb4fe62fdce5118630ac79bf6ff5651c20c18e3477d66c9fe389fc1e7eed74aede90dab281d8dabb173f9d682f7eb07c63edc4b28c8a136c773cb69bf444b10c90ed0b9bc84548ba11fa7a91646f2eb580cc27276ad8749bac0abc2f8e4ee71d499914ef13b1ebbb099a668e245f2c7506b061d113ba0e3b3b8bd25c781f44072e9988aee1cf", 0xe9}, {&(0x7f0000002000)="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", 0x1000}], 0x6, &(0x7f0000003080)=[{0x70, 0x112, 0x7ff, "aaf9348bf82088098092136ddfa095b9e9f7a6d721d78c8bc68e41ba627829ccf3eae26b1d3c108c3cb3558eb4a79bb68c69f7abcfbbb217dee0cb164cc85e628fbc20e89a3fee6bb077efb01f43a0f2c7ca30182c244c7e2f"}, {0x58, 0xb, 0xf, "c0cd498fd9d73e5e934d4805da6d23822609850846dc777a86a4f8bc73d4fa000f4ffdf1dcbffded60cdd13caacdc569a6c30d260acf4f67aa05335d2e7baed45f481227c5"}, {0xd8, 0x3a, 0xff, "f68789a0b9461de05d42cbb8cdd0a22631754ce24968eeb2d0f9b84f1097a9083fa718da72650fb858f585c8abf9240467e410c3b0b7a45bba96e319698d9dc20ded4909d94e23b006a8abdeba0c54589f1b6f832ac6d1da14e7f5fd425de1fc9aa06e7c5ab30fb7fa83c74fb90959ce42a1b6c093780431bf8d39d996dfb7fa7a8f57011cdb2c1b71f7a45e2566d19ba6bf22bdda380213192a57176212b1371bc453ef098626b5414258dc69d034c40312be1184be147120eeef0350e1458caffb7923f8"}, {0xd0, 0x6, 0x0, "106ff974913e1d6af7b62234de1f9a85e7de2579dde51bfdb0168174f35852619998887402993d35ccdf7887646eca56a1d10949c23e7c56095ec4dd0595acc505212f49d5c4e7d857d598e7a344b1716788ed65f998f396dd064311f1c9cdcfdb29e3d830206f0cd9d2a618744cda3d5cc44adb4045dc92313b27bf6f0befe08d0ae48f31d88d6216a376851c60abcda0e61bfa882c7afda17a791fed2eb3d583c20d662bf41b3837cc276cbf64366f6e3e92d7030d24edba47a513f9cf19"}], 0x270}}, {{&(0x7f0000003300)=@ieee802154={0x24, @none={0x0, 0xffff}}, 0x80, &(0x7f00000076c0)=[{&(0x7f0000003380)="8d9d67006a1bf16631239c23aae92bcff252ccd5ae4a95e0a8fe42cc08e61e2332adedd006a9f3f0dc5181ac2ba258df95ec276688e31ba44374c8417f1e3f21c5876fd18830b127b8a9e522d3abcdcfb9c888d0ec430dfd4821fd95b1e771ba5140fb2ba58ee2010467411b438c96b38a24eb61e221009d10a352649e4b2917d3ce8b2a76264d3e6d7c4f920cbc9d45c0c0647aca24f6855464ae43eedeb6337393e84feea8808719120d30d593222139856eec105409f56e869be1da5671d4b5d61593844878f56dbf596e2e53ed02d2fe1632fd44f01b2dcd9a32c92f84d8bb142adbe7d99003d3902c51f018b8883bd7524f5688bab17fa7502bbe7c866ddc8a17508ebdbb6db3b4333c8532f8b2672db8d68495e1c340450a9120ed470ccb8cf23b5208fda598a381091cc2f077f1744ea4909a21f8229bdfba86c18210d9107c7e68a5be48bfb46b6d9fa58510bc6c47918f6368b43bd1d43d3935be7f06d58cdbc0f5c934b38a6455721ab8a67f5453b93c2a4df7722555311e946edb3f3a206485db94b8b339458fd8a9c4e82842c8ffbcb443b736239f83702b57222d9fe5dd57af40f4366be52336463118cc0c1b5d5287e6b554f98a9494435d79c30b8fb8ae4ed05fffcd4a79e76f0336d9d7055e68492f514c4257411172045e695beb7b2b953786f93411ac2492fc54b4e4f7030c08489ddda63745c53cf2f6e4ff212d909b644ce3bace109aca6b66fbe66ea782674a1d84572ab859e5dec6534d48b25eb110df64bbbf2a7e4fa01c908e9a5966462335dd64caeec981f85fe5300725a79dbe0fb36941f2b356dbff3ae0955febb1a86cd3505be359fdb313ad246db1ad81ca9ad8d7f47e266505b0d2d2ab3b2556d57232f6576c3b903eea536d245a62301b2a49f3d180d4777303c866a0a948a07fd82c7c7bc4ae17cb8970971451306edcfb611c46722f3efa10ebb570d12065ad88163300970ba8018259c838c1ec3588eb1d9515ce212bf6e89eae6c71d9afebe0035132e9c41086d60565017b85b5889dcd9cd563feafb8c41fced5b59f221a8ceba778ff8bdac670e89d34e6ac8c8f62afead60cd9e85e2c7c53eb31819990d3d37f9ba9660b9e203d1079f3f0fb5cb7ddddc6590b46e8b1c4698045f64fcc3dacffee895903285b30ba6a8133f64af7c50ab6ba06820a333638805eae624f3db70395ff6f3ac3b7895231241da61f5b21068de11552b01b4065faf1478f440be0e369156b6e72d13dc50efd4322fc6e15b4ff742e2c07305fa211b5f484293dc628ae584256884d1444e5094e06e83f8d98e91b6a332787f5b728a3b5992318cd355980a8edbe00e5789030c7ea9961137a8973b1c34f80d7ac8175ec392cfb1073c734638f063522bf13f24c6e679f1a49e10a9288f8af18ce65be30c86dbec16d20468e55d2e56404ab2d65df1751f7d1caaf46bdf2937d03fa876e9242e45b397f6b50376221370b0b9a8052f990a01ef883196a4278f7426fe23c204ca9fa341fd8cb10a5520cb0e5acda2ed6c572beab121c5658dc4028be768a7b94279dfd4f7cf7f978ef33586510f912af32f885132fc9daa1be9df8f9b38b67c4a3b34bbfe6c7f4180369891859a3576ea9c6a00de8650c8a025fd71e74436758d9d3dfa2c9f5278bed6066c7b952b394dca7071b62af1d55c22da9a4d0bbf673bc90e97b43191d47d4ac6269d6248033fbf0c1b380e5ad9e90d390b3b5869d5ccc576ae7c503efada3eefc06e4a6076475eee2f49babd793ce9cc3685b92cc46941b950e90215d1169462d20952d0dc4cedb07e04f858965bd9bd4d6cb9213682d85f768d558473f4c5bb5c4e6bcf67e5f7a7008a196461f01d0a47ce4496c32fde1d307bd93a04048ddf9bef498c4bd1946d0981d8784d4c420e26685cff5bac16deabe37ece2c74079750e6a0219dd4312740a28655526f5421e89e7aa8ae682b2942f7a3a67fbdecf17ebe9aee81fa18079a5ca2dafa5dd6de9ce0fa96f941ba8b42967eb8d68bbbdca59526b8e5e1ee3899aa94b005ac225e1c5751ba1f14be03c068a9c72d4df145ecdc177da5294c21dca9095c939873aa754b065698b13de59d71fee587edb55e28ef6d8830b718057de16f10a200c4500b1fb69d0452a9e9c3a36f13424a81382cdb6627b0bd42d05b078c349e507216fd0d52e502591033587883d438a4b362b059eb62b747ba70e6a1a98a7c817f8dc2bb020e9f18ed241a46b319c7c42c0e396c952b10b4c46c3de9a458c4f581642b8efbd05837e87661627735a6a39c9cb0fcb65e647b192389904f4df75454373fc7cfd44fe387d92df5a5fc7775e004db90939a41b87a0aa1748e47ddff3213ef92809fb911ad6a05171dad202b18e5296a93e7f3507d954c645bd4469a9e47b40e3cd00b5fc1b330691a3c4ef8d1b8bf1bf88cad4e9d0f46cd0653d3172d70e1259293c7d05e081049185aecca2105200f708d41252b3ec423c2b795adeb37457d25e305cde512320d33d7cf880730db904aefdaced31bafeea5447f75151b75388add5379cbda848c9960b1e926a8b45f556624c1553b7b56d35dbd45ddce9e18c3b12f8cce58fd36e0a464ab614ffc1d1b8845fe070c6dc5042c56b1906283f2995984527e25453fff857f5958537d8e5fd81d35f8667b69bb0d918050d9f97a1decd13cca9fa0ef14c342bd0fa085ab8737ba478a9853375a17fc847037d3102766ba1fd5aa867aae825c5bdeddf3291ecc714d8ea6ebed8f5af962294f4d8659ff840a3f1988bb3278584e21ef3e642fdaa43c870255c6be7c9b931aca4729c496e4d867e006fa738611c0089c3f8c14149defe7e854c31412a8c398bdf62aa679defbb07dc532dc9943418a80dc6c260bc4e4068ebcd6bd3983f1d623883d5a6a0488d2a38449b5c29260cb01f79cb620069fab98739de93cf935839bf3cab5ee2752b6f2ad6a4c5b4b72a406ae0b90f46847923c4a5c4792a5390b6c5fb2aa1feaefd7dabfdce85666d7e9bd3dfa1a5a16c732c93cc1749dd5f1604560d07362313d6940deff3df3a244e31123e4ecd5349bbda1414a799144b24ad26b97aa2650a76b94ef065121ec1892b9a4683b481b8e8c03842ad37377edc00a5cff09670459c3e009631335fe95feea3bf3d4be6aad2db8b9c80939dcac7561b70e487fbe3c05a5080bc335e28b97f66aeab4065f5ee319648542418553d3f83eb01bcd363b49ecff6270343db1a8c2288a0299da4c810ce221172333d1993e9f094c316b96a746e7c712fc3265aa854f80b9f7a8919829609aad98e9cfd1ac379a307e005497cbe19be8d5f71a3ab3ab6447f71342917b166021d20936b9e973c3eea6b25d59c4398e34171aac79d70caaa274eebe0b87c9552157cb8bf36ef5b8c76dd3d2a1b745d62226770c9a24a4b63698339668d4a7b25cfb3980138129f7960c51f2f4bae821eede4ca5f246ef772fe01467a3d969f332a7d37c8b16ac4dc1cfaa89b3d13383a042ccc0314d88bcc716ad0cc03f49c470b4b65f6ff86459e0b5fb254cdea7de8b4be6ec5d0b0d4e3602b738d458ec5213bfba62b37b0692517e262509699413079ead5421d7215d8c8d1ab4d235da8ebd79a66700e648727996a4095609c814a96f6155b0c7a2ced3f06de2990d0da633be8f5d3ff1bf0417aed000819f23d410bf58f25c01284baece5de84cfc8f05ae81999fd830de41ee16e2c3b066adf309652383c78655a9cfb39ac8ec16aaf6b7b818f0d002045704a70dc1619fc17f27b3b8869dfb0babe8ce0d8f7b15452f032b5bfa988def5a945dfaea89064ee40da87ddd86b18ccaec0e53e42f3f072fc48417481251f999970adfec3263b64249a98fcd39b900c697d896dd52e092b81186343d15a21dfc2ef844064daf2e87b82309996093dd413f2551b8d69e29116fdffe31beb8a2a76496aa22cdc36f4d83ffd84d1c57d341da6d0ca2288d9467868f7c6d5e8ec62ab490e6dea4eb98fdc4bc0fa5513cea2d30e433d1c20fd1c14e761be6c767c5eb3e922c63979108c0dc263a27439aec630a670db329e6146625a6032cea9ab14408e509a7d54c5f0f49ec434251f0cae0dbb85373d0a287b5163d36bcc2568f91db2b4a320fd3edbdf2fa1dc3861f82ce4ead4895fac22a7f1811739a32c5853c29e922954b5cb13e050a3596be33f22741b7a08c65af6660c616df27c6fa757b61ae6bbdb868bd3b46df30811f1efc9c1e75c8eb640bb8d79a1535732c2f71d8347bab388498c6c4de9882de51ba685484628eaceaf5518b82e1b31d1a8a8b735d81185663bec017ffac75f078ae3fc297790e4e0c27b691e5677c5363c895951174f6b0736c1134ba535fbdaae74b9d41519da70dfea009a27b0b7fadb596dae33c0980a069de6d0d355268e1c4a5fbedf5cb00cc83f32c809688ed925a2d3de1208c172cbe092bf4c2fa35041be84dd123a9dbddafdb1c78e0434428aa7344778fc1b98d98b731248792f77465156382391de33f1d7a116c82474db53513aa7d1ebdca251ea64b3e6103dfab6b11340a87c17f81da526fbf9e9a1dd79c75e04e247b60f303926fd5f99a96ae1ca4452f0c6747c4636f74f35fc01083136601331c472a7b357ae09b52abc36e37db5a96320b265dd9c7c9e03a931b6c41050ca28f4d17b329e96f23f0bf39cea7457771a17547857aee84ac06e498526247c6dd676530a1b27a004b7524a61c749f3d7db84249a1161432cafe80655fc8d37a858567eb563c76583cac146c038af6c5f034f4e01ed97b4e3d0b671121947c1a92882898c43bc1871c68e3a54575abf7aafdd2b494b1258fab713058b3ca36acdeb7f24eb7769d9fc88895948112d7b428ab5183c95f5a05a7306e5a5f3a5053f5beacb58447ee564796b98ae8a1982e017ad1e7b04974dbf1419dfe6a5caf2a29042fa6cbe0d99c4c02d0ec0e927d51a891985c038ac8b8ad0cb65cfd3dbe7f70793e771ba211527f1113462005e1b4be7bb231fca5b492f21eecde98f363f543c8d746730f07ccc425c1414f6e6846b4530ba2b7298abf75f32876344412b715ed6f3da042b62553ec8803b75efe564c9652d93c6a8a142570e850d58e4cc3b928e0c6e277eae2cb4ddce22fb81d67dd143242d0a7b80939efb93ef69efe5457088b689edee16afab2fbdfbf5157038390d624c08addb6ee98bc477ddb1abd6c91ae4610b5e5efd2fb2eeb300f5777fe6c6f003d6770401ad3f8335a17edbae0322c01eda7bc673b0999502f05363e59c0cf793977646eecd0844bd505ef895e9d81fe95b965799eeb76920a42aa704dc2effd4696fd528c9f57099681d6e4d16a5b15e4cabbed303ff42ac212a140a88e5c7d8495c38de4b65ed88b43a05ed36c45d74092f0e2f405ee9839aa277e7d15385920d56ec76b6e3398ddc54eb67b3fb40eb6598960a91099d692d88941c38d2523910fc7a98523fd1b271d50317283b0de0eb74b2566c1345688a0e8d2f5b44f4ea0ba41db1d5e69392324b4cfe71a2be56cca06dc09f92987e64c067005cc4010d38d539d71ef4b5e41f728247ae8d177e73a9b192c133ec8cc0d088865aeeb5f5c24e8a0de63508eb41379ed0d6647b53cb3bfbcfc2f400bce50ddddffe5124adb68e5f962a22acae4ab1fd8c6825983a50b0e70c7d075c9b1810d9a77215226afbb3900eadf443a6c40ff79384001a763e436c5db1233d82c6e35ff9022ee14754ec0632d9e8a53651276970f5533d0b572fc1b149e41478", 0x1000}, {&(0x7f0000004380)="1d9a543f610b56ee22491f458e4e8c440729cbc0449fa61bada4c4", 0x1b}, {&(0x7f00000043c0)="b16e748138bb7897f12266d5f6d97045157f9bb01f440d5b26236ca987a2d1108d20ead24b5ad73c34a3d34539fcd49fca63cabccfab25db88715f0eeafa8a79b7b7912f2ccd30ef7798cdf227f6dcbf9032c6d6509f06399a2b77a09e2f2ad405d64caddb21de2714eb08a1474145708c0b1a15675ddd74717a3febb457046c18b46f13fb9286cf4bcf99ca56e36aacca524d67b4da119ccd3d0ac6e81ea1c3bbea3799ca71a1e72c1fd198427e3a4cc3e6a3c2", 0xb4}, {&(0x7f0000007580)="39e85406875df5d868093c799df2c2dad97dff08492df225714e", 0x1a}, {&(0x7f00000075c0)="e116e028d3356548b6c93c311c7b8d2757143143bbdb642dbbbd91d84d4150e541e6514c94ada408749a2e0cf87707c9f8b9f053fd4b817d80675a7a133ec9e76217ade67b6e7c48a8165d86d711e5ba27b9d1aba50dd0046f8dfcf47dd65e3dbbf0abbc3a92307ade2cdfbfdfe2c3949109020b8b45d67bdd37215cfc16182b1208f259185529fb6beafa711b1e5ee62e8409cccc6477a50d4d6429aa3138e3a5ab94ce23007bdd02081fea0e97eead8977240c745a3775c085a81585d5f295b50a8031520ccb3e079d69d545c757f71d15b13b629760df584862048d5f", 0xde}], 0x5}}, {{&(0x7f00000044c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0xce24, @broadcast}, 0x0, 0x4, 0x2}}, 0x80, &(0x7f0000004b80)=[{&(0x7f0000004540)="8eba8da264d69acb05f6ba3e9af763f0dddab340eab9f691203529a029b4", 0x1e}, {&(0x7f0000004580)="a2155e0d4023fe84193296082356c4266618a2fa9b5a1f078077f88e6a93046fd1970f560c157b57ae2fbf64074a64e4312ebd977716b2341e4261b87cc7fe27434878d7de641f6a8c6f1833c9858129d78f91246453ac6a98298ab003b4327db67150a1ffd71cfe87babc0c52d96b571be6b0cc53febc675e0a526881912350257f478a4fb8172611d2515e273c0b6e2b63d4472a13caaf1269c113e6d5a45bff7bcc3d13460298c4b149e54a98bee00485ce3f0ad54a4191784d397c546897f5c987ea7b3a0d6542d5c8ce2be912070e9df13eecdd8190b44070034a22b18bd9781d34", 0xe4}, {&(0x7f0000004680)="752b1527378669ab9b951729ba74af413e1a18253a4e88719dd21d5a05f9b08915214fa0df6d20d28008e09724f0a01c01b3fb79ebf429899e0e0c4ff42205cb15", 0x41}, {&(0x7f0000004700)="4fbd2b454d53e60fb18d273215acee91cbbaf66cae0377bd0c23bc1edc00de86015f9875a3ebe86b2d884dd9a0a248e7b024ecec5720b000d639e4ee5c89dd37e5d62620dc055842602f20c2ee4ae292f841f6acb19118bb4f97b7c878360a302df0f2f1313a2009c14206494653df0241d5bf0afd95213f94d75cdaa1ffb170faad12", 0x83}, {&(0x7f00000047c0)="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", 0xfa}, {&(0x7f00000048c0)="e9e18d2745a4e783c672ca8a6173aee09004b64ad1a57860e91a6a30f2e249658cbc46d8131e3c887d4e6afb56d652cd46b9d294d81cac1957bbf3b23283d42568ae40323832b1d3ee3d5206a238e275e32cf340352e27", 0x57}, {&(0x7f0000004940)="8d898300a722863fc9ac545c4cc89de47ce2cbc244fc973cfbc165dd314feed0b952f36b7835b9490ca79eac754714b7783404005fb7e0bacd2b2eeb61eba4375d287a1a6e9877501605b0bf958e974741f625d811a048a664bc495b278bcafea4a580765b49af84f8506ee64c6c8985ee4c2445359088205fbeb7cea0fc6e472e57d1", 0x83}, {&(0x7f0000004a00)="29e9d882c63c76a8c02460afd50190af54de569d5bd3ef8425ecc5429a23446a92051de5df8035ff02131e9e1b37b8b3ae09928efd7f88d6df5050016f389acebc955df8ab00c63b4e33fcfc2834d8f6161dd50128aad50500b4599a2947c943ff80dadb551b23f660aa9bf6f30842df23fed07fc6108e8b75eeefc2014f4b30badd5c9ae17818baa23f691cf97d364883ae8693eb20723c2847d3d1a375b9d850e48ac8b4670ddb704ea415ea0d65fb12173b1444a7eba0305946ca41", 0xbd}, {&(0x7f0000004ac0)="2f53b1e80c1e1e20c6e4d41437debfa9dc5564687b2e1be8922cd988e5b9d858d38220c6b28be4b56f5422e434a22896b865e5b7e7356950a44d86a5892a9a15e5951a029760fdab446f8ac25cbf0587bd05df23681295a3d1900ee93803ac64f6b622b8145d88ccd92a8dce7d1151c1824b4f12922f0807f3d54c6fa92220cb061dcc3e292fd87446b3d3bc", 0x8c}], 0x9}}, {{&(0x7f0000004c40)=@llc={0x1a, 0x310, 0xff, 0x7, 0x2, 0x20, @broadcast}, 0x80, &(0x7f0000005cc0)=[{&(0x7f0000004cc0)="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", 0x1000}], 0x1, &(0x7f0000005d00)=[{0xe0, 0x109, 0x5, "cf59e6ca576637589459d11c189106b716bf7b32c771441308ed194306250d837662fcd8e66759d9afe22c7f28ca94e2fb6738e45139c8aa59e35fa31e8bec418406845d4527c881128155f330adcbf700ab57b474cfacf1dc32bb34f03820b8a5fa4139245b83302bcd68b241443c23571b3eff62d7ceec853360fd3bcf62ec6bd96319fda375fdc436201caccf3148169e9337b0cf64b3a7647dfc150fc07b3114a4b9c20723ab3d846003ac3def88037392efe5e30b6abd63def10b90e9dc7ae368172b951f71a6a04901991551"}], 0xe0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000005e00)="a519074164430c44713bf29f7928614f76da87480e6a7be388fee4824641e473", 0x20}, {&(0x7f0000005e40)="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", 0x1000}, {&(0x7f0000006e40)="ba27cdf58bac624c2b4a89d564f07d0105a8a19d00a3aa43ee340f8fae9e3b7199a01cb8a1e9ba88552cb53f3570e04756d83f7e5272b33f066c01b6ec927b76d933e0cf3acf07a03a8c3865ca47ed924a117262338875016e11b64ac624f21be366dccd844fe656eaded17f4ebef3712b27864a30edaecd82105cc861b9d236546935ce91cdf443d2ac1127e585406f65a7c246b967bc11297f0bd7b8cccb9741cf96013e5e", 0xa6}, {&(0x7f0000006f00)="a3b69dc66ca8cc747e1081786832730f715aa6d7781696b7be86107753f1fabe1c41aab38c24b7747934716830c52e6ec0fdc22f85a14adc2a0954e202abc9e398128dacaf5b629eaa933bbd0f0f47fde132374e79cb0114f8df4d1947fe967958344ffdba30a15068267b91f79c5bd3e894ce43fc298412ce128ee37522bd593b4377798041fa1f085e996dd79504d6daaee7c5e094ec579d60dd1f28bf31b377790b329f", 0xa5}, {&(0x7f0000006fc0)="751aa824f8124855c9245afb8193b586f96ba0569c2b8e004da9eae0ff41bccb3fc8d9f5ec4e71f5d2b2cc5416334a552987a215dfd0bb19c5a71f208d05ea03491c71242c685267fcac6835df8013c05d7b4242e1c0042ce3c429df2c5783a5eb01ec9014fc54886ee192eb092b22f210b41019910ad6d1f6ea642dff3430afcd23b052d9dc", 