nt_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) getdents64(r0, &(0x7f0000000000)=""/127, 0x7f) 05:03:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {&(0x7f0000000280), 0xffffffffffffffff, 0x1}}, 0x18) 05:03:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='stat\x00') poll(&(0x7f0000000000), 0x0, 0xb439) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:03:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24, 0x4}], 0x10}}], 0x1, 0x0) [ 584.044720][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {&(0x7f0000000280), 0xffffffffffffffff, 0x1}}, 0x18) 05:03:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000001380)='/dev/vfio/vfio\x00', 0x80000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001140)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) syz_open_dev$media(&(0x7f00000011c0)='/dev/media#\x00', 0x80000000, 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000001200)='/dev/sequencer\x00', 0x400000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001240)='/dev/btrfs-control\x00', 0x40, 0x0) syz_open_dev$media(&(0x7f0000001280)='/dev/media#\x00', 0x1000, 0x4000) syz_open_dev$dspn(&(0x7f00000012c0)='/dev/dsp#\x00', 0x3ff, 0x0) socket$tipc(0x1e, 0x2, 0x0) r0 = syz_open_dev$audion(&(0x7f0000001300)='/dev/audio#\x00', 0x4, 0x80001) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') preadv(r1, &(0x7f0000001180)=[{&(0x7f0000000040)=""/142}, {&(0x7f0000000140)=""/4096, 0x69}], 0xe48cc69afa7fce78, 0x0) 05:03:09 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24, 0x40000}], 0x10}}], 0x1, 0x0) 05:03:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {&(0x7f0000000280), 0xffffffffffffffff, 0x1}}, 0x18) [ 584.308738][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgToups\x00') openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x103000, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:03:09 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, 0x0, 0x0, 0x0) 05:03:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {&(0x7f0000000280), 0xffffffffffffffff, 0x1}}, 0x18) 05:03:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24, 0x4000000000000}], 0x10}}], 0x1, 0x0) 05:03:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)={0x0, r1}) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:03:09 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/78}, {&(0x7f0000000100)=""/92}, {&(0x7f0000000240)=""/39, 0xffffffffffffffe5}, {&(0x7f0000000280)=""/17}], 0x1123, 0x4) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='stat\x00') ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000180)={0xffffffffffff257b, 0x1}) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f00000001c0)='\x00', 0x1) preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:03:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3f, 0x2000) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 584.973156][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 585.003559][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:10 executing program 2 (fault-call:3 fault-nth:0): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {&(0x7f0000000280), 0xffffffffffffffff, 0x1}}, 0x18) 05:03:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24, 0x0, 0x4}], 0x10}}], 0x1, 0x0) [ 585.240359][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 585.314418][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:10 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8), 0x8, 0x0) 05:03:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {&(0x7f0000000280), 0xffffffffffffffff, 0x1}}, 0x18) 05:03:10 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x40000000000000, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) fcntl$setlease(r0, 0x400, 0x3) 05:03:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24, 0x0, 0x40000}], 0x10}}], 0x1, 0x0) 05:03:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {&(0x7f0000000280), r1, 0x1}}, 0x18) 05:03:11 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000040)={0xffffffffffffff20, 0x5}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r2, 0x0) 05:03:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x40400) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f00000000c0)=[r0], 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00\x99\x0eg>\x05\x90\x8e$#\x9a\x16\x1a\xbeE?4\x80u\x8b\x12\x8fqHv\xd4\xb1V8\x90>fQ\x924I\xe3VN<2~b\xd8Q3\xc1)\xf0g\xf7_[v1\xbf-\xa5I\xcf\r_\xfc\x9d\x9c\x067n\x8b\xdd\x97l.L2-{\xf6C\xd1\xbe\xbd\xa3\xc6<\n\xfcSJ\xc4\xe0Z\xec\x9c$sZ\xcar\xf2\xc7\xc3\x9b\xcf@\xe7\r|\xd9\x1e\t)\xb7\x1c') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:03:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24, 0x0, 0x4000000000000}], 0x10}}], 0x1, 0x0) 05:03:11 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8), 0x8, 0x0) 05:03:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {&(0x7f0000000280), r1, 0x1}}, 0x18) 05:03:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0xf) setresuid(0x0, 0xee01, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) setresuid(0x0, 