0x86}, {&(0x7f0000007080)="3eee0d4591b304b0175e3260f784894112a965abeeee084f3bdb707c39adfef7946933292474402ea989742cfbb84eba93841de85b74c3404302ad68a4dfb99b0d688539b3d87697b075a80a2b06d7d82dd59d9ef80b69c411a2884e05fc58748f75e7266fddffcba31c907f79ce05862d597bf83c9d6b46cef964963ce6f6d86e9a6b8146f35c546ba65586443d93df9f884b7983995e28976c4301df1ac20fdc58881b71db5ce7f869c3b074a39daa12e73d355e8923", 0xb7}, {&(0x7f0000007140)="15c81fd7271b7c94b29b04de1ee41857402ccda2dea06176af2372cb2433c0afcbb7e32f16e22d8a4dd1473ae981b9853c766ae7335aed3050df7a564a795ae5fdc85e8ce72dbe4c1dff368999e59cb47e461cae5142de23734db4f75bc6f7d0c5ef7120039519ca76304230be9e5079398dcedf50b4955bd6dbf699f350b022f1a6a00a2aa8606bfc347f12334a50ba559e6362fbfa46c1f5a9f02751aa0918a66d3899c6d49a5c5b3ee9d5367318f4a43318e8946a023c2442890e879307602b9fc676b037bd7bd247fa51954b94e741622db53f2b276b54", 0xd9}, {&(0x7f0000007240)="5b82cffd9df1e2172627ade28474fd956871b67ae266bf3856058756d8ca1691e3ba81664158b44b7e4b92d7c7d122b6268372c701d4f9d34ea026af34ebd08b54398d3d4f5375226c03fa5df843d8f8c590d3164bf746e37cc0cc0e8a8f8e1279b25bae718ae75fb9e5274246832acf80d11c6fc4ce8378528f4ddfd923ea3ad2b656c1e0e69883aafdaa1403f4617555d6093ab286", 0x96}], 0x8}}], 0x6, 0x40000) [ 378.994707][T18688] BPF:[1] Invalid name_offset:3171 05:04:42 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xda}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:42 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xc64}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @remote, @val={@void, {0x8100, 0x0, 0x0, 0x4}}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @local, @private0, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 379.234118][T18697] BPF:[1] Invalid name_offset:218 [ 379.292118][T18704] BPF:[1] Invalid name_offset:218 05:04:43 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x300}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 379.398352][T18705] BPF:[1] Invalid name_offset:3172 05:04:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7124861d8bdcd213a01967ef82028dcece090000004aac693389844741c16d70dd07db0000000000000000"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f0000000140)) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @local, 0x43c0}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r1, 0x101) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @dev}, 0x2}}, 0x2e) sendto$inet6(r3, &(0x7f0000000080)="6887825c035709651f1197aed909b7956349f011ca5a12129abcae17b0b007a63712ecc1f8fb7d34fe85ee24346151ca20caec5b74", 0x35, 0x60010, &(0x7f00000000c0)={0xa, 0x4e24, 0x1ff, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x20}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:43 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x1f00}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 379.598923][T18715] BPF:[1] Invalid name_offset:768 [ 379.661273][T18722] BPF:[1] Invalid name_offset:768 05:04:43 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x500}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 379.811040][T18732] BPF:[1] Invalid name_offset:7936 05:04:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(r1, &(0x7f00000001c0)="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", 0xfd, 0x0, 0x0, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe7fffffffffea0000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) [ 379.908117][T18729] BPF:[1] Invalid name_offset:7936 05:04:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db3264646f070536e7b33a2603ceefc770b28d07b25b8207f41afe448ec02fe8dd5921b3dbe0bf4044ea35cca05a7369eeb456ba13c01f5bede361"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:43 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x2000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 380.005252][T18739] BPF:[1] Invalid name_offset:1280 05:04:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socketpair(0x0, 0x800, 0x8393, &(0x7f0000000080)={0xffffffffffffffff}) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0xab5e, @mcast2, 0x2}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x1b5, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0) [ 380.106866][T18745] BPF:[1] Invalid name_offset:1280 05:04:43 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x600}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 380.254683][T18752] BPF:[1] Invalid name_offset:8192 05:04:44 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x2400}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 380.457306][T18766] BPF:[1] Invalid name_offset:1536 05:04:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 380.532189][T18766] BPF:[1] Invalid name_offset:1536 05:04:44 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x700}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 380.638488][T18771] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 380.710704][T18774] BPF:[1] Invalid name_offset:9216 05:04:44 executing program 2: getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000000c0)={'nat\x00', 0x0, 0x3, 0xfe, [0x6, 0x0, 0x5, 0x3f, 0x5], 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f00000001c0)=""/254}, &(0x7f00000002c0)=0x78) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet(0xffffffffffffffff, &(0x7f0000000300)="f462cddb10e5ced8864cbde13c54979cf01159db9e56394fd5ce105734ebc541c1e2cb55a5bb6e2442db1388f32310d583c88c5697cce9220ca1e3fa311c025be521981f11e0df4f8ed99f9b3b38d616e2b23960262265613f8a61084e2dfd002974554877f1e6d7af5cbdfaad0dd3c74759466e0603501ee0a55f6a5d5434bef22f25e66f5408127eb298664214670b540cdbd7b75de22365095c1da328cb4679af486b12b0116d8e2e9833cbbb0570e48d138d8e5666959c0d365b082d13bd1b2bac39949dd7da5cd8d8bd4352b0a3c3da82be687ef5f2c6383b5bed20253107190f931520d1ac2f", 0xe9, 0x80c0, &(0x7f0000000400)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="3a42db4f701a030f"], 0x0) 05:04:44 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x3000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 380.868361][T18781] BPF:[1] Invalid name_offset:1792 [ 380.993521][T18788] BPF:[1] Invalid name_offset:1792 05:04:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000004c0)=0x40) sendto$inet6(r1, &(0x7f0000000080)="0740eb7e84e9cb24bc4580cef427c2bff104d8139201fb94ce7aca8de9bed55e598c0b3e80611dcb6141b62b8715e016b02e44c420293e6d0a72297b8ccd53778186bcceed2210333af169385ffa501cebb4043e9a0f792285c3927aa4deb03e0b8f87016d340c7e78e7726bad7fd42e4406eb84be7cc27f33fb8a4b4835a9b336891db2beef0a17c7381a2140bacf8963856e76ec28c574d75a3a2fc436bb7ceb21d154655c5a37ae521df1da06558f", 0xb0, 0x804, &(0x7f00000001c0)={0xa, 0x4e21, 0x44, @mcast2, 0x216}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="dbf1a7c2e73c1434ac1d9cef8907a016272c01db76ab7f73b097ff72e268d330c6a749f2fd288355ba311a8501928bf30560d1102b1c2f1f38c6fa6534635db7156f99147df5f31b8c5d7e358414b5a2423d363f712e059a01c12dbd872010c9fb66795a3b4aacb1914194a87c8b790f462edad71beee0a62c4699679eac293e6d7af09a55fd6b1978b5e17b4b7c55251efd4fb5addb9ff7308499afa727b045a487f879d50ccc4c5a692d117f125a84c246df2ab2f9ecef13ce3b7c30fad929e8dfec589dfc", 0xc6, 0x800, &(0x7f0000000140)={0xa, 0x4e24, 0x4, @mcast2, 0x1}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000500)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="4f010000006f0bc7a637ff85097e6c60d54cd487cb645e043d594e33f50a1da03be6830f496554a03462c210668912228d158fbf7108cf00000000ef03dbd05ceddb684ee9c8218b529382ab1143b8d40bcf7f3e8df0e388113e3708871a62e417520d6a2a98ed5139c91fd12c159ce6183ae5cedf282da4b47d1d592042f8e7fbeff2ec02b1316403e8971f9e871371bfd5886a944aa269e26bdf51d0237bfc4ba2b42f065ac3ef9f2a059e27fb98837842288f96c054ae2b189239ae4db3b5a68251da58b397dc0138fa353b34e2cc00974ef88c706ab74aad0df1b38134f4c3852dbe9a1aa17b73af3623645e3c8bc3639d4f010100006ab40f2fc2428acca2ec8935a9ae572ca7ec61ada804896d04165ce020e047fa31adcf670e08bae7346ec12206567cf1fe709fd6b869520dbe277b185dd2030d2f0e1a16c1fa075435e63da356025831c5886d5641cd9a387e1044093e7ad26d06"], 0x0) 05:04:44 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xa00}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 381.121115][T18791] BPF:[1] Invalid name_offset:12288 05:04:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r2 = socket$inet6(0xa, 0x1, 0x84) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0xe9a1, 0x7ffffffe, 0x20000000000008}) ioctl$BTRFS_IOC_START_SYNC(r5, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f00000004c0)={"32201f9bd01107313546befb6eb5c097", r6, 0x0, {0x9, 0x1}, {0xec, 0x400000}, 0x7ff, [0x800, 0x0, 0xffffffff, 0x81, 0x0, 0x1, 0x0, 0x3, 0x1d77d658, 0xbf, 0x0, 0x401, 0x3f0, 0xda, 0x8, 0x5c71]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000001180)={"5038bd27b116745563f2259bbf052b99", 0x0, r6, {0x7, 0x9}, {0x0, 0x1}, 0x5, [0x1, 0x9, 0x2cd8, 0x101, 0x1, 0x4, 0x249c9c62, 0x8, 0x7, 0xffffffff, 0x4, 0x200, 0x3, 0x9, 0x0, 0x3]}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000f00)=ANY=[@ANYBLOB="180000000000000000001d000000000095000000000000000600000001591a6721677962198ff711abcfeca4bcaef51e462d6c824c46735b1e0233dc5230ce4e339f12d8bce2a8a2d4e634e73937f844c78e283133440583006e9ee726d233cc285a2bfab6ae7b5032b7279dea299bcb20610fe32a8e9a2c9e42f0dec3ce05f38fe7482b2badd3868389efe1ac09877a402a484a617d90bf43bd1f07380000000000000000000000f913e751ad9e500ab07a0dfdc33fe0ca8cd53f28bb7a507549"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r9, &(0x7f0000005900)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @private1}, 0x1c, &(0x7f0000001680)=[{&(0x7f00000001c0)="1a", 0x1}], 0x1}}, {{&(0x7f0000002c80)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c, &(0x7f0000004180)=[{&(0x7f0000002d00)="92", 0x1}], 0x1}}], 0x2, 0x4000040) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r8, 0x84009422, &(0x7f00000016c0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r9, 0xc400941d, &(0x7f00000007c0)={r10, 0x6, 0x6}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, &(0x7f00000001c0)={{}, r6, 0x8, @inherit={0x58, &(0x7f0000001280)=ANY=[@ANYBLOB="000000000000000002000000000000001f00000000000000020000000000000008000000000000000100000000000000ff0000000000000016e60000000000000800000000000000070000000000000007000000000000005c7da6d7348d0dce2a646abcb9861b9ae48b5f14e834b4d3f23300c1dcb21aa9f5a10689a0ed4bb6e498f532e40dd45ea61bf82c9aad67d6c9612a3a2e522e3677395fa41a60ae6d4527024066ab2d5b506d61fcde40fc251d58774abaabd95e32eca992c5ab4bab3327a67f697289eec4dbbda39604e5b67dbb49c1d68bb12da0d3504b138d62b1ca4d8973a4e569bd6b8ff5"]}, @devid=r10}) [ 381.317491][T18800] BPF:[1] Invalid name_offset:2560 05:04:45 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0\x00'}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e22, 0x401, @empty, 0x9}, {0xa, 0x4e24, 0x10001, @empty}, 0x40, [0xbc, 0x6944, 0x3, 0x6, 0x33ab, 0x8, 0x4, 0x80000001]}, 0x5c) 05:04:45 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x3200}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 381.432001][T18807] BPF:[1] Invalid name_offset:2560 05:04:45 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xc5d}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) accept(r2, &(0x7f0000000080)=@isdn, &(0x7f0000000000)=0x80) [ 381.580529][T18812] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 381.624116][T18815] BPF:[1] Invalid name_offset:12800 [ 381.672123][T18822] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 381.748112][T18826] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:45 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x4800}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 381.801287][T18829] BPF:[1] Invalid name_offset:3165 05:04:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213f064000082028dcece41ac69d14aac693389844741c16d70fd8e757fc4e5dd07dbf5d6ba01d41b5f6d4e542864959251e10642f13d7de8764d3b1673a55f60bdf70f73d3a9bc9d12fa6844470d591fc0b3094d6d55d6657f9f88dd7a598e2c4ba7eadf87f1c7d3914f02461aabb964f0d30945b8b09404bc66338e001c71051bcd6be244579e1d7264ee972db945c0d5f85b76491ff5d40686149137c2a6d09ae54535bf7438e0ed428bad1ac011d35cf34b417a390000000000"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) connect$rose(r3, &(0x7f0000000140)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x40) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x1c, 0x0, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x8001}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x20000003) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) splice(r1, &(0x7f0000000240)=0x9, r0, &(0x7f0000000280)=0x9, 0x0, 0xd) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB], 0x0) [ 381.895023][T18833] BPF:[1] Invalid name_offset:3165 05:04:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x2, @mcast1, 0x5}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) listen(0xffffffffffffffff, 0x6) 05:04:45 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xc5e}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 382.062913][T18842] BPF:[1] Invalid name_offset:18432 05:04:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000003bc0)={0xa, 0x4e21, 0x9, @empty, 0x7}, 0x1c) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x533f, @dev={0xfe, 0x80, '\x00', 0x12}, 0x1}, 0x1c) listen(r0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) sendmmsg(r2, &(0x7f00000039c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="a3e02dec443c88994c3e4a15ef2c469d8bc105e4fd15c3875b5da743859e4321ef120bd64b791d9c1297f0d51fc153858ce6854cea2a9a4c46e845aa991625a19160514077480ce73c798dc5bb3edd14a9707b8a47046ba70a1c300e2515ffc4f12b00ced9f10e859f450aa1c6f64e1c90afcf3a1d2f258676895792bbfb0cd27838544172517d2d364a9d0aead33cf83a60e1349ce81be87caa009458963b070b062966ed33c72d68ae30ad04be953d23a39017ae5c35", 0xb7}, {&(0x7f0000000280)="1daf31b6b49ece944fdff4106d5bca828de97a654f262ccd1e7676423bfae25259f6ece029e3888ae182c1658daa62d65e784216435afe046efd84d111937968067e26c73b5a734912ce8a119f051d5b4f9fe2c302fb4d052507f579f318a6a9ca443095ecde7270f6b7f5375ad2fede4bd89c106f88dd9cc981c1f7ab2a3eb8946f41d0a8cf6e88028bb464765de2bb32d99cba9ebe18e0f5792e25bc825b433085d36c4eeb14b71a6e6380c90d8bb73c5fa313ad4edb505c1d74d2ae536e729443991b97642067e88db0cb6a84af21f61113d033e31d13d4f8bb8c", 0xdc}, {&(0x7f0000000380)="ad3c8029524f41ef78bf9fcf33fd11c06960abf53ee7c8da1958b66b14811dd7754d530864b59621991c47f18791775a9cf35cbc6e4f7d1fcbd30ed8bf72313b12221e32f29550f04864f99f40f5214576781faded45b627bba109ce7775710aeb1f689da233146efd9e37e07bba09979d92fc73fd20c432e09450", 0x7b}, {&(0x7f0000000400)="2881b7cbb444001ef86459f6d57c46d5c9e8f2f205f5469c2a4fd9a52a7793b1bec0510030213dd9ae68bd08552df21aacfc4a0e7005bdc1350f6ec735225486f40cb34720123a71419f45cc39b6b7bf09c0a65820b21909daad1a9b18832708246a32fac1", 0x65}, {&(0x7f0000000100)="9c60e627a797926ec0ea5e47b304eda1234ba6b3d3b84a18b06df5cb8f273872c4436e534b40c873c6d50873f7bf0667f9b26b03", 0x34}, {&(0x7f0000000480)="da082df17786c1f403d8f4dae732a8799a2063e117134957814646f1d33a76170d0700b22eaf57c940c8b6740c456056eca97bd81d0df16eebcf", 0x3a}, {&(0x7f00000004c0)="00e1bb2871cb460ad1b5e9f450bc50218e3c95a4dd203b98242733df56b8fe144d94167143e5b44dc3b3279cee5881c0886038862faa0fa1451a93264ac582cf6d18b841b81b41e8dfe61e2a25b4305c6790043d13941ec943476598d8b3d6bb8c263f86931502c934384018357f223d5147c15aa44f5c5229e41436", 0x7c}], 0x7, &(0x7f00000005c0)}}, {{&(0x7f0000000600)=@tipc=@id={0x1e, 0x3, 0x3, {0x4e22, 0x1}}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000680)="97d26d6f12382968e89f", 0xa}, {&(0x7f00000006c0)="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", 0x1000}], 0x2, &(0x7f0000001700)=[{0x48, 0x10c, 0xad10, "fd1b53e3681f19fba7d5165e2a2a9db27d045ef5f31f69c3d91db8c421dc2f7bb1f0ab6f93e2a823d7787864b5bedbde2727f90d0698a7a3"}, {0x10, 0x0, 0x1}, {0xe0, 0x109, 0xfc1, "1b52965165a2fb1c7bef7ccdd6f64eaf1dfbdcb4703b6e447d7b51b7c4a03d21b0755aa3d76f3823e12714ec1a6f0e3fd4b643ea28e4661ca117a6c9013301998de24b091bd807e3d4e8badb3d5649008858b93c4240ed1a72d2c2b2b6705101eafdd3c6d4cef79471d8c5cdaab0aa96bf2093d5a3e7229b4ffc6d31e0cfea507861cfd6cbd8ab898f97a3439958ff918560f650269c7a4904c57ef968bdb61ca4c57a35994a56f5bbb479a28099f3e22f4f2354e65584755894cf9d8730c490bd55e0094b1998ffaafc25fc"}], 0x138}}, {{0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000001840)="002792", 0x3}, {&(0x7f0000001880)="38a36d5c2fd6138e8e2ac1143f24cc757202cb1f4d1b0a", 0x17}, {&(0x7f00000018c0)="cbbe7dfd9df5d33a9bbf5365cd2ede7f8e70abf362a02d7ece84283a63508c23b6799e558255855c", 0x28}, {&(0x7f0000001900)="b124110a8a4dfd817c5e34674d2186a84316bf11021433b49c28bc78c136f29ac6009f31a4c412c03c7c7d9c35f168e8b73342006821fcf9", 0x38}, {&(0x7f0000001940)="81a2db2c5e4af7c0d7c7508260944ce6b190f90629cbaf79bf2880491ef2c9679a9f81f5100956e269fc4f97ccfad6df91480983547b8677c50d486248a827f30d91e2162d023ee1c7c398d6bd9f07c22d081e616cfab9339662e61ecce3dda732e9b49285d4be77da7c91cb81462bbc5cda1b7dc449d4ab5935ced4f5d10fdef67ef0786f84eec46503700c8e094e822ff360a22d8120ce1d633119a365ce51893b20f162bc4be41cb3a022f2d1d6a2f8d747ce4d322a052bfad371d8ca0d5d4703952daf52d815cd9182ac6dbdbf452fa214bf5115e0a0c3fa35bc906324810be0", 0xe2}, {&(0x7f0000001a40)="671ef4e738fc22394d44ccbbd3c7661fadb9a8d6d10d567ce6e5943d0a2ec823e9844f9497b9879ff48c55d2fd70b123adf914bcb47bc1beced8ca61", 0x3c}], 0x6}}, {{&(0x7f0000001b00)=@generic={0x0, "cb57b85615ab8faf8c9c641f482a99ade7787b331677f638120bb75514135a1116633b508cfcdcc86d1f6d7602c63981ffdb17aab97995f0bbd4d1bdfca4316a29bbecc3784f80f7b65f42306a7e986d5234b3a4e27bb9c90bfc4daf994c0d280c9aaca15b9e7599c18ad06f1574245b5397a809535247aeecc860e49ec4"}, 0x80, &(0x7f0000002f80)=[{&(0x7f0000001b80)="fa5a8a0603dda18a569e7b344008867876462e36c775cefe12c2e75a0b031e8b71cab85a6d00719240352c18ceb814a3c6d4f7e99cff439565a36fcb840e74e15dd99784d7ff13a24785e41cb2f6791fd743170657931acbecdb98286441b94adf861312", 0x64}, {&(0x7f0000001c00)="02863911724b1157dc224912b2cd2da96248bf039f0ab1fc3d1d0340178389f100bd27fd62034d80f4e1128e6cc5a2266365be7acf5ebfa7b4f8b0b2ade8a0fac2eb98157b7c0e0fd415320d9eb7f5cc696537da8e8a", 0x56}, {&(0x7f0000001c80)="63916b0a8ef6e59f8136bbccb1b347adb52b13ef01ecc7689913d37be8041e2e898374c3c34d5f77d3265f5a568a5443d494693057b0ef8c0f50dd38bd321036afcc815b650f58c31a1834277ab565ae41a28c73bb95637549cd78f8c50b89cda333a20952453a17d3be1c1c29e0f9f0", 0x70}, {&(0x7f0000001d00)="364be570f681049a2f89da471ef24904ea4a3f2dc5b633c0d2fd9db2daafae62d2a5c862d0ed2ba298bcd5e94af6793cef4d25e14cf5f20792fcd61a83573dce16a8393ea9db9c07a2f4f77e159b6878b5c68d7ebe43e982fed5c64260629e0f20dd09c6591fb10e355e2686cd39adce62332cc1d31c0e954bddb43b8e9a8cedbcdbb0c4e3463a2cac3503ae03606b050b0e68197a6379f48f094bc32f482df36e534b9d4c8ce125d598096c9ec360bbc27b9e51e6b1c4ac806260805144007a", 0xc0}, {&(0x7f0000001dc0)="05b58be7817170bac6a5cfd070329d771e668fd68a5e389849bbef296171163ae116bfbe4a9e5035a129269022842a1ad794e0c766e64afabe2eaf1fed6c144e93e9b11fcb4428c38d9a4c39c55af8d5b6df0bf529f683208351714591b3d7139f11647bc6576bc801ad3439b565b04653b86e6960e2a0434d5f9125b004651c24f40fdd4c13961a618c4e0f973b1719cc7ede07b5d55b089b45ea925215b40a23e361b2b5060d4aa79f39f923e620f1ab0ddf03cec12cd8455e1150b425f64ef8adafb436fa8c96fe1b15ad9ff9", 0xce}, {&(0x7f0000001ec0)="4a1d57ad78bd8ddfd14d731dd338b7ca61396619fe400688e032894576f8444c5a738944292318fd4db152cd8064a201b7a52b930b400a147801f7ae624cd091f04da163fd80808edbd8dd6f28276ae0839d6a6414629808ad4d5b33ef67fbda624c7b8bfc5298e357553a802471f18271a7b3424eea692848b124e3b1ba74c56610107922cf7d06622eb5691d0be762c52fe82ee7299457331df2a0f7c230d6ba2a99a2410dd0764350c1ad70fb14bc9c86e7", 0xb3}, {&(0x7f0000001f80)="2a11f193332e02499f34f7b22bfa76f3900bfbdc0e46e22187104d8379363eafa2268d8fef7d9c54e1cfd9162285b2a3c024574d9cccc8af82c19938829c8a9615223cd84d40024bd79aee9fb64632d0a71a5558e4c447328adb8ee724f9a2703ca37a39c528e460b6760e4bbb65eec48267ea7f41a92380be9e6b0b82bfa24faae537fb7fb501ad26761dc53a7671bf7c98ae05efb4891210b4d72b7a4d98002e84ef47dde97e9040e443fd92f96d5f25c751db40c9863b0448664472512305be36a7b810fcfbc3c2d834355434a4ae6abb6d492bd0b980bf29514d9182eadc9522d6329fe70794294df19bb947667f724f465c7f63b731a34696787438f377aef99dd47345d78ad3a89c63eccdab20ad58c01080a04351dc89e5177e6f2239802a5734a2683eb8d7661b43ad70ba5f32f398d220a254aff4f33355dd79f07ba56d589002017d0f023b300299643ccee475b4618951a51e6fcbaacbecc9dd4d32336965ef20db61ff09ba959cf954ab0b828e0d8bdadcee849ad7c000c172386c21a0e4a228c9142ccb7d6fd943eb7b9508f688afa5ab4fa5d425d1fc350308bd97ad5ca5e800bcc55bd12fd8f20b26dfffd16265b021365ba21daa16913974e706fada21b7c1cb885fbcf0889b743b030ce8f98591619ec4797d5fc85f75aec3e3bd64f78e1d8a11b077f2b18f026b6b71fab4a2c70e7175adeb5bffcdaafe88209da28f6fcab30c05931204708a8b5b064ed75497b7c90d445050a63bb81549f509e4f4325ab716439af691a03fa040e2590c9ebf73261a9d96047194994eb665118a7317658586af1dccf71e86c0f2e8be1a3d73fd92cb9fc21764bf5366dfd508e7908b9b4552667ed5c563bc6d592e0f77acd24163714c8c34ccdaa9f7d199117d8a282fbebd5eb0f945b365325cc36f3db06ad74cd6c604ff0c64da019ed1e144c8b1f082ea9374db182f05aa2313ef9221ed1b8a985342f6297a6348c95a39978a4911d8ac69edd90f0556bcdbd2853c8444387f6af46b3eaf2beb1e213a0767ae863e8814e23fb8d53a1ef14771e9ac1881a02e3ee9dcf140498f30ef5ab9d89d20584f55b9ab7e546d2dd0c6dafbdd6b16aacffb724a0563277549c202be5fd44f5b79a14179a4844ae923d0b73f35b5adb21ae168912c787c7dd5c31615f9f4a6549d730b384f4cd7140c9dfdc290ed2a4908cb1d279104eb9635ba8fbc315f15fdd03b6702afe50fe001bea0e68988d3dd78ce387efd45e89c3d98b063b1dfeb8a19c98d9039a4863adceb6a6b3220dfd824b1f1b38e73352e0aa0b554723f2e7ada8806c99d644833be7652336a966ed05f4e945e61a4f67c38dd8c79dfb2fd4e1a9352e9def07e256ecb5867c47267379573842aed9a813dc2de7cb628644e59644be76444829ba6802718c2b70c59d6e45c39b43bedd942dc89f4ce8f94193d66891018b4e44c706e30c1bd1e88bf57b4f17364c10f8ee114d6c1b51d952de2332eb763d2a1d8637955aafc43f036ed1ff31fa04203faf9ad068d1c36c3d238c3ca585b42bb7ae7e946becab8c10317ca4a5f67381df6d69c2d3b9f52ffb8dd560e5f2f2b028f77f13b096711c916de0b148bb7a9ea9d2529f6c885dabce28af3bc682e0f9e8588dd20f2bd02715311a5b65f9101cd3ed4f042fcf4de4a85645ed3cfbeabadfaf620f35ecf92e53cc045794a1e2d5db8ae12947f3ac3f631b323c6cd6a24c46164d666ed0325b1f360c0672086b6b99975f707ddd5f2eca226f5f4237d6fa000b49a864eb966933c9a2f2b4fe770a95d9c4451095c8b68fddcc077d015cd6af38465ef7886ef7cb0a3d6bacc06412f47953ac96a5848689998031ddf4c73c7654bbde65cfd3961cead4c2799f612fe8cf784b35d12aaca2fbe020232d8767c22eb401ef03934b8640076ada6499b8c4aabd643009668d919526d83f5ddbca64ac69d7728190a68aa88d9c95864925377d839f3fa683c612490804d8d2f3cf3d4c1f5e036fe3a886efc6b5c4e94a68b1b5a4cf336ebb1a8c5f085b1eeafddd9e14a72ed048ce209948d307bfb61c396432fb1b0b08f2fa7e30cfcac7cf9043d3db96db27a09c296d3aa815b44caaf0c619ffc86ca9ee3103c0c2a4df7592b3cf3766061730ff6d1c5c6d8e7a7b2f1a5cf0a5450dac1f8950d172236f4ec4cb8dc1b13968473f2f9395c2b55d631bac3e72c62f2695738eccbca3728a3abf7bf55b66092302ecab0a02f0b8748cce7f505282a399d846187bb32f8348bde79aea40d1f9d76141f04a1131a3cb66dc650befe7435ed7fce4df6ca8a87c55b2ee8fdb9db98001f1e2730cd44e1e7b7ec4b885f9d5e2c46ae384bddb6902c2b066bb6f12ee4ef3e59724f4484a0eecf3336ed81c783fd6dc20dc032c7c3b79050207304a10abeefacb4bf903be41827cdd4b07e77ad8c568c9be7ea9c8fab2763520d346bba18c1594686ef20876425e3a26267b0353755c5a521c766ea89546834953ec0ef44cc0f3621e1c289dff9276911e4b85c56525a7b36239aa7a6535feb9ceffeb31f6da7345652906c5521490467efaf93d1486924ac5c23f8bffaf51c27bd924ff58e092c4d8b3257af596591354dbd3d68221b6cd695232f05b76de7aa9fae78f303189e21ea5e471cfb88d64be95f28f9017d1ce1628beb5183d8bad424eeedbcdcfb7ef1cc85568e078b757d378245f04987b8c034eb232e5b7e52964546f95b65a77ce5980550873e2993623ba58bf79a0889315146b778654b55222da0b8bc3225260d37df6e0d531d9acb4948a1a027c8c6072d1331c2d5cd189b4df5a0c797bf3723c0b3f5f43e7adb2b4728652354227dd7073daeb7a119b8635748e63472de34a28c23b47f2fe0848fe132f7daf674d527a792b139bdd209b484d1bde9395bee09679f950969e9a21b4d9fae434f158b4152ff0d66595e87bed5a12a9d93de3dce2eb768c26f0756bb24445deed99f453977d929b1da96580796af304d5ef4e033ae7dcbe1f65d3cf2feef893aeb9925b54421523468b464f15f80e49becfbb6790cb7611c0b47bfe636165745f5c9c64928f5280285c7e12cddc9b274bbf928e7cbbc33f01551837ac17fe37ebded62afddcc902f00edcea081d81b9f169faa9c4b8dfd253fb50a5497638d378b801bf198bea5ca3c3c1b54a7e249c1bf4ff9944c0efbe8af20557838ab22e675cf0b14da51df20fba931cc592c18a47dc771c15ba72b7dead707392bda4553f67f9f676a50db45cf4f538930ecf1e687ab3465628cabd9069283872c325e1476d443d9a6f64abd6cbcf7d78708b76f9c959b7a62d964334afbc1ee6e0ad97f6339ff04341840bd2aa49d957c138829fe10c127fb01b922d944a73dc0f20683a8da2b04cd56231e41e2f92cf0b20ff6e120ef7846b176737e6c1b54a1f2512c0511a7129d04775c12286f7c79850ce64e2116527b80a4826716fd2ee91b31d59028cfbe0bfbc1eb5efdfb23293a72e7975c0f4d0e25e88cb7d738b700aad21d1d32800c2736df81fdf9892f42841f6a330a71e776ef4cad55b2b952d6edd29248770f2d80703c576701b79abe3207878ef2b5a3192bd81e498e0c6c71e523b2ac06f8c208132090c940fa34dae39777791d8dd646d85e2f636a1b9dd1d28d18ae4eb26179944e81a61f2dd07dccf9f6d4adf8038c9beb893847e73fffed2b0c921a6ca2b71091054d025f1836553f4c5e97db8c27e997709dae337ec773ee7e9dd43768baad3a76f5e2f82c0e7edc3fdf96e392a463608c08e3fd46cc9ff55e0b6c6141785317d0d2052af0f5cb90e50a42dfd5ca05c7e66369e393c0d674e685945a8e2ba5317f18c01d93de1a6990ca715b7e3bd6ddb8489bf0fa13b3745d80bc11536f605a50401cc89737e446bf19d3ac8dc38953ebc8bcdfc0469aca1434fa549adc9ff1d17536de971c89628e8c715fdbeab36152a9eb7c7819a2b1c574f1a2936faa5ad90c172f8e448d84395156a2445005385f46d3949297671b23f7940e2595eca29a6b7ebec27f1b934c67a8e2ff70757cfda1fb97667c9fb36ec6dfc2d3556cbbe6326913416b1791a8d403dbc84ae38e7cdd543c8af37ba835cbfdfe45dd032e66c0f137636bb8597629d1399af466864109796a245e6d92521422708a89ef21cc4900bb844e840f92f3a7e7c31bdc8762cc93f499fbcf4bf31e0a4714ee0bc3f18a00fe60a749ff72f647bb568fe5c80ac3c0fdde86e49d116af57629d55ef51e9a41c8e1ad22a9557e70355705e5d4d9bd5c706a8a89104bd0c0e649923ae5651337395846538018364b4ccf1a812158e87265c8b34e5ff2b65b2f6ad7ac9fc04fa40fa6b38c894821843fb0b9583611b044cf2f3817aba16cd263ca7a2f863559cf03d716b7d24e2d687c8514e299f84d24d094b052aedcc476d5626fadcde4ff59965698832742617b83dbfe2e8b05753fd685268eca3eafccc6e4db6b7357bcd889166e8bf2215258d4451d3b3291d1db8e0935f8d008c5dc33b32e42e72d613649e7f1576367ff0c25fd2575785913313fba717a90a1ac604a9fd4ace2d4642bac2aee3b1ba98bf9966efe857c60a0bd7fc6d396c89d462eaf7604ca5bbeedbcec0c5c62237ca84e881a8d35ebfe0298889480a280b5c2dfb1adab1cb6a7dfe84d66361a6e1b8eb096b14f592148cef7cbfa2eba3906ad91d978754c003a18050544e21cde296412da6a41b464e75b409f225927e90a0532d7ae1113a9772d79dc07137ed6c475185f2653ce1b4ff2388f4971e1cc06498203592405b40f2f2bbced1d12e03a4d2352c016d00076cf7bd1b0f84a499c34040ff2865807971da4cd1b12abc81c94521017e913cab92b516a207d89aeeab6617e6932c0d69d0f8f9e0e24c84538b0a7dca429ab408829f89cc687a5c62947c1df7a69e05babc22772aad2032364a4882994826228c028a0b5a0a69770e7a78a3e73722cec3c51d821ea7f2d0cf26e80c9a4dc8b0b653757e14a79efb4379f18d81209ae0235febd1cd7188f35745caaa3cc8a337e823bd3824935820e8c25d5c485bc124aac49cd5773432e2c2f4d69e8695d3d57c4fa16e48b28802d491fda3cb0c937d2ff2923214c44037d687a3a8adc94e5ec66d39de4669023caa6855b61f16138332e862c91d69cf2fa025295511dda465e9c8195f36f3b7c0497967c8e296cb5904f1bde22853c81926a2073b5c84bbc69b8dbecd30532bd4d34eef81c8b47704924892e2881d850d8dc5232e6924bccb924c2e0234f60d2a409af860a4b51f6903fe2bf4e354aaee728a5ca9ddda8f5e5d0ea99ad99399c41d2316b6c04fff6b9e598b2b6242c99b9c33f7bd05cafa4bebd18e0e256e35035d1cea234f8e7c3b86c9b813ed2a1dc56b444c415fd88820816663d788e51a930e1d5a74977796c07e3aee7fe7084512c9986bc44c20a3873eb69c9932b090bcb725efddfec33b9fb4481e72240ed4cfdd697a8f4c9e6b535d597b2b8a1efc5b940472ce836f94b8ccb4f21031a81ff3f59561c0db04b838102255226c090d5f9a7932b0ec76adb8077a286d9d68b1aa668a970e7d0ddd09dec90bb007cac268c989df822c6dcf4339732b7f3e7840882c24d4e1e705a62bf3c5c19789a62a457215e558b0b9800dbe84f7ecd4161410df12d0146211c516d5fbbb470467f934b1c2cb4bd2436b08c0375b7b4bf4502b8d62442825518cab0e53602d234addb836f25bee4021d8642ce4cb7ee071f2888e679aa465da4274ce1653847c67868", 0x1000}], 0x7}}, {{0x0, 0x0, &(0x7f0000003280)=[{&(0x7f0000003000)="e32dcb3dd9e84a92740dd569fe3bccd9a12d30836488a407f538d323c530b7eff775c5c48ab4125815fd3af227a2bb773e1e339c62329b2fa2849cef70bafe78e8ea3392b489d031243916eaebf9726978cdc79fd16a399d8f8c642f1ba1c9c3962fcbd07dc569eebc0547107b946b04c29f7b8d86120257b963c542e521b107b0d0c710b107457f2a8e07d227d4b7acc95b0734161e840b4eaf071eae4080a88d914668eeef148d5ca6a9b7b0736651f69c5c7d43ee09be65d8a36ebc2ab2d7ada1883edd39adc812fd6c90e17d08e1a06968ef49bde67d9236a7ce40ce", 0xde}, {&(0x7f0000003100)="ee3a135e83ab8486b7d6a20c5030ced6aa04af70064fdac332376c84f6985434672ea1b46d91756090ac671401e874c4b41864eb7222e6d3463f41d5023bc29386c5e23a88b43ec1b8784ef422df5baeb58da5a6e197628ee7ccdc2720897f30ab", 0x61}, {&(0x7f0000003180)="35d4788557c961046e438080fe51710a43db7961050fbd336372df715b7baf9d42ef8ac929122073deac023681989463a8ce75b92f6345ef68c72500062162afc7004e5590fb6d37af07663c856779c852f70a396ad633bb5ece023895aa2838319f834aa706232b5f8b032a90b7998eae7fea86033ad4c577de41d26e3fe3571a792364ce8213558c0883749a31433f59e5d455aa9a64b2a859fc15379b20e33041ef005583f6edb0282c869e4b538bf9e64fdba8162c2e17e930a9bffa837db26790e7b56038b3a512eac19322e212fbed24c07cbc61243837", 0xda}], 0x3}}, {{&(0x7f00000032c0)=@xdp={0x2c, 0x8, 0x0, 0x34}, 0x80, &(0x7f0000003800)=[{&(0x7f0000003340)="30de3632f63f659e7d014494ad00c0eb7461772384c4b1cb1111f2fba1ad3c7f23ceeda1844c26ae4b3c2a5a54d54f87376f0df9ff3d140ca2dfdf384249e4c39c4dd7502acea377fb4523487600e472f4228be7abdf064433a283944af6a3d3f27f6c283527f05170181c0298831b444f54c22c2dc746d000347c9371ce2f0faed622c5f5222133f560345ef89c3cefce13b669317ca0e14dfbc6f5597233872a1168350693b9533baae24b85d90f625c7dc2396a5422571c6cb23e673c909e07", 0xc1}, {&(0x7f0000003440)="6d59b6bdcc063943a08642f6845fc79f9569e0cd063c3d718670cd698a231d63667cc08c4ad2001bbfc4ff222c0c9ede2c1ad80269b773", 0x37}, {&(0x7f0000003480)="4a5b4778ac508ef27cf4ac8c1b4b60f3bc4797d3ea8763c51610a32c724be387c3f322e1e56dbcd9", 0x28}, {&(0x7f00000034c0)="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", 0xfa}, {&(0x7f00000035c0)="6fd50a26a924b2746e78545b958b80a69a8c3addc5c04db2d78a898daf1c2623f9d90697c8d255a1db5301483c702a3a344858993b889e7c423b7b721d37399624fa5a49349905a0c4032db6f4cd7021f621c3f0e31f66a4429fc989f508279264f42bce3c77352d991d9061068762b31adc822be8140867c033a5f92075ce146e53e9efd23bdd12e04a8ddffaaefe389bb04a85", 0x94}, {&(0x7f0000003680)="997cb942efc17f402cbe4156d8b70cb95ed562cefbbc67e84e3c8deb7fd817b20dfb350ec6f195b4e4a579a7a9c48d84ff7ada5ae7c357bc1fb88949d3dfedca1f32ffae54d37e3d253d2c04a0da973311f675287fc9299b5a814b7b50c802e15f8c30141274d3b62f7845217844b89b74a653c42664976b506275124898309480ddf9", 0x83}, {&(0x7f0000003740)="fb084032e55f3bf884844dd40497276cdc36fe2562907a25c6fba0fc22cbad99cb63a72ee1d574e59c7c5ac4da0f65fa80fd50a6c826cc941821c894e7e51324b0a66939f1d58850703573716e2aac787f01386e2ba4536cb8b2dec46095d5713a49324eec619c93d5951304fc1ee6f350fc4b6d73f4d5f4b2146cde1f1bd68b6ad90eeb9998c83eadb80094180dc6ca2d35e81b61237938951e9e7f297056205b7421f1883ebd3e5b134a661d0559c7628d0d8871036b86f2fbda6bcdee5d", 0xbf}], 0x7, &(0x7f0000003880)=[{0xa0, 0x12c, 0x8, "3005619fd196281283912034a6ee6798315cb4a437453a75edabb6600743a8bad7ade965e26ea69e6f5fa7a084da6a1cc997141a2be5fa9bf0737195fa189df79294566ea405650ec3ec2b1ff4b42440db5f300a1285dbc26de2ed89174c4bbe239e11676a156c26b1efd0f0478c8f41e8437a9fa45641f574ce9a499e220cfefafbdac99fa2fa1275c26c"}, {0x90, 0x10c, 0x800, "7ba6869d253152d74f806f3b1e2de62146c7bd296ef952d9700cd60fa4fb8ccf30ae8a7be7a452fba05ea203cff1c099dc46305ff06ec2b8bb108a76de830e8efd73b426d246c2d47d0b1725ce9677fc617161d5a66304dc24f9ade80c052d49e910407deae46f124b25a55976ac3daa4fbad299848f7bfca95a2bc1c887"}], 