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:03:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0xf}}], 0x1, 0x0) 05:03:11 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10000, 0x200) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='self\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r1, r2, 0x0) 05:03:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {&(0x7f0000000280), r1, 0x1}}, 0x18) 05:03:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200000, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') preadv(r2, &(0x7f0000000480), 0x0, 0x40000000000000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x4) 05:03:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x24}}], 0x1, 0x0) 05:03:12 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x240400, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x80000000, 0x2) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000080)={0x0, r3}) dup3(r0, r1, 0x0) 05:03:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:12 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8), 0x8, 0x0) 05:03:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0x7, {&(0x7f0000000280), r1, 0x1}}, 0x18) 05:03:12 executing program 4: socket$isdn_base(0x22, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) prlimit64(r0, 0xf, &(0x7f0000000040)={0x4, 0x7843}, &(0x7f0000000080)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000140)=@rc, &(0x7f00000000c0)=0x80, 0x80000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x8003, 0x0) write$9p(r1, &(0x7f00000002c0)="0238c3199cf80aebd08852d76045d65b15c023c173ea721913bd8bb5ef05bc2695a229d191c71adb374a23841389495027601c8d42daf6129d1e3582a731ae13c712b22bcb230218", 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x3, 0x2) setsockopt$TIPC_MCAST_BROADCAST(r3, 0x10f, 0x85) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000240)=0x80000000, 0x4) 05:03:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x20000710}}], 0x1, 0x0) 05:03:12 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x101000, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000080)) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x9, 0x100) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r2, 0x0) [ 587.722967][ C1] net_ratelimit: 10 callbacks suppressed [ 587.722978][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 587.745171][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0x7, {&(0x7f0000000280), r1, 0x1}}, 0x18) 05:03:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0xd00, 0x0) setsockopt$sock_int(r1, 0x1, 0x3f, &(0x7f00000004c0)=0x7ff, 0x4) openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) rt_sigaction(0x0, &(0x7f0000000080)={&(0x7f0000000000)="262e666cc4a27921e0c441fc28f0c4c2f9477200c4c1fc2ec0c4e31d0d99ff61ffff0e67400f38cd997c5c0000c40281aa1347c0667307c4627d1e27", {0x80000001}, 0x80000001, &(0x7f0000000040)="40a7c4816dd2718336f20fd09df600000044c6c3c72e0fa7c090c461fe2d6d2766410f16559c660f3a0de1f70f41cd"}, &(0x7f0000000180)={&(0x7f00000000c0)="440f0d4c5e6b644600fc65fe470043d033480fae724b8e0a879d5c7f0000f36dd9c936f043839b6556666627", {}, 0x0, &(0x7f0000000140)="8f09580172eff2a6c40315483e05c463050f6e5d00c4412b5da7c7cc45d3c4427d19fb41b400dbe1c481fb599c37611b0000c4a2b1bd5ec0"}, 0x8, &(0x7f00000001c0)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x100000001, 0x2800) preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e24, @loopback}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, 0x629ffa66}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@loopback, @in6=@empty}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000400)=0xe8) r3 = getpgrp(0x0) ptrace$getenv(0x4201, r3, 0xc9fd, &(0x7f0000000480)) socket$inet_udp(0x2, 0x2, 0x0) 05:03:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10, 0x4}}], 0x1, 0x0) 05:03:13 executing program 2: r0 = socket(0x200000000010, 0x3, 0x0) write(r0, &(0x7f0000000280)="2400000052001f0014f9f407112c04091c0f07ed070001000a0000000900000000000000", 0x24) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r1, r2, 0x0) 05:03:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) [ 588.077074][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10, 0x40000}}], 0x1, 0x0) 05:03:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000480)={{}, {0x20000000304, @local}, 0x0, {0x2, 0x0, @empty}, 'lapb0\x00'}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @empty}, {0x0, @remote}, 0x0, {0x2, 0x0, @broadcast}, 'gretap0\x00'}) 05:03:13 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup3(r1, r0, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0x7, {&(0x7f0000000280), r1, 0x1}}, 0x18) 05:03:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') preadv(r0, &(0x7f00000000c0), 0x0, 0x800000000000) fchdir(r0) 05:03:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) [ 588.711481][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000000)={0xf, @pix={0x9, 0x4, 0x3435375f, 0x0, 0x8, 0x3f, 0x9, 0xfffffffffffffff8, 0x1, 0x3, 0x3, 0x7}}) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:03:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10, 0x4000000000000}}], 0x1, 0x0) 05:03:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 05:03:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffa000/0x3000)=nil) shmat(0x0, &(0x7f0000ff8000/0x4000)=nil, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0xf92ba7d34d35b2df, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 05:03:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$sock_netdev_private(r1, 0x89f9, &(0x7f0000000280)="0faad241d4f20ada81ddcc895b119e1ba423f20b9d4165c4dbbf6a02faad20452c37d4ca3409d43f35eedd5e8d41508e9203b19c1ca2d144cda83aa25e321c6e00221a3c757d6546b976c6d5d95dc0e78eb81f5f6146fc446363a7da45a0de6ab62dfa5bcc25b6ddd8281472b2a41fb54738a7fa508a2fe48ed0a68a") recvfrom$netrom(r1, &(0x7f0000000000)=""/77, 0x4d, 0x140, &(0x7f0000000080)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) fcntl$addseals(r1, 0x409, 0x2) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000300), &(0x7f0000000380)=0x60) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000003c0)={0x7, {{0xa, 0x4e22, 0x1ff, @mcast2, 0x6}}, 0x0, 0x1, [{{0xa, 0x4e23, 0x3, @remote, 0x3}}]}, 0x110) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, [], [{0x3ff, 0xff, 0x5, 0xffff, 0xfdf, 0xfff}, {0x1000, 0x6, 0x4, 0xff, 0xfff, 0x5}], [[], []]}) 05:03:14 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0xffffffffffffffd8, 0xfa00, {0x200, &(0x7f0000000600), 0x113}}, 0x127) r2 = dup3(r0, r1, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)=0x0) syz_open_procfs(r3, &(0x7f0000000280)='nH\x9f\x95P\x95\xa6>\xb7bles_targ]ts\x00\xc0\x1aK\xaf\xc7\x98Ou7\x1c\xe5\xd0F\xb7\x1e\xc8\xe5\xe1&<\fFRfZPp\x8f\x92\xb2<_\xab6\xdb\xe97\n\xf9\x021t)\xeeQ\xc0\xa5S\n\xbaT\x89\"\xcc(=zSC\xe7?G\x1b\x9a\x8f\xad\x993\x85n9\t\\\xe6-F\x7f0\x14\x06y\xd0\xf5v\x7f\x95\a\xdc\xb3wz\xae\xbcY\xa1\xf4!\xaaB\x915\b\xdcs\xb7\xd6\xe0B\xe8\xdd\xb3\xc9\x8d\xdb\\{VL\x9d\x82.5\xeb\\s\xd7p\xea\b\xb6\x80\xf4\t6\xdc\x0fUJDW\xd5\xd3\x87\xc4\x02\xea\x83<\x9c=\"z8\xe9nT\x8eZ\xde\vL\xd5{$\xf45\xa6\xd5\x102\x00\x00\x9fW&\xc8U\xdc:\x99n\x9d\xcf\xba\xaa#\xf0\xe53J\x16\xae+\x832\x14y)Vg\xd2()P\xb5\xfd\x03\xb31kc\xb26Qv\f\x87\xf4%:\xc8Q\xd0u\x9e\xd5\xca\x9dJ\x8aw\x10\x16\x1c\x8e#\x04\x00\x00\x00S\xc4\xce\'\x17\x89\x82\xa1=\x86\x97\xbb\xed\xc6\x97K\xf4\xb2\x82\xa1\x82\x16G\xdf\xe6\xd7-\xd9\xd0\x8e\xc0EK\xac\xd5G&J\xdb\xc6\xb1P\xf8\x06\xf9\xfe\x11\x1d\xdd\x84C\xf8_Q\xf19\xae\xa3\xf8\x91\xfc\vX\xe29L\xdaQ\tH$um\xe1\xb7\xd64o\x825\xd2\xc2\xca7\xd5\xab\x86\x9efHf\xf5\xdf\xd5^EPq\xbeX\x838\"*\x1d\xd0\x8bm\xc6M\xa5\x89\xbe\xef\xd0\x9f\xecdg\xad\xa3\xc1\xd7') [ 589.093949][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 05:03:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0xfffffffffffffffe, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000140)) r1 = accept$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x9) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080)=0x8, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:03:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10, 0x0}}], 0x1, 0x0) 05:03:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:14 executing program 2: socketpair(0x10, 0xa, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x4869a5b9, {0x6, 0x0, 0x62, 0xf1ab, 0x1, 0x8}, 0x25, 0x3}, 0xe) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x6, 0x2000) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r2, r3, 0x0) 05:03:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:14 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000000)={@remote}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) getegid() fcntl$setstatus(r0, 0x4, 0x40c00) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001740)={{{@in=@initdev, @in6=@local}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, 0x0) geteuid() r2 = socket(0x0, 0x80807, 0x10004) syz_genetlink_get_family_id$ipvs(&(0x7f00000014c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000001580)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x2000080000}, 0xc, &(0x7f0000001540)={&(0x7f00000015c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000}, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) readv(r0, &(0x7f00000013c0)=[{&(0x7f0000000080)=""/104, 0x68}, {0x0}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/167, 0xa7}, {&(0x7f0000001340)=""/19, 0x13}, {&(0x7f0000001380)=""/63, 0x3f}], 0x7) [ 589.579209][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffa000/0x3000)=nil) shmat(0x0, &(0x7f0000ff8000/0x4000)=nil, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0xf92ba7d34d35b2df, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 05:03:15 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f, 0x1}}, 0x20) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x20c00) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) mq_notify(r2, &(0x7f00000000c0)={0x0, 0x20, 0x200, @tid=r3}) dup3(r0, r1, 0x0) 05:03:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, 0xffffffffffffffff, 0x1}}, 0x18) 