0x130}}], 0x6, 0x80) ppoll(&(0x7f00000005c0)=[{r2, 0x6408}, {r2, 0x1000}, {0xffffffffffffffff, 0x12022}], 0x3, &(0x7f0000003b40)={0x77359400}, &(0x7f0000003b80)={[0x80000001]}, 0x8) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080)={0x6, 0x0, 0x2, 0x7ff, 0x2}, 0xc) 05:04:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000100)=0xfffffffd, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4f22, 0x20000000}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="76fb2cb3e0caba010000"], 0x0) getpeername$l2tp6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x20) socket$inet6_tcp(0xa, 0x1, 0x0) [ 382.274920][T18855] BPF:[1] Invalid name_offset:3166 05:04:46 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x4c00}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 382.312994][T18846] device syzkaller1 entered promiscuous mode [ 382.371448][T18860] BPF:[1] Invalid name_offset:3166 05:04:46 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xc5f}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 382.518351][T18867] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 382.564631][T18869] BPF:[1] Invalid name_offset:19456 05:04:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{0x303}, "c01aa692d2cfea99", "5fc96f9d58342601046c176e5ab01e33", "d519ac80", "43034709e41fe7d3"}, 0x28) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000000)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x28, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_DEVKEY={0xc, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x28}}, 0x0) r5 = socket$pppl2tp(0x18, 0x1, 0x1) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r5, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @dev}, 0x2}}, 0x2e) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f0000000300)={0x3, 'macvtap0\x00', {0x100}, 0x7}) sendmsg$NL802154_CMD_SET_LBT_MODE(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x38, 0x0, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}, @NL802154_ATTR_LBT_MODE={0x5}]}, 0x38}}, 0x40010) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@local, @remote, @val={@void, {0x8100, 0x7, 0x0, 0x3}}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @rand_addr=' \x01\x00', @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x8}}}}}}}, 0x0) [ 382.720392][T18877] BPF:[1] Invalid name_offset:3167 05:04:46 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x6000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 382.797079][T18881] BPF:[1] Invalid name_offset:3167 05:04:46 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xc60}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 383.000446][T18888] BPF:[1] Invalid name_offset:24576 [ 383.093972][T18893] BPF:[1] Invalid name_offset:3168 05:04:46 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x610c}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 383.182065][T18893] BPF:[1] Invalid name_offset:3168 [ 383.240200][T18896] BPF:[1] Invalid name_offset:24844 [ 383.243499][T18865] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) ioctl$F2FS_IOC_RESIZE_FS(r2, 0x4008f510, &(0x7f0000000000)=0x401) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@delqdisc={0x2c, 0x25, 0x8, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x8, 0x8}, {0xffff, 0x8}, {0xc, 0x10}}, [@TCA_RATE={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x10) 05:04:47 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x1f00}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:47 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x620c}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) socketpair(0x1f, 0x80000, 0xff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x100, @loopback, 0x1}}, 0xa, 0x409}, &(0x7f00000001c0)=0x90) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020922a2150cac50b708e133286a1a90000140600fc020000000000000000000000130000fe8000000000000000000000d15500aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) 05:04:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x3e8, 0xffffffff, 0xf8, 0x248, 0x248, 0xffffffff, 0xffffffff, 0x318, 0x318, 0x318, 0xffffffff, 0x4, &(0x7f00000001c0), {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28}, {"1418", 0x1}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x12, 0x6, 0x400}}}, {{@ipv6={@dev={0xfe, 0x80, '\x00', 0x2a}, @loopback, [0xff, 0x0, 0xffffff00], [0xff000000, 0x0, 0xffffff00, 0xffffff00], 'ip6erspan0\x00', 'veth1_virt_wifi\x00', {}, {0xff}, 0x5e, 0x20, 0x1, 0x3c}, 0x0, 0x120, 0x150, 0x0, {}, [@common=@dst={{0x48}, {0x2, 0x1, 0x1, [0x0, 0x9, 0x3, 0x9, 0x7f, 0x3, 0xfff8, 0x6, 0x7, 0x9, 0xfff7, 0xcd, 0x401, 0x1000, 0x1000, 0xff], 0x7}}, @common=@srh={{0x30}, {0x62, 0x6, 0x0, 0x0, 0x5, 0x100, 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x8, 0x6, 0x47, 0x2}}}, {{@ipv6={@empty, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xffffff00, 0xffffff00, 0xffffff00, 0xffffff00], [0xffffffff, 0x0, 0xff, 0xff000000], 'veth1_vlan\x00', 'bridge_slave_0\x00', {}, {0xff}, 0x11, 0x0, 0x4, 0x4}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x448) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e23, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8001}, {0xa, 0x4e21, 0x0, @mcast2, 0x40}, 0xfffa, [0x1, 0x6, 0x9, 0x7, 0x119, 0x7, 0x1ff, 0x3]}, 0x5c) [ 383.703811][T18914] x_tables: duplicate underflow at hook 2 [ 383.725513][T18918] BPF:[1] Invalid name_offset:25100 [ 383.737595][T18914] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 383.759853][T18919] BPF:[1] Invalid name_offset:7936 05:04:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaae26e30141046c60a8be4d7305ceec1aaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe80000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) [ 383.812585][T18914] x_tables: duplicate underflow at hook 2 [ 383.825079][T18922] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 383.853989][T18926] BPF:[1] Invalid name_offset:7936 05:04:47 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x630c}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x4924924924926d3, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{0x304}, "28c65f9bcc2ff547", "d11f332915f54300fb4119e2d57b6aed", 'Z\aP\a', "00000000a30c00"}, 0x28) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c200046b990b00"], 0x0) 05:04:47 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x2000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50a70d970777a6214a5d99bd813c3dc824742feb1bc2bde732c4e08e6f7d0000008c780000"], 0x0) [ 384.119889][T18940] BPF:[1] Invalid name_offset:25356 05:04:48 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x640c}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 384.264164][T18947] BPF:[1] Invalid name_offset:8192 [ 384.354356][T18952] BPF:[1] Invalid name_offset:8192 05:04:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 384.518713][T18956] BPF:[1] Invalid name_offset:25612 05:04:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r3) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:48 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x2400}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22b1cb5aaa18de24f924bc3d3df2cf11afb54bd8170fd48a5f8869edb2f6107df5da2f87596ed95d5469010ceed606a5ac1aaaaa246c089184e6790f80dca02d1a19938bf521add9f3db9f7432ead62ab5655095f374d0", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) 05:04:48 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x6800}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd602092000014060000005225e14c7639682218fe80000000000000000000aa01004e226e0437bb03bb83bbf3aaced9e0d0f1c42bccb8d8bee31c0e8355d1df3f4f6e026721db739343600509c145d7e63b43cb1b89f05f12e396fde4ddc00afdba7700f186f6cb4a9d1231569c67b725ead08a7066c73c1ff73f523d2d4c6ab0d539582caada6163914c5992e1", @ANYRES32=0x41424344, @ANYRES16, @ANYBLOB="50c20000907800003a0bb980554e97f87aa60e2c6c82f21e0f12ea2f7776ecd3bad557548fbb80329347ea48c994406c134a706406fe12a70ed8f0e3c0347fda3c9005832a3308d45c9a014ccc885a4f1acb4227ba309eb0dd78f5c241de48cb2b5e1b83e31f6411b9c6ef7a28620d064f275859b62516f45a9a5ab06f6655e2e5e36748254ae2eefb6e8526a40bcd3858fd0316"], 0x0) sendmmsg(r0, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="9c7cd30caec1e81ab391d96517848d47c98f811071d3675fe2cd00fc80b1542c6c403b37cbd51c93dc2a7eb832d032b6470f97922f97d1f934c849c9a8113d06c0895b7e58d8ac7f5aefbcd970675c73aa8bb2bb9164f12e69261aecbafd21768da91f6c004cfabc594c4f35b4606a641ab4aab3d09b3e3cd0da", 0x7a}], 0x1, &(0x7f0000000140)=[{0xb0, 0x84, 0x81, "64c7d1752a4f288c721ffe7a0100b771e32de5433bdacc8308dbfe734fe867dba2b1f8296db26953e7bc3a9e3efb1c3c361f1d59f14514d0a6bddaa188fbc62711a3f3edfe7da70bebd1c69f9c762868f32e5a32941a2b159d16332a7d00b0bfc33839e975afa6d32d6942b28e2209383c5385bcb951f8916a48a283e50f49da8e36b522447c53d9ae5f6a0a939fa825b04c5166080a8413132c94"}], 0xb0}}], 0x1, 0x4000800) syz_emit_ethernet(0x11, &(0x7f0000000000)={@random="4e9a0d5553c0", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @void, {@x25={0x805, {0x2, 0x9b, 0x17}}}}, 0x0) recvfrom$inet6(r0, &(0x7f0000000240)=""/270, 0x10e, 0x41, 0x0, 0x0) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$IP_SET_OP_GET_FNAME(r1, 0x1, 0x53, &(0x7f00000004c0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f0000000500)=0x2c) [ 385.087925][T18980] BPF:[1] Invalid name_offset:26624 [ 385.103586][T18981] BPF:[1] Invalid name_offset:9216 [ 385.187144][T18985] BPF:[1] Invalid name_offset:9216 05:04:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000001280)={@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x2}}, {&(0x7f0000000280)=""/4096, 0x1000}, &(0x7f0000000140), 0x20}, 0xa0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000100)=@buf={0x60, &(0x7f0000000080)="571cf10bbb0429dd29e7337764aae6ba12049d552f60457f7188359f1388c051cb6a705fdd481a248c91c759e83bc1fafa1097f1dbc1bffa05ad3dba8370f7d62c2839ab7567e9bab55e2c99a92ea8b32c87621aa63bfe2629585807a9414437"}) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000001340)=ANY=[@ANYRESOCT=r1, @ANYBLOB="dbc2e64a39490d6cc367f38a95e2d5ab2b5bc962c22fada53146595fd8646c3ae957abf4e043928a8fd445598b994e5678b4e76af8c4fa63d270310c3d50d74ecf288f61630885db83c7e4df3b9b4f5ddb4c01589d1122c0299ad3ae23645855abab3c47191f9b42ccdda85bf0924481e70f30bca680ee4875ed373d48465fb3211fb5939ef2da4e6080d66beeb1f82091491cfad4335d318ba54e9269cc591d0580e40826d9ce4ca0353f52cfa301aef046e027f233c6d0ef0dfd2df0c9f42cd7b68721b1e25263", @ANYRES32=0x41424344, @ANYBLOB="50e2000090780000"], 0x0) 05:04:49 executing program 1: ioctl$FS_IOC_READ_VERITY_METADATA(0xffffffffffffffff, 0xc0286687, &(0x7f00000001c0)={0x1, 0x3c, 0x29, &(0x7f0000000100)=""/41}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) sendto$inet6(r2, &(0x7f0000000080)="8c9813e6d1096539e80201ae96ae2dbbed33bb1ed304b669035af0a030a3fc9faa784af0c4250dd3860575a73a725fc79f1d670f0f6fc64b1b38fb37e64129e5be8128c6b43fa82a5b8d768e3565ba22b623695fd3b12a13074b66a2711d15f6a1f1811c49843f5c7405b7b0f561acc9917e392afd6c3ae1e68b3aaed244ee8a", 0x80, 0x8044, &(0x7f0000000000)={0xa, 0x4e21, 0x8, @loopback, 0x8}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={r0}) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14, 0x80800) recvmsg$can_j1939(r3, &(0x7f0000003700)={&(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000002580)=""/43, 0x2b}, {&(0x7f00000025c0)=""/121, 0x79}, {&(0x7f0000002640)=""/4096, 0x1000}], 0x5, &(0x7f00000036c0)=""/16, 0x10}, 0x2140) syz_genetlink_get_family_id$fou(&(0x7f0000000400), r5) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file0', [{}, {0x20, '\x00'}], 0xa, "d6a7cb0780afa58ee3695b8c1ab44af18430e3be5d772a6091b784812a242188a1b23bacee12c79c3ac1adf0c4f3a11d9f2341984fb1badca6a0b238333d4253b5c9c3486366396b4ea058a4c6de05897f21e8409dfe"}, 0x64) sendmsg$nl_route_sched(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="540000006500000826bd7000fddbdf2500000000", @ANYRES32=r4, @ANYBLOB="f2ff0a00f2ff0000f2ff030008000b00c3000000b3580500093f000008000b000000000008000b000700000008000b000400000008000b0007000000"], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) 05:04:49 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x3000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:49 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x6c00}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 385.462127][T18997] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 385.514135][T18998] BPF:[1] Invalid name_offset:27648 [ 385.584465][T19008] BPF:[1] Invalid name_offset:12288 05:04:49 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x7400}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="4c0c048692685eb5a71a8fe2"], 0x0) [ 385.685027][T19011] BPF:[1] Invalid name_offset:12288 05:04:49 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x3200}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 385.885005][T19019] BPF:[1] Invalid name_offset:29696 [ 386.042147][T19025] BPF:[1] Invalid name_offset:12800 [ 386.147374][T19027] BPF:[1] Invalid name_offset:12800 05:04:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:50 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x7a00}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c208009078003138cbd7416600"], 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000015c0)={r1}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=0x7, 0x4) 05:04:50 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x4800}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='freezer.state\x00', 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000100)="f5b84c72934326f393d56c5ac2860ddf8515c74799dbe3d837a8286612b6727a1283079628906ed651e971b081a2f6919df9b6abc214b674b37b9dc46ef827d46ee7c91308f487c7ec0c16ab7c267df486ccd8f631fbeef8489debc61a731f4131fadab65fef6d8a7f535f00a328875122f6f9583a4cec4d30c758d03e6213718c33d58d33f6a7ef73e1988a3052bb535a139b84a8b9396f91b77727e83073a5e4103b5445f60c0da6892317c5e4c07a97a34571146c3d20bbaa6bbbf2255af3a152f59d20dc4ce1672fe1ee59acab62da67720435a68311f0f9694325b31f880c9de0a1659d80", 0xe7, 0x20004000, &(0x7f0000000240)={0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x401}, 0x1c) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000600)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000700000014000800000000000000000000000000000000000c001600ff7fffffffffffff050014000000000038be9c"], 0x3c}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYRESOCT=r2], 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x5, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x65f, 0x0, 0x0, 0x0, 0x20004000}, [@call={0x85, 0x0, 0x0, 0x6d}, @ldst={0x0, 0x2, 0x3, 0x5, 0x1, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f00000002c0)='GPL\x00', 0x8, 0xee, &(0x7f0000000300)=""/238, 0x41000, 0x10, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000480)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000540)={0x4, 0x4, 0x7, 0xb8}, 0x10}, 0x78) [ 386.558508][T19048] BPF:[1] Invalid name_offset:31232 [ 386.566335][T19042] BPF:[1] Invalid name_offset:18432 05:04:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00'}, 0x1c) listen(r0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x17, 0xa, 0x5}, 0x14}}, 0x0) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x34, 0x7, 0x6, 0x3, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x7}, @IPSET_ATTR_FLAGS={0x8}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000804}, 0x24000000) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e24, 