05:03:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10, 0x0}}], 0x1, 0x0) 05:03:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) [ 590.045638][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, 0xffffffffffffffff, 0x1}}, 0x18) 05:03:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10, 0x0}}], 0x1, 0x0) 05:03:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:15 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x500, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='io.weight\x00', 0x2, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-monitor\x00', 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x40, 0x2000) timerfd_gettime(r2, &(0x7f00000000c0)) bind$alg(r1, &(0x7f00000003c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l\x00'}, 0x58) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f0000000040)={0x5c3, 0x4, 0x7, 0x5, 0x2, 0x6, 0x4}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e21, 0xd902, @remote, 0x9}}, 0xfffffffffffffffa, 0xef, 0x97, 0x1ff}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r4, 0x1000}, &(0x7f0000000200)=0x8) r5 = dup3(r0, r3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r5, 0x101, 0x71, 0x6, 0x2}) 05:03:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 05:03:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, 0xffffffffffffffff, 0x1}}, 0x18) [ 590.364392][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffa000/0x3000)=nil) shmat(0x0, &(0x7f0000ff8000/0x4000)=nil, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0xf92ba7d34d35b2df, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 05:03:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}, 0x4}], 0x1, 0x0) 05:03:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) 05:03:16 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f00000001c0)={0x1, {0x0, 0x989680}, 0x1, 0x81}) chdir(&(0x7f0000000280)='./file0\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) socket(0xf, 0x6, 0xfffffffffffffff9) r3 = dup3(r0, r2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r3, 0x40405515, &(0x7f0000000080)={0x6eb, 0x4, 0xfffffffffffffff8, 0x1f, 'syz1\x00', 0x4}) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000000)=0x0) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000040)=r4) [ 590.989928][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(0xffffffffffffffff, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) 05:03:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}, 0x40000}], 0x1, 0x0) 05:03:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(0xffffffffffffffff, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:16 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x102}}, 0x20) r2 = dup3(r0, r1, 0x3) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4002}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0xe4, r3, 0x302, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x800}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @loopback}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7f}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffffff9}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x19d0}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xee}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4196}]}, 0xe4}, 0x1, 0x0, 0x0, 0x40000c0}, 0x40000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x53ee}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=r4, @ANYBLOB="8f0004000100070002009248e086c591"], &(0x7f00000000c0)=0x10) [ 591.334363][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:16 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0x0, 0x6}, 'port1\x00', 0x0, 0x100000, 0x2, 0x6a9, 0x8000, 0x8, 0xb2, 0x0, 0x2, 0x3}) 05:03:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) 05:03:16 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x17}}, {0x0, @random="2d1b78819254"}, 0x22, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 'ipddp0\x00'}) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='-vboxnet0\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f00000011c0)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, 0x0, &(0x7f0000001240)) write(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x1, 0x0) 05:03:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(0xffffffffffffffff, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:16 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pwritev(r0, &(0x7f0000000100)=[{&(0x7f00000002c0)="f6b9a40ac0e7b5043650c3fe19fe329f5cd17aa5b3aa62a2b41186088f642f74fbfa903a8c3a36385ae302735c68aa563980bf6c7466344b1e8a526a77bddd4f9b1edea240b94e95d5429b40ecc9422a39d7004ea1af25dd4f7ee3a17f6a73a62901017c79c9d1", 0x67}], 0x1, 0x4000000000000000) r1 = socket$unix(0x1, 0x200000000000003, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @empty}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @timestamp, @sack_perm], 0x2f) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x9, 0xb}, 0x14) shutdown(r2, 0x1) 05:03:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}, 0x4000000000000}], 0x1, 0x0) 05:03:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0xa, 0x4, 0x400}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 05:03:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x9c}, {0x80000006}]}, 0x10) 05:03:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}, 0x0}], 0x1, 0x0) 05:03:17 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socketpair(0x6, 0x0, 0xfffffffffffffff7, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x4c}, {0x80000006}]}, 0x10) 05:03:17 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x17}}, {0x0, @random="2d1b78819254"}, 0x22, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 'ipddp0\x00'}) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='-vboxnet0\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f00000011c0)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, 0x0, &(0x7f0000001240)) write(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x1, 0x0) 05:03:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0xac}, {0x80000006}]}, 0x10) 05:03:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x48}, {0x80000006}]}, 0x10) 05:03:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}, 0x0}], 0x1, 0x0) 05:03:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:17 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000080)={0x1}) dup3(r0, r1, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x400) 05:03:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) [ 592.895655][ C0] net_ratelimit: 2 callbacks suppressed [ 592.895666][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400900000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_int(r0, 0x29, 0x5, 0x0, 0x0) tkill(r2, 0x19) ptrace$setopts(0x4206, r2, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000180), 0xb262218c0733b6fa) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") 05:03:18 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0xa0}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 05:03:18 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ipddp0\x00'}) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc8000, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000100)) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f0000000080)) dup3(r1, r3, 0x0) 05:03:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}, 0x0}], 0x1, 0x0) 05:03:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) [ 593.313255][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:18 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') prctl$PR_SET_FP_MODE(0x2d, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) chroot(0x0) write$P9_RREAD(r0, 0x0, 0x0) getegid() 05:03:18 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x0, 0x0, 0xe2}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r1 = syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x0) 05:03:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x2, 0x0) 05:03:18 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8000, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000000c0)=[0x1, 0x3]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r3 = dup3(r0, r1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000000)={r3}) 05:03:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x54}, {0x80000006}]}, 0x10) 05:03:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup2(r0, r0) read$eventfd(r1, &(0x7f0000000000), 0xfd8e) [ 593.841344][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x3b6, &(0x7f00000000c0)={&(0x7f0000000640)={0x14, 0x16, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 05:03:19 executing program 1: 05:03:19 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x1) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r1, r2, 0x0) 05:03:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x300, 0x0) 05:03:19 executing program 1: 05:03:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:19 executing program 3: [ 594.187447][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:19 executing program 1: 05:03:19 executing program 3: 05:03:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:19 executing program 4: 05:03:19 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) dup3(r0, r1, 0x2) 05:03:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x4) 05:03:19 executing program 1: 05:03:19 executing program 3: 05:03:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:20 executing program 3: [ 594.947891][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:20 executing program 1: 05:03:20 executing program 4: 05:03:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:20 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x39, 0x7fff, "138a4a975819e407f8f0a2a2ada45c4a43cbbc6c1c66c2b44a8c93c18f12312e45a10c86230ebf99c0f0843c793c87027b"}, 0x420000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) modify_ldt$write2(0x11, &(0x7f0000000000)={0xfff, 0x1000, 0x400, 0x1400000000000, 0x5, 0x401, 0x120000000, 0x81, 0x5, 0x6}, 0x10) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f00000000c0)={0xa8}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x9, 