0x81, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24, 0x7, @private2, 0x3}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r4, {0x2, 0x0, @dev}, 0x2}}, 0x2e) write$binfmt_misc(r4, &(0x7f0000000280)={'syz0', "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"}, 0x103) listen(r0, 0x2000) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="d2591f211ac4aa9a9a277823a1d177afbe22cdcd45a3e35efa7b39f0b4a4c5a139a731f0dd0d6127cf799bb29e3e35203be1027da54a1079134ddc6dc51528de9c1807edb904e372b9a963b8d16d", 0x4e, 0x4c088, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="010100000000000004"], 0x0) [ 386.642957][T19052] BPF:[1] Invalid name_offset:18432 [ 386.654960][T19048] BPF:[1] Invalid name_offset:31232 05:04:50 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xda00}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:50 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x4c00}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) bind(r0, &(0x7f00000001c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0x40, 0x1, "04a80fa6b1d9755697021d594b9ae2fd95d3af18e39e621ad1b708510c244c4dfad18f1914b6aa652cdcb812c2e489165f176e13bc72ad11520e808ebbac94", 0xa}, 0x80) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x3c, &(0x7f0000000100)={@remote, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2b}, @void, {@ipx={0x8137, {0xffff, 0x2e, 0xc0, 0x5, {@random=0x7, @current, 0xfff7}, {@broadcast, @random="a39a6a06ab2f", 0x4}, "b267a9e388fa98f545db7ebd42e8a66d"}}}}, &(0x7f0000000240)={0x0, 0x2, [0x517, 0xa88, 0xe0b, 0x94a]}) syz_emit_ethernet(0x5a, &(0x7f0000000080)={@empty, @multicast, @val={@void, {0x8100, 0x5}}, {@canfd={0xd, {{0x0, 0x1, 0x0, 0x1}, 0x25, 0x2, 0x0, 0x0, "a8821b40a0a70abb285c408e136531822fd7d77ecd2c32dd789faffe2adf453877ec4e4a249f5e222dba2c307f554977f5d2b974d5c65ae4d3cd231cd2d7eecf"}}}}, &(0x7f0000000000)={0x1, 0x1, [0x5a, 0x752, 0x15c, 0x335]}) 05:04:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x7, @mcast1}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x112, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000a2bfc4f32bc1923b3555dd8efb5626b37096ea84663c041507b0ce049eccd044b3f4a09e5e105d31516a5ee5150453a5fe8120f00aade0514cbd6c08ffa700e94120391a1755a91af5f5e3c7c3542a312b9ea3367ab8013631a52cb5bd7cafe60173d62ea3fd821e303439d99bf4ff729ca4eb8f84013006dc3231b9072e3c477b408c4f16de0f10da95bbd7bcd7e78c2b05aa2b36111be6f7cda02b7ef8a4e0c6095933d391b1f7675550520b9421ff03058210196d2f8422d392abedf79f74ae29595dcae6af18"], 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) bind(r2, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @empty}, 0x2, 0x4, 0x3, 0x1}}, 0x80) socket$netlink(0x10, 0x3, 0x12) [ 386.994783][T19070] BPF:[1] Invalid name_offset:19456 [ 387.014270][T19071] BPF:[1] Invalid name_offset:55808 [ 387.083852][T19076] BPF:[1] Invalid name_offset:19456 [ 387.131156][T19079] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:50 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x5d0c}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 387.214251][T19082] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 387.374018][T19085] BPF:[1] Invalid name_offset:23820 [ 387.402919][T19088] BPF:[1] Invalid name_offset:23820 05:04:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a010ab9a9d7bddda937a8dca03b163f2f3a1028dcece41ac69d14a981f33890080000000000000757fc4e5dd07db3429334ce846c8a80f486a82abe9a2510f955bc22e926e6344e4c51812254a046edfffdfe0eb6155ed244a395ba05d3797fd92f01243d907e4ac358571deb41afaee0e70e92a5d1955fd74b9d508711c61c7bd9de79ff5942216c0763a8b5934a63092deacb3cee808b914b1ef6287580d454d8c73bc91c24715"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x302) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000340)={0x0, 0xe0, "218ab88b8edbba4b474d8c7dbc87e8ff00e73ab32734680dcb6a4489fdf6222f111073ce04056c59b52e3853efaab951198c89381dd71c7f0322b8a346c2fb0ce4ff4bcf27633cef688a2e647cf49a944041f79be90bebe0971e0f92495ac5343a318b7bb6e59d70f79eebd58e03de6039682b2ad7e063815161e417c3ebd3abfb2c3279b4ab12ab10799dc38ee751509d52c9b966c1185c97501b4611a47893e8fa2e98d62092746305d88ce0954399f6146b0a45a6737d96c72c638194b9a11217c913e1963369459fe344169f8a50c7c5a0da75e2c31ecd88e113bb9fa7cc"}, &(0x7f0000000140)=0xe8) r5 = accept(r1, 0x0, &(0x7f0000000500)) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000540)=@assoc_value, &(0x7f00000005c0)=0x8) setsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000000)=0x2, 0x4) 05:04:51 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xfffff}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x50, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0c8a2c6429d1072ebcdc75a6a9"], 0x0) 05:04:51 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x5e0c}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 387.625514][T19099] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 387.691884][T19106] BPF:[1] Invalid name_offset:1048575 [ 387.712461][T19107] BPF:[1] Invalid name_offset:24076 [ 387.727416][T19109] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x1e, &(0x7f0000000000)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x27}, @broadcast, @void, {@can={0xc, {{0x0, 0x0, 0x1}, 0x1, 0x1, 0x0, 0x0, "fc3bc0ca4e859c57"}}}}, &(0x7f0000000080)={0x1, 0x2, [0x5f7, 0xe5a, 0xf3b, 0x702]}) [ 387.788851][T19114] BPF:[1] Invalid name_offset:24076 05:04:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r4, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$pppl2tp(r3, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x2, 0x3, 0x0, 0x0, {0xa, 0x4e22, 0x9, @rand_addr=' \x01\x00', 0x7fffffff}}}, 0x32) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) listen(r2, 0xfffffff9) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:51 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x5f0c}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:51 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xe0ffff}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x538fe984fcfc99f7, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 387.956020][T19120] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 388.043037][T19127] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 388.049022][T19130] BPF:[1] Invalid name_offset:14745599 [ 388.092117][T19133] BPF:[1] Invalid name_offset:24332 05:04:51 executing program 1: syz_emit_ethernet(0xb87, &(0x7f0000001080)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f67d33", 0xb51, 0x3a, 0x0, @dev, @local, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "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"}}}}}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080), 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 388.136771][T19135] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 388.207783][T19140] BPF:[1] Invalid name_offset:24332 05:04:52 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xffffff}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={0xffffffffffffffff, 0x2b0c8f6a, 0x1, 0x7}) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000000c0)=@gcm_256={{0x303}, "915894ec90f5e5a7", "964981d6b7e798eec470fa084da43a0466d3dfeb0ce3b85b916b8809b279dc27", "b59bb598", "f882bf8c042738c0"}, 0x38) syz_emit_ethernet(0x7a, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @generic={0x4, 0x6, '{P~', 0x44, 0x5c, 0x1, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, {[@srh={0x73, 0x6, 0x4, 0x3, 0xcb, 0x8, 0x7, [@empty, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}], "6fcc908c43e1cd3498e250b7"}}}}}, 0x0) [ 388.299470][T19145] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:52 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x6000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 388.371047][T19150] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 388.409766][T19152] BPF:[1] Invalid name_offset:16777215 05:04:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000140)={'veth0_to_team\x00'}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f0000000180)=""/128, 0x80, 0x5) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c20020907800000b116b36b7ccb70c755b32bbdafbe538d1d09a0870bc8be452bcb7f5827bd191c85b6d94cfcbe52b22036ce7242074cbdc30b6376397490f39459eb8f84e12fb2888d1ee2b26f342da2761202a6c5f"], 0x0) [ 388.525955][T19161] BPF:[1] Invalid name_offset:24576 05:04:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) r1 = accept(r0, 0x0, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) read(r3, &(0x7f0000000300)=""/67, 0x43) sendfile(r3, r4, 0x0, 0x8000000000005) sendfile(r3, 0xffffffffffffffff, 0x0, 0x10000000000a00) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000000c0)={r2}) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000180)=@hopopts={0x89, 0x40b, '\x00', [@generic={0x2, 0x1000, "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"}, @generic={0x5, 0x1000, "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"}, @generic={0x5, 0x16, "bc24e0534c1f31040a9a63ab2fcbf92239e8954744d8"}, @ra={0x5, 0x2, 0x6}, @padn={0x1, 0x1, [0x0]}, @jumbo={0xc2, 0x4, 0xfff}, @jumbo={0xc2, 0x4, 0x5}, @calipso={0x7, 0x20, {0x1, 0x6, 0x0, 0x8, [0x6, 0x7, 0x5]}}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x2068) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb00000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) 05:04:52 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x1000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 388.611159][T19165] BPF:[1] Invalid name_offset:24576 05:04:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, &(0x7f00000001c0)=@caif=@rfm, &(0x7f0000000100)=0x80, 0x800) sendto$inet6(r1, &(0x7f0000000240)="47b28c5e17ce2513aa2f9620d6658aaf9e3452c9b4f54a770f2cf400730bc383166a2ebc1773636858440bd509c7501dc38504e537dd98c9fd87d0c8d101a09077fdee029f940604bc713261fd768fef27e0391ccc7f0068ce9ca6d71cb4576d4b483c1e29766400e96cc1b653fa6180ddd8cbaee2e6229838b9260f5d1997dca571f732ba063fc4e42e00", 0x8b, 0xc080, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @remote, 0x7}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@nat={'nat\x00', 0x1b, 0x5, 0x560, 0x0, 0x288, 0xffffffff, 0x288, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@srh={{0x30}, {0x73, 0x0, 0x7, 0x7, 0x80, 0x10, 0x4}}, @common=@ipv6header={{0x28}, {0x95, 0x20}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x11, @ipv6=@empty, @ipv4=@broadcast, @gre_key=0xffff, @icmp_id=0x67}}}, {{@ipv6={@remote, @local, [0xff000000, 0xff], [0xff000000, 0xff000000, 0xff], 'veth0\x00', 'ip6gre0\x00', {}, {0x101}, 0x7b, 0x2, 0x1, 0x38}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@mh={{0x28}, {"1b4d"}}, @common=@ipv6header={{0x28}, {0x2e, 0x8e}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x1, 0x10000, {0x100000001}}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@icmp6={{0x28}, {0x4, "29f4", 0x1}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv6=@remote, @ipv4=@remote, @port=0x4e24, @port=0x4e22}}}, {{@ipv6={@local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [0xffffffff, 0xffffffff, 0xffffff00, 0xffffffff], [0xffffffff, 0x0, 0xffffff00], 'veth1_to_bridge\x00', 'veth1_to_bridge\x00', {0xff}, {0xff}, 0x0, 0x3, 0x2, 0x14}, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x2, @ipv6=@mcast1, @ipv4=@local, @gre_key=0x5, @port=0x4e21}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5c0) 05:04:52 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x600c}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="001baf0090780000"], 0x0) [ 388.807419][T19174] BPF:[1] Invalid name_offset:16777216 [ 388.871077][T19178] BPF:[1] Invalid name_offset:16777216 05:04:52 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x2000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 388.918643][T19187] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 388.976511][T19191] BPF:[1] Invalid name_offset:24588 [ 388.982565][T19192] x_tables: duplicate underflow at hook 1 05:04:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 389.052041][T19191] BPF:[1] Invalid name_offset:24588 05:04:52 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x6800}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 389.151388][T19198] BPF:[1] Invalid name_offset:33554432 05:04:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getpeername(r0, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f0000000240)=0x80) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @dev}, 0x2}}, 0x2e) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000000)=0x1fd, 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e23, 0x7fffffff, @local, 0x933f}, {0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x100000}, 0x86, [0x6, 0x9, 0xffffffff, 0x6, 0x55d1, 0xffffffff, 0x5, 0x9]}, 0x5c) r4 = socket(0x10, 0x2, 0x7fffffff) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x4e23, 0x81, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xe00000}, 0x1c) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000280)='veno\x00', 0x5) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @rand_addr, 0x4}, 0x1c) r6 = accept$inet6(r4, &(0x7f00000003c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000400)=0x1c) sendto$inet6(r6, &(0x7f0000000440)="b658d7ccc7bdff5aa28b7f67321b41223a56a16365a7780707c852e875492935f7cf530688601f0a5da2154c6c195c960036caa43abe9dcff21e60d3aa39f5b4da7d700f87c54ea14b942e77896958b04467c843f6a75af2c3b21a126a3e062325695f254820a15b2299374ba2d4ccf02ebe449c8e2baf97b5e63ceea476a1847d732b586c753c2ab9208e5a19deae27146dbf5f2444ccc44f1b16543244788e0bdb5cd8edcf1511e7a61f3594cc6c4bc852e4", 0xb3, 0x0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @loopback, 0x7}, 0x1c) r7 = accept4(r0, 0x0, &(0x7f0000000300), 0x80800) sendto$inet6(r7, &(0x7f0000000340)="72c25a2a42b44939fa2815e5b03b17d29433c4b37833dcb2a5f4238e331f7b0e9c3d2d2959c9e18b6f786a6423b524997ee7", 0x32, 0x4010, &(0x7f0000000380)={0xa, 0x4e23, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 389.294833][T19207] BPF:[1] Invalid name_offset:26624 05:04:53 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x3000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 389.401729][T19211] BPF:[1] Invalid name_offset:26624 [ 389.519639][T19216] BPF:[1] Invalid name_offset:50331648 [ 389.682500][T19218] x_tables: duplicate underflow at hook 1 05:04:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc00041d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5ddf2b00000000000"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:53 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x6c00}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:53 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x4000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) ioctl$BTRFS_IOC_RM_DEV(r0, 0x5000940b, &(0x7f00000001c0)={{r1}, "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"}) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000300)="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", 0x1000, 0x24000814, &(0x7f0000000040)={0xa, 0x4e23, 0x5, @private2, 0x1}, 0x1c) listen(r0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000001c0)=[@in={0x2, 0x4e24, @private=0xa010100}, @in6={0xa, 0x4e23, 0x101, @rand_addr=' \x01\x00', 0x9}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e22, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}, @in6={0xa, 0x6, 0x1000, @dev={0xfe, 0x80, '\x00', 0x2c}}, @in={0x2, 0x4e23, @multicast1}], 0x94) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 389.976091][T19231] BPF:[1] Invalid name_offset:27648 [ 