0x3, 0x318, 0x160, 0x0, 0x160, 0x0, 0x160, 0x248, 0x248, 0x248, 0x248, 0x248, 0x3, &(0x7f0000000100), {[{{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xc}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x1, 0x1f, 0x3f}}}, {{@ipv6={@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0xff000000, 0xff, 0xffffffff, 0x131a195290f4a70b], [0xff000000, 0x0, 0xffffffff, 0xffffff00], 'syzkaller1\x00', 'gre0\x00', {0xff}, {0xff}, 0x4, 0xffffffffffff4855, 0x1, 0x4}, 0x0, 0xc8, 0xe8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) dup3(r0, r1, 0x0) 05:03:20 executing program 4: 05:03:20 executing program 3: 05:03:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x40000) 05:03:20 executing program 1: 05:03:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:20 executing program 3: 05:03:20 executing program 1: 05:03:20 executing program 4: [ 595.434369][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:20 executing program 3: 05:03:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:20 executing program 1: 05:03:20 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0xffffffffffffb781, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r1, 0x3, 0x8, [0x4, 0x80000000, 0x0, 0x1, 0x1, 0x7f, 0x1, 0x81]}, &(0x7f00000000c0)=0x18) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r2, r3, 0x0) 05:03:20 executing program 4: 05:03:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x4000000000000) 05:03:20 executing program 4: 05:03:20 executing program 1: 05:03:20 executing program 3: 05:03:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) [ 595.852531][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:21 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = dup3(r0, r1, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000000)=0x6, 0x4) 05:03:21 executing program 1: 05:03:21 executing program 4: 05:03:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:21 executing program 3: 05:03:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = creat(&(0x7f0000001140)='./file0\x00', 0x5) write$vnet(r2, &(0x7f0000000100)={0x1, {0x0, 0x0, 0x0}}, 0x68) close(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:21 executing program 4: 05:03:21 executing program 1: 05:03:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:21 executing program 3: 05:03:21 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) rt_sigaction(0x3a, &(0x7f00000001c0)={&(0x7f0000000080)="ff9322a20000c483817ca83223333300dbf5d9eb66450fddad1f251cfcd8ebc483c9207ac4df98c4c3ad409249370000763666470fd1e6", {0x800}, 0x40000000, &(0x7f00000000c0)="c4a3fd68ad8e704cab00c402199b3b3626f042018c912a000000676567f3a5f00fc7890e000000470f2f0f670f01dcc01c687cc4e3cd0bad0000000006c4814d73f908"}, &(0x7f00000002c0)={&(0x7f0000000200)="c40165d0326745dbd1c4a3c10cdbc746d9eec482f5969f6ec40000c4217e1015f339be0766430f384104c6c4e17459636fc4019155bb2c670000c4e1fc29e1", {}, 0x0, &(0x7f0000000280)="410f18e10feb28d198f8e4b82b4e0faeb0a6000000c4c35d7963fe00f3460f18d3644663c1c4627918f53ef30f5bc8366566460f3a163e07"}, 0x8, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x800004000, &(0x7f0000000000), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:21 executing program 1: 05:03:21 executing program 3: 05:03:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:21 executing program 4: 05:03:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:21 executing program 4: 05:03:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x402002, 0x80) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000100)={r1}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000180)={0x50, @time, 0x0, {0x800000000, 0x100}, 0x0, 0x0, 0x100}) 05:03:22 executing program 3: 05:03:22 executing program 1: 05:03:22 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7ff, 0x100) write$P9_RREADLINK(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="1000000817020007002e2f66696cee7972c661"], 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r3 = dup3(r0, r2, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000000)={0x51, 0x9, 0x7860, {0x7ff, 0x1}, {0x400, 0x4}, @ramp={0x3f, 0x0, {0x0, 0x5, 0x6f, 0xff}}}) 05:03:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:22 executing program 4: 05:03:22 executing program 1: 05:03:22 executing program 3: [ 597.190675][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:22 executing program 4: 05:03:22 executing program 1: 05:03:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$sock(r0, &(0x7f00000007c0)={&(0x7f0000000180)=@in6={0xa, 0x4e23, 0x8, @mcast1, 0x2}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000100)="5971e63526d622ad6ce05af45f4a69fe2bfcb27f789558", 0x17}, {&(0x7f0000000200)="df1f2e1c224d215481e4e3fff99cd1abd573e0218df7d65f4bbc79882505cdbef3a8c75e2a4e99d0f957853c83d181", 0x2f}, {&(0x7f0000000240)="33cdc18ccd3ce8178f53824863f0e60b24c44e15d4170af3e8b2de5fab07724ecce29f4dce67c64ff6a12da3ac6a59812d3b35a89ef549d6d5f636ab80e61f290b44baf6f9f2b325a0b72f3a412507b9227c7c32f473baac823dee07bf6b049cafc8215549e10edeb6f9c8bf14993051a255a01caad1933302639ca5f7c65041d356422f2e4c2d9a43219003e3d30f2aae1f6ccdde24cc142a65c1a8c722be8b8deb0880a55616ff30ea7002c5f37123be96abf00fb55d7c2c0eb3f25ec6a977e091164fa7147aac101fe333e5fb55e724c2fcb240f317ef006aa80456", 0xdd}, {&(0x7f0000000340)="53abd5763e0887b5368284082446b10e04b8e147c3a42165526a3269c1b2a51543c4406bd7753b52a23c6e185819adbb1b2295affa1f9ef3caf8bd2eaf57c984f4f34e1e92128e34401606345d2a42d71999a40985217a2a307c9406056ad4bb97b13a5ad5787bf66e7213234298546779be691c88cdf00e8f8f4c5c9fbc5cc365f5197d2396c2b0f4fe88ed3225874c1ed29c7f230492aa30e4ed15730f6473e98226c166d5e7fa2299df7e1ece189ad299d613db94c15a40d34b040113717faf", 0xc1}, {&(0x7f0000000440)="06b9efa2eb109f7d58e8107374b74a8a2f09b3d8d1f291d23d1d58fee82f2da8f81dbaf0cac12d2c790cba93d835", 0x2e}, {&(0x7f0000000480)="485b181c0e2f0cdbdc9cfb5aa69caac86af7e3de9bff7ad6eb4f17653af7c833155e6fb572810125fcbfe9399f24a948c6253a7ab5593435143c16ad9ddc99ddbdaa6228c4eadbf8b20e0c058520c1acac9e1788226a755e8f76f8a11640707213f7713439b2d8df329e22f9a6", 0x6d}, {&(0x7f0000000500)="d1def4b3568262c4f8139c19c100d32bced00032f144948e147588353a4a365971e57f6212d7b04c85c88188b40bed942e89ab63d25d34f5a573532ebe206be6e954894b5e879a7fcc9191ae1e2bc5b7b0acbcf0584460643df723de8d8fcf068eb962116f0d8c2a08", 0x69}, {&(0x7f0000000580)="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", 0xfc}], 0x8, &(0x7f0000000740)=[@txtime={{0x18, 0x1, 0x3d, 0xffffffffffffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x400}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x48}, 0x4000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x22200, 0x80) mknodat(r2, &(0x7f0000000080)='./file0\x00', 0xd020, 0x320) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000800)=0x0) ioprio_get$pid(0x3, r3) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:22 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sendmsg$inet(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="64d230eec2b11e535dae5dcfa80b52de6410f813e6d219d50c1c82188368edce19a434fc69f576994904844c95e025c78040283d3cfe0558cbdbc676bc7ac998287a16f97992588a10019eb476da40cd82af6abdf4313078f3a0269d17a9db8ccb25e129f1ad999ab0909ae41c2ea7a77c0ce83f1a41a704af8c51e983432bb9c5546f8d4cbcf3c94e2ff4d80ba0acbfa12d8e157d761e1ac8ace8159119d8cebaddef74c4fb0b3e39fc2f61eb0a40b42f7ca9617454ad8c42b31f2e625765f8aebbcd89449120688f8bdf64f954228d", 0xd0}, {&(0x7f0000000280)="d34ef04ee2f462c786c9134a4bf0a412dd2f4dc7d9c6c5bf8f046d2df90ab50b2355d72f09fcd63dcaf8903377e149392d598f5c39f74ac7752fbce8d5b740c6758a77e35cc1ba92c822c0e62964de059c680618bc3764078d45a5ef4079dd7b420032d91bcbce212714269c863c9d1fb0d2ec2d5b9e1e1ba3ca22a438fe6a2904a16839adf6cf467a6073690d986c732585b4d8e2ddcff8", 0x98}, {&(0x7f00000001c0)="61fbfbaa54eced418bb0", 0xa}], 0x3, &(0x7f0000000340)=[@ip_retopts={{0x7c, 0x0, 0x7, {[@cipso={0x86, 0x26, 0x8, [{0x7, 0xb, "5532fbe9205ef600ec"}, {0x0, 0xa, "b7a044d1f1dbc1df"}, {0x6, 0xb, "6f39400e43868e79df"}]}, @rr={0x7, 0x17, 0x96c, [@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @local, @loopback, @local]}, @ra={0x94, 0x6, 0x7fffffff}, @ssrr={0x89, 0x1b, 0x2, [@multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @multicast1, @broadcast]}, @lsrr={0x83, 0xb, 0xb44, [@dev={0xac, 0x14, 0x14, 0x1c}, @multicast1]}]}}}, @ip_retopts={{0x70, 0x0, 0x7, {[@noop, @cipso={0x86, 0x5d, 0x7a02, [{0x1, 0x2}, {0x1, 0x6, "b4bcdab0"}, {0x7, 0xd, "7dc0f192e6b5c9abfafbcf"}, {0x5, 0xc, "d3237b99fd2ca126d4b8"}, {0x6, 0xd, "3921539a039f5baa868147"}, {0x7, 0xb, "9070a16b157c7a8e9b"}, {0x0, 0x6, "0b2e59ec"}, {0x7, 0xf, "7f59f79e8ae5ff5fe77c4096d8"}, {0x7, 0x9, "0493fee2aaca88"}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x100000000}}, @ip_retopts={{0x54, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x155, 0x0, 0x8f7a, [{[@broadcast], 0xffffffffffff161d}]}, @lsrr={0x83, 0x2b, 0xc, [@multicast1, @multicast1, @empty, @dev={0xac, 0x14, 0x14, 0x18}, @multicast1, @remote, @dev={0xac, 0x14, 0x14, 0x24}, @remote, @multicast1, @remote]}, @rr={0x7, 0xb, 0x81, [@multicast1, @empty]}, @noop]}}}], 0x160}, 0x8000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:22 executing program 3: 05:03:22 executing program 1: 05:03:22 executing program 4: [ 597.489752][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:22 executing program 1: 05:03:22 executing program 3: 05:03:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:22 executing program 4: 05:03:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:22 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000040)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000200)={r3, 0x1, 0x6, @broadcast}, 0x10) dup3(r0, r1, 0x0) 05:03:22 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='-vboxnet0\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x1, 0x2, [0x0, 0x12]}, &(0x7f00000011c0)=0xc) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000001200)={0x0, 0x6}, 0x0) write(r2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x5, 0x0, {}, 0xfffffffffffffffb, 0x9}) 05:03:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clock_nanosleep(0x9, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) [ 