390.031288][T19239] BPF:[1] Invalid name_offset:67108864 05:04:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e2200000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) [ 390.082530][T19243] BPF:[1] Invalid name_offset:27648 [ 390.123807][T19239] BPF:[1] Invalid name_offset:67108864 05:04:53 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x5000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:54 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x7400}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:54 executing program 2: getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000011c0)={0x0, @in6={{0xa, 0x4e23, 0xa0, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x7}}}, &(0x7f00000000c0)=0x84) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="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", 0x1000, 0x800, &(0x7f0000000080)={0xa, 0x4e20, 0x80000001, @empty, 0x10000}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000007000000000000000000000001050000000800200000000000010000850000040000000000020000000000000000000000da"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x1}, 0x20) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 390.408593][T19259] BPF:[1] Invalid name_offset:83886080 05:04:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0xa7d2, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaa1c1ee12f5e17eda000140600fc020000000000e3ff00000000000000fe8000000000000000000000000000aa00e04d225b4822b81db688f20a62b2d97e9fd053ca42286a5ade55603f96f451a37b00b7a689d11401ed7cdde92c4256cf692b", @ANYRES32=0x41424344, @ANYRES32=r0, @ANYBLOB="50c2000090780000"], 0x0) [ 390.462661][T19260] BPF:[1] Invalid name_offset:29696 [ 390.529280][T19267] BPF:[1] Invalid name_offset:29696 05:04:54 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x6000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:54 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x7a00}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 390.790144][T19282] BPF:[1] Invalid name_offset:100663296 [ 390.838704][T19287] BPF:[1] Invalid name_offset:31232 [ 390.880605][T19282] BPF:[1] Invalid name_offset:100663296 [ 390.925228][T19290] BPF:[1] Invalid name_offset:31232 05:04:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @remote}, 0x1c) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x40, @private0, 0x7}, 0x1c) listen(r0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x8000, @private0, 0x5}, 0x59) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:54 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x7000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:54 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xda00}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000100)={0x3, 0x1, 0x7, 0x1, 0x101}, 0xc) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2={0xfc, 0x2, '\x00', 0x10}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) [ 391.177704][T19300] BPF:[1] Invalid name_offset:117440512 [ 391.228202][T19304] BPF:[1] Invalid name_offset:55808 05:04:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080), 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 391.309408][T19310] BPF:[1] Invalid name_offset:55808 05:04:55 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x8000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:55 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xfffff}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 391.575670][T19322] BPF:[1] Invalid name_offset:134217728 05:04:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4c2, &(0x7f00000001c0)={@local, @remote, @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "d03f7b", 0x48c, 0x6, 0x7aed3408e67ba81b, @empty, @private0={0xfc, 0x0, '\x00', 0x1}, {[@srh={0x67, 0x4, 0x4, 0x2, 0xa0, 0x60, 0x1b, [@empty, @ipv4={'\x00', '\xff\xff', @local}]}, @routing={0x21, 0x8, 0x1, 0x0, 0x0, [@remote, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private0, @mcast2]}, @hopopts={0x32, 0x15, '\x00', [@generic={0x0, 0x45, "ea3eb7bf8ae11821f76fd83c032bedc1658f8d1116e103f12b8f74f369e3c74faab66111922b059d88d6bee5f744d5a841d48e4de7d43965ae3b5a3aa2366b13825a8676fe"}, @generic={0x1, 0x2c, "72477f7412fe5724d57608cf9777e3df30c265dc88db3372a8bda7a952d8c25319eaabbe018e141ed01bda68"}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @calipso={0x7, 0x20, {0x2, 0x6, 0x80, 0x1, [0x74af, 0x8001, 0x4]}}]}, @routing={0x89, 0xe, 0x2, 0x20, 0x0, [@mcast1, @loopback, @mcast1, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, @mcast2, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}, @hopopts={0x6, 0x37, '\x00', [@generic={0x80, 0xdb, "4dae1bef85fad1be13391ee794683d639296dfaec191aeabe0e87f09bd96c5cdcd5e959c4cdc6acaa1235283afc6cbc0f0c984e38e83e444baeea14157cad990726b5d22977b0946888961ed67b19b61308f25ba1c25a4a795143931c69edbab887f4698de60bb145bd3ae4f7efe2e6ff483d7814d2ca170f43bda9fc187774a69f4391eb2148f936e2cc36b44947009da86ef3ca97b83b63498460ecb637a601745bf10ee4f4eb7ff3116323169d838c8bf380d30aad9b6771c3638a04507b003ae39e51fe2f2c8dc02f27ceaff8978474f234f86f3fddf5b5f22"}, @generic={0x0, 0x5e, "543fd8f0a1e26b30c8ca3e7945c3f89dd727cf3b509247a5fc6cddd87e0c0943c7dc170435884064c25f8f51eeb82ebec0c47592c788f6c9eb7e5a7c55673f55c8e457ac1d872b0f1f3459ad8b21876aa735c74a22413e0016d2ab4542e4"}, @generic={0x40, 0x7a, "5e4010c319dd952518fb214db65c97c5362d56c44d3038f53de4fb93f697b5b2afb2af587c4be498477e51368d143869662b954418adac436162664e98e0cd78ddcaae48dcdaf6054f00b505bb23e2202c4f0be41abf3c988168ae190c8cf27d3e53a00bbb35a692a7e428b4fdf25a6cb9699c7c5a924e353755"}]}], @name_distributor={{0x124, 0x0, 0x0, 0x0, 0x1, 0xa, 0xb, 0x2, 0x6c80, 0x0, 0x0, 0x7f, 0xc000, 0x1, 0x4e23, 0x4e21, 0x2, 0x1, 0x0, 0x0, 0x1}, [{0x4, 0x5, 0x3, 0x101, 0x5, 0x3, 0x3, 0xafb3}, {0x200, 0x6826, 0xfff, 0x8, 0x7fff, 0x8000, 0x7, 0x7}, {0xff, 0x2, 0x5f, 0x100, 0x6e, 0x5, 0x8, 0x401}, {0x7, 0x80, 0xb2, 0x7, 0x32120b96, 0x5, 0x5, 0x4}, {0x80000000, 0x6, 0x1, 0x8, 0x1000, 0x1, 0x1, 0x6}, {0x11da, 0x4, 0x80000001, 0x1, 0x9, 0x7, 0x6, 0x20}, {0x4f, 0x3ff, 0x10001, 0x8, 0x3f, 0x9, 0x7, 0x1f}, {0x80000001, 0x7, 0x1, 0x8000, 0xd5000000, 0x64800000, 0x7, 0x8}, {0x6, 0x7, 0x0, 0x8, 0x6, 0x77, 0x0, 0x1}]}}}}}}, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) sendto$inet6(r2, &(0x7f0000000080)="d5ea8de2ce0597d7de4df0fb96db9eafebf784592840ac907f4d38d0210fc3d49a926605546a81ad17c6409ae8564e6e051e91cd086abfe519718132f668d6c696e6616eca5afc2a79a4c8b6491bcc1f9c7ba70af76ee3bcfc57f71cf96d9c12523ca29ab04870c52dc4d9a37323e6c48707527652c456d751a0e05ab329e38a3db2a9207f9291f9679fc0c4c9c74dfe8a94356fda6b98e22cde03dd9bd3994cf73172a8f5f53a3e79f14d4da183eb58", 0xb0, 0x81, &(0x7f0000000140)={0xa, 0x4e21, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x80000000}, 0x1c) 05:04:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="a8de021d71128668845d826724f62c01ab643548292a41000000007c68514b9a7281f48baefc00040000ed99d41d8bdcd213a01967ef82028dcece41ac69d14aac6933898443a3a8dc7da33b58969380f7a5c3549ac5c260d00772412e052fcd207c00859a5eb38a86f9f99e1e1677ce78"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vxcan1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) [ 391.629188][T19326] BPF:[1] Invalid name_offset:1048575 [ 391.709688][T19332] BPF:[1] Invalid name_offset:1048575 05:04:55 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xa000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:55 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xe0ffff}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 391.981335][T19341] BPF:[1] Invalid name_offset:167772160 [ 391.982457][T19347] BPF:[1] Invalid name_offset:14745599 05:04:55 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x1f000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 392.093568][T19351] BPF:[1] Invalid name_offset:14745599 05:04:55 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0xffffff}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e24, 0x8000, @mcast1, 0x5}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000090000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000003c0)="ebebaec49931f6e3f3e5199473a661e9393f199405876fab0ef01f16fdf42de0a84808de9a83f84185cda014493d9b03571baba963090145c4a56fdf6c88f74ad25d4f4a750a521cb91b0fc223c870f453749773913b04d19b88f3b85ce2eb43ed17fc0db049fafd5c3e799881d1ecdca4e00821462d2bdcd794e4c089032c0296f92fc2a0", 0x85, 0x20004851, &(0x7f0000000100)={0xa, 0x4e21, 0x40, @local, 0x5b}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xe}}, [@filter_kind_options=@f_bpf={{0x8}, {0xc, 0x2, [@TCA_BPF_FD={0x8}]}}]}, 0x38}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000a40)=@newtfilter={0x54c, 0x2c, 0x800, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x6, 0x5}, {0xffe0, 0x1}, {0x7, 0x1}}, [@filter_kind_options=@f_tcindex={{0xc}, {0x4e4, 0x2, [@TCA_TCINDEX_ACT={0x4e0, 0x7, [@m_xt={0xac, 0x6, 0x0, 0x0, {{0x7}, {0x14, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_HOOK={0x8}]}, {0x73, 0x6, "935d6f18ac98055974b45d16ccb86f6cd7af8a9e3f256bbe867c0f872e8c71b54b1744ddf60a132d1d909d8211e3697d131e4b787df17a6f31f7050ecf72b44a6b05e11db730adbd1dfb602391ee31a3954185266f4efd65ec66d9502a522dcde41a2e5c17ca28a2764a192f6e5de9"}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}, @m_ife={0xc8, 0xd, 0x0, 0x0, {{0x8}, {0x4}, {0x9e, 0x6, "f964acf5b462d68ffafe172ac328c6a022ca1faae6672f1559d14a47a6fa5d3fc7a3cd14080f78569128ac2dff2f43ab328eed36d72bde25f19bb40d3c033ada87fe8133a822712c42c19e14c45301a6894c794e08efea39af3cc02481739876e8adcb55b984eb05adc5b68d7d383325ae14337495452a1e5e3c66316a0d88e5633b0e69b3082357ce17745f310a00fe7645a039d373eeb1eadf"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_ctinfo={0xfc, 0x1a, 0x0, 0x0, {{0xb}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x2, 0x10001, 0x2, 0xffff0000, 0xb4f}}]}, {0xb5, 0x6, "1908555afa0187092f02f15310b86f8fc39a80f096e19332a70067a8149305c6b1e90a1528f9e590a8547c1806c4075d5286f6d2c4d4d2bf632fb6ebbb59a6aa03749c20882ce0389f969c46d0b543fe1c9e60132703f417ae8f9fb66e587e2deade841608c6a6a364d7145e63a31275b0c419ea75a55d9b470f7413eb9a0d130e9cb55c4c25973de167e4d67bc97c745c6ffea782352af44980927085b6310a38543df1cfc57072d73d5fb64cd9d12e05"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_skbedit={0x88, 0xc, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x4}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x30000}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x2}, @TCA_SKBEDIT_PTYPE={0x6}]}, {0x3c, 0x6, "b529011784871c790346d53975295d9ed358a4679e2ae7deecad8a86406fd2e43d57a74968e4d705390472969dc8445637983adf618f3676"}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}, @m_mirred={0x1e4, 0x1d, 0x0, 0x0, {{0xb}, {0x104, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0x1ff, 0x7, 0x9, 0x7}, 0x3, r3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0xfffff90a, 0x10000000, 0x3, 0x20}, 0x2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5f, 0x8, 0x4, 0x5, 0x2}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x7c3c, 0x5, 0x4, 0x2, 0x3}, 0x2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x8, 0x9, 0x20000000, 0x6, 0xba}, 0x2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x99, 0x8, 0x800, 0x400}, 0x4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x3, 0x8, 0x1, 0x6, 0x6}, 0x4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x2, 0x3, 0xffffffffffffffff, 0x42bc, 0x7d94}, 0x1}}]}, {0xb5, 0x6, "2703c52246f84e76bd3b83e6a94a154d1788351e1ac3104d9effbd60abe5afe40b735b5302b9a8dfefd318179ceabd4e5b479299c3650043bbdbaf5df306886360376371e4befd89bb32aa19a1f60017898c22a5c9790be3de06cbe1da482aae2fb6422356288be8458a112c8ca0d071a61ac437236e683b4ead04866bda8596d4452adc57e3339fc79fb484d56eb633ce5a512c54ff168463305ceab30c5d72293280f5e170116305ebb49c66a34d1365"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x6f}, @TCA_CHAIN={0x8, 0xb, 0x400000f9}, @TCA_RATE={0x6, 0x5, {0x0, 0x4}}, @filter_kind_options=@f_flow={{0x9}, {0x14, 0x2, [@TCA_FLOW_XOR={0x8, 0x7, 0x101}, @TCA_FLOW_MODE={0x8, 0x2, 0x1}]}}]}, 0x54c}}, 0x20000010) syz_emit_ethernet(0x4a, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="508200009078000083b9549bbf626218e7a4c85b780bcd4f71383bff20e962fff6c4d67ab745e853db776e3d791d"], 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendto$inet6(r4, &(0x7f00000007c0)="cfb711ef1518e5d5b6ff06ee81b9cd12c86007bb05c535e9b4cc5ff721fff26a93090950f9c8f016e9648aab658eff7b45fcb228e37db9800427b38c3ba68da50830285f5b2196b3afd332f1322d459baf324359afa000d33305058a74166308427c27df39ff482d2f1a7866cc9fc98f8c1fd9c8f35d579a010c989d39934ba38f80279eeaa186a6a9cb045b95194f02ac22addb85641d260a6374ba8225762cf4cbd60fef4c5a97230120f8ed26bb8c069b88b9c7cc51d224d88f4c6714415758ce95fa00437f9138eb955a49cbe54e7981f0875a871b1389a49faf36f49637280547230fd34b706b1c9bf5598c6348bf1d835dc88e51026d68d16af2f1", 0xfe, 0x4048000, &(0x7f0000000180)={0xa, 0x4e21, 0x5, @ipv4={'\x00', '\xff\xff', @remote}, 0x9}, 0x1c) write$cgroup_int(r4, &(0x7f0000000200), 0xf000) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x9, 0x7, 0x1000, 0x5, 0x100, 0x1, 0x9, '\x00', 0x0, r4, 0x2, 0x3, 0x5}, 0x40) [ 392.213626][T19356] BPF:[1] Invalid name_offset:520093696 05:04:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db090000009a727ef48baefc000400000099cece41ac69d14aac693389844741c16d700b8f757fc4e5dd07dba6e6360c5ada6f63bed0b122ee10b8a2742cd21b941174cb33591c1e6b1f"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(0xffffffffffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/67, 0x43) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000000000005) sendfile(0xffffffffffffffff, r3, 0x0, 0x10000000000a00) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000001c0)={0x3, &(0x7f0000000180)=[{0x2394, 0xe0, 0x1f, 0xfd}, {0x3, 0x6, 0x0, 0x4000}, {0x7, 0x6, 0x1d, 0xcdf7}]}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)={0x3, 'wlan0\x00', {0x7af}}) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) r5 = socket$pppl2tp(0x18, 0x1, 0x1) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r5, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @dev}, 0x2}}, 0x2e) listen(r6, 0x6) 05:04:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x1, 0x803, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYRES16=r2, @ANYRES64, @ANYRES64, @ANYBLOB="702113da5743", @ANYBLOB="080004000000000000f34a0100dc66c6c9002a86", @ANYRES32=r1, @ANYRESDEC], 0x50}, 0x1, 0x0, 0x0, 0x20004815}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r2) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000f00)={0x0, 0xb6, 0x8}, 0xc) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='< \x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000700000014000800000000000000000000000000000000000c001600ff7fffffffffffff0500140000000000"], 0x3c}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = accept$unix(0xffffffffffffffff, &(0x7f0000000f40)=@abs, &(0x7f0000000fc0)=0x6e) r7 = socket$pppl2tp(0x18, 0x1, 0x1) r8 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r7, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r8, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r9 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000001000), 0x2, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000ec0)=[{&(0x7f00000001c0)={0x134, 0x15, 0x400, 0x70bd28, 0x25dfdbff, "", [@generic="13495857ca4d16d60802c45eb0de1e69cb073d67ab8af9d07d70a3f688d775f0e1efac63a74631af24f1d992fcce5b62b7a0c4b7763388ae7fc3b88e89a4c3089d9397f4bd64a52b189963b01054659bd0ad2bc1091d9071f9ecaf3c73fe47cfdccb070f860f802ad39cebdbe9ad958fd70336eb7cc05af7f78b182d30e18444dc8a001378a931575a2e1bf8159d4d929b0d61b4cf8bad09054265827e67dd12c7002f021901010d43a71058d970ae", @typed={0x73, 0x5a, 0x0, 0x0, @binary="44ed751b9e0a8e3abc11d52e5f017ea7f549726ad59ac3a0c0186402fc6f3a110bc11c89fbf9f8e1934f7e7754eb3671d8b99086b395695f4df12ab25e0186fd987f4096fb1fd3f3c205e50c0effee3ecdc97d1d45adff7f5702c24bf84b8e9e327fdf98de4cb758b4191d75d8e23a"}]}, 0x134}, {&(0x7f0000000080)={0x18, 0x32, 0x110, 0x70bd2c, 0x25dfdbff, "", [@typed={0x8, 0x71, 0x0, 0x0, @str='%!@\x00'}]}, 0x18}, {&(0x7f0000001140)={0x5c0, 0x1b, 0x400, 0x70bd2c, 0x25dfdbfc, "", [@typed={0x8, 0x59, 0x0, 0x0, @fd}, @generic="640395a25b29db8e3afa4295834c54718cacb0edd2b48365499afc69cb9a72d3aca0f2435519337832f98994b3c55b4ba48075748a573654bf", @typed={0x8, 0x44, 0x0, 0x0, @pid}, @nested={0x88, 0x88, 0x0, 0x1, [@typed={0x83, 0x46, 0x0, 0x0, @binary="edb7b5feed8c5b4c3685a25393ec0874473f1b9ec5f3cb2f89e0ca5ba1da763206d57956a9a904f7f5f8b08299dc44084187cbcc522619260fc2278135e50bb9e512951af3e95117dd8ee49354a2207d561c78aea04d437bcf9815fa63f158bfc4540607dc985892493787de41f626d7d8b323c046022fc0ff6d80a30890cc"}]}, @nested={0x289, 0x14, 0x0, 0x1, [@generic="bb66378064181042365ab74031494c5661a784a33ba8c2e87fcc5c18047b5211627d21f566df8f1c2e050c3930f4d6caf0c044567102fda59d9d0e2882ac1976c770da208254d7748e2f3003e10ec1d08dcb9e421ba59c77018cb78817d80447528e9c0e2243f9461225a5935e9fb02f6f1bea6df2e722f4cda8fb2b54a9f0807f1cb9ceffee9a9ef447dd7cc441faa6acb7e64a0dbd193a737655e6faab69b1ee18aaa8b6ab28abec3e6b1b57339fe4c95aeccec8c1602b32d1", @generic="2edeed4d34900d6fde20c3f0961f6a47ea0b7fcb47472a0da1d441144ed8abf683c54c81ca3a1215dc86976012b5a524eef6a62fdb756fb89290cef27e4d1881554724d919aa0491ddd5249182595b885646fc879f116a8303d717d84217b627da07d451b4eacd1207876d1d9f0a9090c90aaddd58760d4e1ddb383e21", @generic="89ed25f1fd31e56f45a064284f1c93845b77d34ba18ec181a0995799d2921fed7fcfa59dbad2be558461b04590ed6ed28ca7ea748a90d67226d89ca13c0134ce59e246b2bb6f5cf99f9810c6822c6075efa5594c198f8d7ba0e0def30d7b55aebdcb8e59721331ef8e338dc5cbaca9a66573f73a8391bd4ba19032586affbd39eb95591a66c026e7b84ca3a4dfbeab8e37adcba402327d99ca2b5748", @generic="574f5e52bee6e60d1ed8d15d22deaa7a866db5cc21fb21e4bc19d37b9011954e8168f7372efba8c795d2b8a090190082fe8d0f2d376e339dede2f5b3b27515aefea9d49c19ff4eb1b8c67fa7afed3d7ba87f99cc2958bcc6666b9ad0a5a47d4c87b6a0e3600118bd0f7ddddaa6bec4390e69aeedb380b62d805998ae6fa28a728ed015333a8322f3d991e3cfb15013c4693ad5304d225e0d67186ce07da1a9f1e9249d0a689580f6b5014207a2ad763128a4"]}, @typed={0x8, 0x4e, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x8, 0xc, 0x0, 0x0, @u32=0x1}, @nested={0x10, 0x8e, 0x0, 0x1, [@typed={0x4, 0x67}, @typed={0x8, 0x6a, 0x0, 0x0, @uid}]}, @nested={0x22d, 0x3f, 0x0, 0x1, [@generic="ca371245d477c5a426f01ea3e4cca4d78fe4c5bfbafb2cec81214dc1911ac97189f6fdeb716eca7eb1dc7a5c61c87ba27c0ea6e64ad1e05c9809289fe4602a5b538c0893f6889933ff6dcc1b97636bd1a3ed02fae35a49a13b7d5dcfbed671d14fa04bcf59f4d6468f558e87065d84470b567d2930c9fe13c9d4cd9cd24beda5f6b1a8bc12c9063a9e700f27e437f07115ee85897f883139baf4d17b62dfa2cf14913a8028d32b12ba15ca15d037dd8127ff5c6d85ca682f0a8562b10e59e8bab37aa9ae429f43fddc33152b132cb50ab3383c4bc407eb26502a95215017ac03dadae189de5933ccb74030cdc0e562cd52a71b", @typed={0xc, 0x37, 0x0, 0x0, @u64=0x2}, @typed={0x14, 0x3c, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x16}}, @generic="81216b0a99e858277689ef791f161e29", @typed={0x8, 0x17, 0x0, 0x0, @uid}, @typed={0x8, 0x17, 0x0, 0x0, @ipv4=@empty}, @generic="5ce686ca6d483324ea2a72a0021fa0b439ed17b84727eb7669930c78a8cb0a32b48bcb679d06a30840dbe95a77d5d39e82c6f63afb722a0009309f4577fcbc9e71e69c21fca56c765858aa4f45afba383d3880a1fe56dcafbf2b2efcd4b8ef5bd7327d7b9db14cf16ce03eed0c397c69027d9586645edbbfaecb10103df6ff1fb89c34304cc24c964a5bfe5564ad37b263634d723a1d222019b9ec6ef8d54aee34feb6d00d62051de18437548a5b71da1336c5d2c7c2c597ddc94846280d0e6867a32b808bcc9ee8bc1f803e77de2efa183a46314daeac8832de556545a415b85f6e2eb82a8a3561c26e1c28171750f31cf06dfc054f"]}]}, 0x5c0}, {&(0x7f0000000a00)={0x49c, 0x1e, 0x400, 0x70bd2a, 0x25dfdbfd, "", [@generic="45280fbe581ebabb8fd70bb135238f38652aec57f346a694d826fca1f3b14ab4d828b14efae48e71dc7780d0e7530180a20f05e53d5547", @generic="3274094ee04382441c8654d49ceb73a143dfaaa285789e0f364d2b9608ee4dec5198c1c6d415339b8f0bf009da1acd70b459e9de940e2406cbccbc8ae822d54373f4525c25058f021d46da489a3de3", @nested={0x14f, 0x79, 0x0, 0x1, [@typed={0x8, 0x3c, 0x0, 0x0, @uid=0xee00}, @typed={0x9, 0x5f, 0x0, 0x0, @binary="6293b17532"}, @typed={0x8, 0x42, 0x0, 0x0, @ipv4=@remote}, @typed={0x8, 0x29, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x20}}, @typed={0x8, 0x3a, 0x0, 0x0, @u32=0x8000}, @generic="41544568b171d10a697d9aff5c31f51e8e4551386bf27f8462d93f36441e7a40c4a250c2f7167f9543ab08f722cf5fdd489e3d4167c01b98e74601fc9643bde1640e8e87596e5a78d487491fe5be608885b84f0661cbc41fb50fb0741d9e7c", @typed={0x8, 0x34, 0x0, 0x0, @uid}, @generic="b232c706cbe1010e0318fdcde1e4f284b1882df906ed31af429ac6cd13598fe9d5ef5fd13f0d2ae8e76827dbba6da49c862734f43a049941c96755dd34d3b9dc109617c86c30353f89db75729c8a32c50e14ade05570eab0d24157b4f4965c612e96ac0899b3d07c81b4972ab60f714336bb42568092075e148e8eb47cec2f7c435f30fd1d56aa496429de1426fe6702ec5aeb19039ffb155d2f8a13855cb7e90eb6ee6eb3c1263c25b22c4a1aa94215", @typed={0x8, 0x10, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x24}}]}, @typed={0x8, 0x8f, 0x0, 0x0, @ipv4=@local}, @generic="f7769db95031f171cc02b04f2413c5406b33f089278faa856f376083c3f287bbfc8d9f4fd19c96ffb5f9a2787d8ee5dc3197751f22e69bf425a51ffc5a41a06b88a04d0fa21754ea6a57344750a2054e5d256745aee2b2a0a5ab1ae48eb7617cd42ae8d8", @generic="aa27495a4dc11a96b6ecb4c1fca4d12e91b71e042e2b78935a555bc4563deef678afb81bf982095166c6e8e06e056bc7bf3b1574c06c1f01b677446619c85857c78cd4954ed676c77d9a5a7722a58866160b795b725ea2893109ef3b7518c0c89e0bb2a43825dc9e9ef3f6e6b93762b503ea7518f3ea8cb9e0ab21ef44f478692a48bda8db47ea1128e527f5", @generic="607ee2d04d7a53989dc5099c1dd305184b69c7805e226497bf4be3fe3fcc175ef9d18a0c06a6cea9df45e348ef44f2f301560328a72685731627a911cd92210637b689762cbba686e1c17e4d3ea410091442118a15aa3763da20717a", @generic="9e32f1405e8fcf6dbbd7a9533c25280619d744e47dc544d9338dc6723d32aa5504a9aa8c0f037ecaca92b116fd9e5935563476416a51cb35f75995695874c1241ed2e9fd614049f288f682150882a63b18c557a91005d491ab2d2b9e5fac8df582c6fb", @generic="ca42117b60bf64c1ccffd95c20f21c10733bcbd3be7193cab1e7b44bfa631ac651197a4c884ec6373e6e2bf81265190bc4fb833f8a5c2dd5866fab88da6e7f78ea32c77c1986fab684bd1b4990fa262f7e7771ee470f6dc5fce82b16b36bb3da493b6836bb60412ecae09cbbb0bb98c3f415826a068109fa1c8e0d9c446c065e087409895dc4e8504ba541b18bc8b61d0450da69e0e650c8f0f5709c018edd65a4a22bc8d1970f33ddbd550ffff3f1aeb4e333fc42dd43c54db7b09f477c4400893760ef8953128d0346eb035fa32f88810db0a7c3488c1dc040d04a591c6166ac0cd562e235b76817d978083c4131a891ebf8d753a87c4e3188edb8"]}, 0x49c}], 0x4, &(0x7f0000001040)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, r2}}}, @rights={{0x10}}, @rights={{0x18, 0x1, 0x1, [r5, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r6, r0, r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r8, r9]}}], 0xa0, 0x80}, 0x1) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:56 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x20000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 392.337549][T19363] BPF:[1] Invalid name_offset:16777215 [ 392.398643][T19365] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 392.421139][T19368] net_ratelimit: 6 callbacks suppressed [ 392.421159][T19368] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 392.445852][T19370] BPF:[1] Invalid name_offset:16777215 05:04:56 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x1000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 392.522440][T19371] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 05:04:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c20000907800004ff220674ace1cea2bad83c302acad2d5e29e870b736780cf3bdce8f69852d0d06e5cd987cea2bd3c13233d5afd8b9dbdf54aa621a"], 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x1e2}}, 0x0, 0x0, 0x1c, 0x0, "3b9137c54dc4afe1c7912649947438f116b4755531c6dde8cb564ce54474d0c45c2a6b2ffac003c49fba53a3acd58ff8a8d7dd37f9e1d32444fe0615f48005a6cf9b41679af7fb75c6a9d9747bc9ac01"}, 0xd8) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0xfffffffe, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x3f}, 0x1c) [ 392.620379][T19386] BPF:[1] Invalid name_offset:536870912 05:04:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="51c2000090780000"], 0x0) [ 392.713742][T19391] BPF:[1] Invalid name_offset:16777216 05:04:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/107, 0x6b, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) r3 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r3, &(0x7f0000000000)={0x18, 0x2, {0x3, @rand_addr=0x64010100}}, 0x1e) 05:04:56 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x24000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 392.806426][T19391] BPF:[1] Invalid name_offset:16777216 05:04:56 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x2000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000000)) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) r1 = socket$netlink(0x10, 0x3, 0xa) recvmmsg(r1, &(0x7f00000009c0)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000280)=""/231, 0xe7}, {&(0x7f0000000380)=""/239, 0xef}, {&(0x7f0000000480)=""/203, 0xcb}, {&(0x7f0000000580)=""/19, 0x13}, {&(0x7f00000005c0)=""/203, 0xcb}, {&(0x7f00000006c0)=""/221, 0xdd}, {&(0x7f00000007c0)=""/218, 0xda}], 0x7, &(0x7f0000000940)=""/105, 0x69}, 0x9}], 0x1, 0x40010140, &(0x7f0000000a00)={0x77359400}) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "8510c4f058ece13f", "ac90ca3baec6307314222dbf55860b65", "a8f709aa", "f5c5e6e3bfb70f8f"}, 0x28) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(r2, &(0x7f00000000c0)="0f979307fe774594a872f2a9b467c51fcaa6146ba2515d889c8094a24da1384a2d45d872b014a64defd046c9af0a0f2113ee30cd78d7d8f731b445a6e586b82d9d64a4297684a90bbe2c7ff5933d0f83148f7f6cb310a2d61352e061e0d5806db51325f3ae4dfe78facf62d60d092d3ced2a2649badb8ce7579a1f9f346608e6bc57f7a7bb4a68049316ce3a68df32bd6afcc846314e3594a21a391628c98925449019f9c3273f66bf8bb973c6eb31d113e879ae5b85d200cafdc707ab0661f540bc06daaa1e5921de60d4c6f2bad3953330983c592e2a06653e0fca155f", 0xde, 0x61, 0x0, 0x0) syz_emit_ethernet(0x9c, &(0x7f00000001c0)={@local, @remote, @void, {@llc_tr={0x11, {@llc={0xf4, 0xe, "b4", "b1786ff74729f8096d9f6e8cadc6240f487e4bec102157d01e703be5aa01780d0bcd18a7dea1e3439e3a95cb80c8cd434c81a5f746cc6501f891fa537427ebd9c30fabe7c9127d25b8ad38dd6c56b1dcd4533e4c8a8857b67c7a8787353257e86560f65fa2421d1456c7b8289a7f73f78f2d375132945e726499e204261748b2b79be491223658c1cc4e61"}}}}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 393.034974][T19410] BPF:[1] Invalid name_offset:603979776 [ 393.061539][T19413] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 393.083832][T19418] BPF:[1] Invalid name_offset:33554432 [ 393.094986][T19420] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x9, @mcast2}, 0x1c) listen(r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x3c, r2, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xffffffffffff7fff}, @L2TP_ATTR_LNS_MODE={0x5}]}, 0x3c}}, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000080)={0x78, 0x76, 0x3, 0x0, 0x0, [{{r1}, 0xff}, {{r0}, 0x8}, {{r0}, 0x9}]}) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 393.180838][T19423] BPF:[1] Invalid name_offset:33554432 05:04:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="367548f62bab80d5fcaa248c8b0ce4f4848c998f0cef392dffaf33742845619d237c7f83c619b1b266e0573f549efe6b100c3646fa8fa2f9f8af81fbda4b2260936b6780154963a2522c16a30c41ea42dafe6b401327ab64330f5e62bbe1a9a4c7b2bcdd777c2df385693767c41f7d1031dad90f5e5f37a54091015dbef402b7fc17e05ad4ff443b0d920b9172b260ee35cdfba85a7625c9162e3a44360d7c5df044a563ca405247f752d5b3d565467e60858d100cee7c778393d1ad24a11b02b335186f5bd3e13a83a70986479ba1299d293d", 0xd3, 0x8074, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote, 0xffff}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x3c, r4, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xffffffffffff7fff}, @L2TP_ATTR_LNS_MODE={0x5}]}, 0x3c}}, 0x0) splice(r1, &(0x7f0000000080)=0x2, r3, &(0x7f00000000c0)=0xffff, 0x3f, 0x2) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:57 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x30000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:57 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x3000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 393.385086][T19428] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 393.409149][T19433] BPF:[1] Invalid name_offset:805306368 05:04:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x4}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) [ 393.525353][T19440] BPF:[1] Invalid name_offset:50331648 05:04:57 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x32000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 393.650947][T19445] BPF:[1] Invalid name_offset:50331648 [ 393.662612][T19446] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 393.830210][T19453] BPF:[1] Invalid name_offset:838860800 [ 393.906385][T19451] BPF:[1] Invalid name_offset:838860800 05:04:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) preadv(r2, &(0x7f0000000140)=[{&(0x7f0000000000)=""/57, 0x39}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x2, 0x6, 0x3) 05:04:57 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x4000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) sendto$inet6(r2, &(0x7f0000000080)="bf188d7f9f3658", 0x7, 0x4800, &(0x7f00000000c0)={0xa, 0x4e22, 0x4, @private2, 0x4}, 0x1c) recvfrom$inet6(r2, &(0x7f0000000100)=""/18, 0x12, 0x10000, &(0x7f00000001c0)={0xa, 0x800, 0x0, @dev={0xfe, 0x80, '\x00', 0x40}, 0x1000}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fcb4e4fabf9963a7020271eb020000000000000000000000000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) 05:04:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:04:57 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x48000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 394.192423][T19464] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 394.232618][T19465] BPF:[1] Invalid name_offset:67108864 05:04:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="27dfb4e210d59e6d8f9f99c7e3052b656a021168fb", 0x15, 0x1, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) [ 394.280718][T19473] BPF:[1] Invalid name_offset:1207959552 [ 394.300727][T19475] BPF:[1] Invalid name_offset:67108864 05:04:58 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x5000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:58 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x4c000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x8000, @loopback, 0x7f}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6020920000140600fc020000000000010000000000000000000000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c2000090780000"], 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) recvfrom$inet6(r2, &(0x7f00000001c0)=""/192, 0xc0, 0x40000000, &(0x7f00000000c0)={0xa, 0x4e21, 0x6, @private2, 0xff}, 0x1c) syz_emit_ethernet(0x19e, &(0x7f0000000380)={@multicast, @random="de7289e68afc", @val={@val={0x9100, 0x3, 0x0, 0x3}, {0x8100, 0x1, 0x1, 0x2}}, {@ipv6={0x86dd, @udp={0xf, 0x6, "11e1bd", 0x160, 0x11, 0x0, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, {[@routing={0x29, 0x2, 0x2, 0x4, 0x0, [@ipv4={'\x00', '\xff\xff', @multicast1}]}, @fragment={0x5e, 0x0, 0x1, 0x0, 0x0, 0x17, 0x64}, @fragment={0x62, 0x0, 0x1, 0x1, 0x0, 0x1, 0x68}, @dstopts={0x2b, 0x15, '\x00', [@hao={0xc9, 0x10, @loopback}, @calipso={0x7, 0x28, {0x2, 0x8, 0x4, 0x1ff, [0x8000, 0x8, 0x8, 0x5]}}, @padn={0x1, 0x2, [0x0, 0x0]}, @generic={0x6, 0x54, "b9a79938b2b7d00c750463f78c92a0f742f201018e2fea2f2a1bcdfa109460939b7f231a1f052a98c086d638978967ea2fdd5f6ff2499a45e58ca93dfb3b71c180176d519145856cff5b29d623bf8ac230a80b0c"}, @ra={0x5, 0x2, 0x685e}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn, @jumbo={0xc2, 0x4, 0xff}, @enc_lim={0x4, 0x1, 0x2}]}], {0x4e22, 0x4e20, 0x80, 0x0, @gue={{0x1, 0x1, 0x3, 0x80, 0x0, @void}, "22d720067c90ae0af1366177fd629de02c92bd006de9e3eb41c39439a81f3dded07178a0400b0267b5cefb6c5e02b3f5aa01cfa00e5256701b4dc45fe14f29351f7177eb205cb9c79d3e5d4b0629c5bce0d6120dabd0c804c3d62d7f205c50f884265cc289a236e325eb3c49b1ea8e2b84f8c679"}}}}}}}, &(0x7f0000000000)={0x1, 0x3, [0x8bc, 0xccd, 0x72, 0x85a]}) bind(r0, &(0x7f0000000280)=@xdp={0x2c, 0xba292c1568ca6004, 0x0, 0x5}, 0x80) [ 394.645029][T19494] BPF:[1] Invalid name_offset:83886080 [ 394.673308][T19495] BPF:[1] Invalid name_offset:1275068416 [ 394.738410][T19499] BPF:[1] Invalid name_offset:83886080 05:04:58 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x6000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:58 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x60000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 395.045440][T19510] BPF:[1] Invalid name_offset:1610612736 [ 395.064185][T19511] BPF:[1] Invalid name_offset:100663296 05:04:58 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x610c0000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) [ 395.152683][T19515] BPF:[1] Invalid name_offset:100663296 [ 395.413043][T19520] BPF:[1] Invalid name_offset:1628176384 05:04:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="91de021d7112862a410ab2c1db7c68514b9a727ef48baefc000400000099d41d8bdcd213a01967ef82028dcece41ac69d14aac693389844741c16d700b8f757fc4e5dd07db"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x28011, r1, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x6, @private0, 0x81}}, 0x7ff, 0xfb37}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/122, 0xe, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 05:04:59 executing program 5: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x7000000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:59 executing program 4: socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x620c0000}, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 05:04:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x1, 0x4) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x3c, r4, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xffffffffffff7fff}, @L2TP_ATTR_LNS_MODE={0x5}]}, 0x3c}}, 0x0) getsockname(r1, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000100)=0xb2) recvfrom$inet6(r5, &(0x7f0000000200)=""/98, 0x62, 0x2000, &(0x7f0000000280)={0xa, 0x4e24, 0x5238, @mcast2, 0x5}, 0x1c) r6 = socket$pppl2tp(0x18, 0x1, 0x1) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r6, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r7, {0x2, 0x0, @dev}, 0x2}}, 0x2e) sendmmsg(r7, &(0x7f00000018c0)=[{{&(0x7f0000000140)=@nfc_llcp={0x27, 0x1, 0x1, 0x1, 0x1, 0xdf, "b5511c3514d613f09dd9ee22c9fd0eae30c4231359bbe07fb061854bd06a9c5ae0ad7e343758e975ed60798bfcdc63d4446d0f5824577b1e372baafaa6a160", 0x1c}, 0x80, &(0x7f0000000740)=[{&(0x7f00000001c0)="7f5cbc5cedd3dea4b04826030425f8e51a179a274b3139f0db0266393c5812ae99adeb37e8", 0x25}, {&(0x7f00000003c0)}, {&(0x7f0000000540)="742f4e1c2bffa57a72c89a5784732bb9fe8f557521bcaa8388ace82016d6c59ec344c75e6ae51d009cc09c3fa438749efe211767e25f60ce8bce02ee1b590bf797d510103b5ebe63923fc9095e3af597ca1296766dd5f591d7aab285bd86a22a36d6f0d081a4ca5f7aabe11337cca852da58232c0cc0922c82199bc538b569cacca55f318215c06116b998b998019fc15464129ba43837d45f0a1bf838921d38ff76a6bb20667b913b4ad217ad0412b871e90af19e92402247863ae6265a96adcbfdcc96ad1c1e150ba3e891bbbe74127fd9a3bc677b24b9f71d39d6e229c962e9ae87ad8917c349cc", 0xe9}, {&(0x7f0000000400)="4676c0396f5e48be0b2de0f21da8c2af506e97acfdca9eaeac98f325be040760c871b7b59df61fe374ca31572fc39d4cf9e27fd481fd", 0x36}, {&(0x7f0000000640)="0175d3fd6f6cb9ece503e2b554eea441039846a1f58c85c77e2e6457eb8931dc93d842a8e858d5668787bd8059385e57ecfcfcf5bdcf5514e46fe0b8ec4d36ffc1c20e3d719906decad311557dff8e42fd64df7127c457987f5aa74c1066c9d6e906779a93196a6400708af1e02a509d2bd5a1f01679052623e8a091b1c643d24b654607336712f714276c5979380f5c54da1f27e56239de92c7d92cf597d3b65891b42d42881cbcd765709df2c4459c29ee1e5de6cf1e86241c92a943262d1e2fd4586e483a6feab83db900c39da9778625727a917aa490025640ead0e4938f76ca3a", 0xe3}, {&(0x7f0000000480)="f7e7a8570c9a5d4429aa88fcc76a2c135f841fedd5ecc8a0198a152bd94a1a2bcba5d143796f", 0x26}], 0x6, &(0x7f00000007c0)=[{0x18, 0x102, 0x1f, "e7db4cd3be58"}, {0xc0, 0x114, 0xfd, "fd37ca897e0f2ab8851c33d770fcedcf75645efc676ec58f1454c83f9d6d700e616ef3a9444bba2591b0dca36996551ddc697460fd01a00e67688f0c1d59c96377492937b792469d8235c370f7085f01f065af5c8e67e1b920d73f1bbbb3b227283318c8dc3df1b9b82599993e5e424a49bab326b355cb08f9990586e5a2315022a394498413cdc908c0d126a13216fd23465a5d8b04d8f59f671f26e571f7bcdeca65560334628a40720208f13c30"}, {0x1010, 0x10e, 0x3649, "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"}], 0x10e8}}], 0x1, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) getpeername$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaa0200140600fc020000000000000000000000000000fe80000000000000d7d2e8757be0eb5a00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c20000907800006574cdd9ea7254edc6d8a0186fccbb67640d5bdd23503677faf75c3fab7f0748b64017c4c85f31bdb10d922a"], 0x0) 05:04:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x6, 0x0, @private2, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000080)={@private0}, 0x14) sendto$inet6(r2, &(0x7f00000001c0)="d158292547bf15279665479d7e82ab1bb38b298e3879d1ef8506410a879faa289a2f1b00adcaf575d748b1bc4e57de1356897490402f2a028e95d5eed6ec8246f28a7e8ade890d70282da50f774c12499fd5717817e32c76270c489561d95f2ecdc28a061c4aaca8e9b587df45c36898cf64b13e8370e5f96033677d519cad25901dbd1e969e08f3c16154b8eb5bf34ff80a5f4b06997b47fda90256e700b488702f09cebe9aa140561175e401d7b14a02e6de8918d19dc5f549e0ca807ce68157905f26d47028d5e737c7a054aca893042185", 0xd3, 0xc0, &(0x7f0000000000)={0xa, 0x4e20, 0x2, @mcast1, 0xfffff1c2}, 0x1c) [ 395.761969][T19538] BPF:[1] Invalid name_offset:117440512 [ 395.771159][T19539] BPF:[1] Invalid name_offset:1644953600 [ 395.832509][T19543] ------------[ cut here ]------------ [ 395.838019][T19543] WARNING: CPU: 0 PID: 19543 at kernel/locking/lockdep.c:895 register_lock_class+0x1fb/0x1180 [ 395.848496][T19543] Modules linked in: [ 395.852408][T19543] CPU: 0 PID: 19543 Comm: syz-executor.2 Not tainted 5.13.0-rc3-syzkaller #0 [ 395.857935][T19548] BPF:[1] Invalid name_offset:117440512 [ 395.861209][T19543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.861230][T19543] RIP: 0010:register_lock_class+0x1fb/0x1180 [ 395.882818][T19543] Code: 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 98 0c 00 00 4d 3b 67 18 74 0b 49 81 3f c0 a3 42 8f 74 02 <0f> 0b 85 ed 0f 84 20 01 00 00 f6 44 24 04 01 0f 85 15 01 00 00 83 [ 395.902718][T19543] RSP: 0018:ffffc90011267630 EFLAGS: 00010002 [ 395.909152][T19543] RAX: dffffc0000000000 RBX: 1ffff9200224cecd RCX: ffffffff90774720 [ 395.917293][T19543] RDX: 1ffff110041a38cf RSI: 0000000000000000 RDI: ffff888020d1c678 [ 395.925386][T19543] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 395.933364][T19543] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff8a683d20 [ 395.941406][T19543] R13: ffffffff90ae9880 R14: ffffffff90271300 R15: ffff888020d1c660 [ 395.945185][T19552] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 395.949573][T19543] FS: 00007f8abdbb6700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 395.949603][T19543] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 395.949620][T19543] CR2: 00007ffef81e0788 CR3: 00000000191e6000 CR4: 00000000001506f0 [ 395.949638][T19543] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 395.992181][T19543] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 396.000165][T19543] Call Trace: [ 396.003472][T19543] ? mark_lock+0xef/0x17b0 [ 396.007940][T19543] ? __kernel_text_address+0x9/0x30 [ 396.013319][T19543] ? unwind_get_return_address+0x51/0x90 [ 396.019076][T19543] ? create_prof_cpu_mask+0x20/0x20 [ 396.024472][T19543] ? is_dynamic_key+0x1a0/0x1a0 [ 396.029345][T19543] ? lock_chain_count+0x20/0x20 [ 396.034220][T19543] __lock_acquire+0x102/0x5230 [ 396.039127][T19543] ? aa_profile_af_perm+0x2e0/0x2e0 [ 396.044349][T19543] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 396.050496][T19543] ? tomoyo_check_inet_address+0xe6/0x710 [ 396.056240][T19543] lock_acquire+0x1ab/0x740 [ 396.060768][T19543] ? lock_sock_nested+0x40/0x120 [ 396.065725][T19543] ? lock_release+0x720/0x720 [ 396.070610][T19543] _raw_spin_lock_bh+0x2f/0x40 [ 396.075479][T19543] ? lock_sock_nested+0x40/0x120 [ 396.080442][T19543] lock_sock_nested+0x40/0x120 [ 396.085319][T19543] inet_autobind+0x1a/0x190 [ 396.090108][T19543] inet_send_prepare+0x36d/0x4d0 [ 396.095157][T19543] inet6_sendmsg+0x3f/0xe0 [ 396.099685][T19543] ? inet6_compat_ioctl+0x310/0x310 [ 396.105189][T19543] sock_sendmsg+0xcf/0x120 [ 396.109712][T19543] ____sys_sendmsg+0x331/0x810 [ 396.114499][T19543] ? kernel_sendmsg+0x50/0x50 [ 396.119221][T19543] ? do_recvmmsg+0x6d0/0x6d0 [ 396.123834][T19543] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 396.129922][T19543] ___sys_sendmsg+0xf3/0x170 [ 396.134535][T19543] ? sendmsg_copy_msghdr+0x160/0x160 [ 396.139970][T19543] ? __fget_light+0xea/0x280 [ 396.144591][T19543] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 396.150862][T19543] __sys_sendmmsg+0x195/0x470 [ 396.155574][T19543] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 396.160705][T19543] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 396.166808][T19543] ? find_held_lock+0x2d/0x110 [ 396.171704][T19543] ? __context_tracking_exit+0xb8/0xe0 [ 396.177190][T19543] ? lock_downgrade+0x6e0/0x6e0 [ 396.182147][T19543] ? lock_downgrade+0x6e0/0x6e0 [ 396.187056][T19543] __x64_sys_sendmmsg+0x99/0x100 [ 396.192100][T19543] ? syscall_enter_from_user_mode+0x27/0x70 [ 396.198249][T19543] do_syscall_64+0x3a/0xb0 [ 396.202696][T19543] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 396.208609][T19543] RIP: 0033:0x4665d9 [ 396.212645][T19543] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 396.232620][T19543] RSP: 002b:00007f8abdbb6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 396.241058][T19543] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 396.249046][T19543] RDX: 0000000000000001 RSI: 00000000200018c0 RDI: 0000000000000008 [ 396.257470][T19543] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 396.265632][T19543] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c038 [ 396.273618][T19543] R13: 00007fff5ba6e9ff R14: 00007f8abdbb6300 R15: 0000000000022000 [ 396.281628][T19543] Kernel panic - not syncing: panic_on_warn set ... [ 396.288230][T19543] CPU: 0 PID: 19543 Comm: syz-executor.2 Not tainted 5.13.0-rc3-syzkaller #0 [ 396.297323][T19543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.307423][T19543] Call Trace: [ 396.310825][T19543] dump_stack+0x141/0x1d7 [ 396.315189][T19543] panic+0x306/0x73d [ 396.319136][T19543] ? __warn_printk+0xf3/0xf3 [ 396.323928][T19543] ? __warn.cold+0x1a/0x44 [ 396.328358][T19543] ? register_lock_class+0x1fb/0x1180 [ 396.333852][T19543] __warn.cold+0x35/0x44 [ 396.338118][T19543] ? register_lock_class+0x1fb/0x1180 [ 396.343517][T19543] report_bug+0x1bd/0x210 [ 396.348035][T19543] handle_bug+0x3c/0x60 [ 396.352244][T19543] exc_invalid_op+0x14/0x40 [ 396.356795][T19543] asm_exc_invalid_op+0x12/0x20 [ 396.361821][T19543] RIP: 0010:register_lock_class+0x1fb/0x1180 [ 396.367830][T19543] Code: 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 98 0c 00 00 4d 3b 67 18 74 0b 49 81 3f c0 a3 42 8f 74 02 <0f> 0b 85 ed 0f 84 20 01 00 00 f6 44 24 04 01 0f 85 15 01 00 00 83 [ 396.388029][T19543] RSP: 0018:ffffc90011267630 EFLAGS: 00010002 [ 396.394219][T19543] RAX: dffffc0000000000 RBX: 1ffff9200224cecd RCX: ffffffff90774720 [ 396.402206][T19543] RDX: 1ffff110041a38cf RSI: 0000000000000000 RDI: ffff888020d1c678 [ 396.411496][T19543] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 396.419583][T19543] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff8a683d20 [ 396.427562][T19543] R13: ffffffff90ae9880 R14: ffffffff90271300 R15: ffff888020d1c660 [ 396.435687][T19543] ? mark_lock+0xef/0x17b0 [ 396.440132][T19543] ? __kernel_text_address+0x9/0x30 [ 396.445461][T19543] ? unwind_get_return_address+0x51/0x90 [ 396.451328][T19543] ? create_prof_cpu_mask+0x20/0x20 [ 396.456643][T19543] ? is_dynamic_key+0x1a0/0x1a0 [ 396.461521][T19543] ? lock_chain_count+0x20/0x20 [ 396.466423][T19543] __lock_acquire+0x102/0x5230 [ 396.471219][T19543] ? aa_profile_af_perm+0x2e0/0x2e0 [ 396.476441][T19543] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 396.482448][T19543] ? tomoyo_check_inet_address+0xe6/0x710 [ 396.488193][T19543] lock_acquire+0x1ab/0x740 [ 396.492805][T19543] ? lock_sock_nested+0x40/0x120 [ 396.497757][T19543] ? lock_release+0x720/0x720 [ 396.502467][T19543] _raw_spin_lock_bh+0x2f/0x40 [ 396.507246][T19543] ? lock_sock_nested+0x40/0x120 [ 396.512199][T19543] lock_sock_nested+0x40/0x120 [ 396.516983][T19543] inet_autobind+0x1a/0x190 [ 396.521505][T19543] inet_send_prepare+0x36d/0x4d0 [ 396.526463][T19543] inet6_sendmsg+0x3f/0xe0 [ 396.531017][T19543] ? inet6_compat_ioctl+0x310/0x310 [ 396.536237][T19543] sock_sendmsg+0xcf/0x120 [ 396.540696][T19543] ____sys_sendmsg+0x331/0x810 [ 396.545479][T19543] ? kernel_sendmsg+0x50/0x50 [ 396.550176][T19543] ? do_recvmmsg+0x6d0/0x6d0 [ 396.554876][T19543] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 396.560891][T19543] ___sys_sendmsg+0xf3/0x170 [ 396.565502][T19543] ? sendmsg_copy_msghdr+0x160/0x160 [ 396.570829][T19543] ? __fget_light+0xea/0x280 [ 396.575525][T19543] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 396.581877][T19543] __sys_sendmmsg+0x195/0x470 [ 396.586572][T19543] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 396.591617][T19543] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 396.597645][T19543] ? find_held_lock+0x2d/0x110 [ 396.602520][T19543] ? __context_tracking_exit+0xb8/0xe0 [ 396.608091][T19543] ? lock_downgrade+0x6e0/0x6e0 [ 396.612971][T19543] ? lock_downgrade+0x6e0/0x6e0 [ 396.617942][T19543] __x64_sys_sendmmsg+0x99/0x100 [ 396.622915][T19543] ? syscall_enter_from_user_mode+0x27/0x70 [ 396.629132][T19543] do_syscall_64+0x3a/0xb0 [ 396.633595][T19543] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 396.639593][T19543] RIP: 0033:0x4665d9 [ 396.643538][T19543] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 396.663788][T19543] RSP: 002b:00007f8abdbb6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 396.672230][T19543] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 396.680220][T19543] RDX: 0000000000000001 RSI: 00000000200018c0 RDI: 0000000000000008 [ 396.688316][T19543] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 396.696421][T19543] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c038 [ 396.704414][T19543] R13: 00007fff5ba6e9ff R14: 00007f8abdbb6300 R15: 0000000000022000 [ 396.713299][T19543] Kernel Offset: disabled [ 396.717778][T19543] Rebooting in 86400 seconds..