597.951094][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x48, 0x0, 0x0, 0xfffff01c}, {0x80000006}]}, 0x10) 05:03:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:23 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = dup3(r0, r1, 0x0) personality(0x604000b) ioctl$VIDIOC_G_TUNER(r2, 0xc054561d, &(0x7f0000000040)={0x4dd3, "31c84e73c45510d5b6c5dcaa49d1a4e363991c7c51ed1dc1af6cdbb6ad232ee8", 0x3, 0x40, 0x100000000, 0x85f4, 0x2, 0x2, 0x1e4c, 0x100000000000}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40, 0x0) 05:03:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x400200, 0x0) name_to_handle_at(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0800000075e09e2d"], &(0x7f00000001c0), 0x1000) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:23 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000080)=0x2, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") getsockopt$inet_int(r0, 0x0, 0x2, 0x0, &(0x7f0000000000)) 05:03:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x42000) r2 = memfd_create(&(0x7f0000000840)='em1*\x00', 0x0) pwritev(r2, &(0x7f0000000240)=[{&(0x7f0000000440)=',', 0x1}], 0x1, 0x4081806) sendfile(r0, r2, 0x0, 0x20020102000007) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0x4, 0x0, 0x0, 0x0) [ 598.295343][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:23 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setresuid(0x0, 0xee01, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:23 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) rt_sigaction(0x3a, &(0x7f00000001c0)={&(0x7f0000000080)="ff9322a20000c483817ca83223333300dbf5d9eb66450fddad1f251cfcd8ebc483c9207ac4df98c4c3ad409249370000763666470fd1e6", {0x800}, 0x40000000, &(0x7f00000000c0)="c4a3fd68ad8e704cab00c402199b3b3626f042018c912a000000676567f3a5f00fc7890e000000470f2f0f670f01dcc01c687cc4e3cd0bad0000000006c4814d73f908"}, &(0x7f00000002c0)={&(0x7f0000000200)="c40165d0326745dbd1c4a3c10cdbc746d9eec482f5969f6ec40000c4217e1015f339be0766430f384104c6c4e17459636fc4019155bb2c670000c4e1fc29e1", {}, 0x0, &(0x7f0000000280)="410f18e10feb28d198f8e4b82b4e0faeb0a6000000c4c35d7963fe00f3460f18d3644663c1c4627918f53ef30f5bc8366566460f3a163e07"}, 0x8, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x800004000, &(0x7f0000000000), 0x13f}}, 0x20) dup3(r0, r1, 0x0) [ 598.567517][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:23 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='-vboxnet0\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x1, 0x2, [0x0, 0x12]}, &(0x7f00000011c0)=0xc) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000001200)={0x0, 0x6}, 0x0) write(r2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x5, 0x0, {}, 0xfffffffffffffffb, 0x9}) 05:03:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e22, 0x10000, @empty, 0x8}, 0x1c) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f00000000c0)={0x27db, 0x6, 0x1, 0x0, 0x4, 0x0, 0x40, 0x7fffffff, 0x1, 0x8, 0x200, 0x8, 0x0, 0x2, 0x0, 0x5, 0x48, 0x80000000, 0x80}) listen(r1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r2) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="240000d96cabea697ea075b9cbaba77b3b80ac0000"], 0x10}}], 0x1, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000100)=0x80, 0x4) socket$inet6(0xa, 0x7, 0x4) 05:03:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:23 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) prctl$PR_CAPBSET_DROP(0x18, 0x0) r2 = dup3(r0, r1, 0x0) execveat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=[&(0x7f00000000c0)='security.evm\x00'], &(0x7f0000000300)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='posix_acl_accessppp0cgroup\x00', &(0x7f0000000280)='ppp0\x00', &(0x7f00000002c0)='security.evm\x00'], 0x400) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@sha1={0x1, "6bc17f46c0b789119cc1b229cf81ea53a53785e8"}, 0x15, 0x2) 05:03:23 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) rt_sigaction(0x3a, &(0x7f00000001c0)={&(0x7f0000000080)="ff9322a20000c483817ca83223333300dbf5d9eb66450fddad1f251cfcd8ebc483c9207ac4df98c4c3ad409249370000763666470fd1e6", {0x800}, 0x40000000, &(0x7f00000000c0)="c4a3fd68ad8e704cab00c402199b3b3626f042018c912a000000676567f3a5f00fc7890e000000470f2f0f670f01dcc01c687cc4e3cd0bad0000000006c4814d73f908"}, &(0x7f00000002c0)={&(0x7f0000000200)="c40165d0326745dbd1c4a3c10cdbc746d9eec482f5969f6ec40000c4217e1015f339be0766430f384104c6c4e17459636fc4019155bb2c670000c4e1fc29e1", {}, 0x0, &(0x7f0000000280)="410f18e10feb28d198f8e4b82b4e0faeb0a6000000c4c35d7963fe00f3460f18d3644663c1c4627918f53ef30f5bc8366566460f3a163e07"}, 0x8, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x800004000, &(0x7f0000000000), 0x13f}}, 0x20) dup3(r0, r1, 0x0) [ 598.853592][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 598.890890][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:24 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x40000) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000040)={0x4}) recvfrom$unix(r0, &(0x7f00000000c0)=""/30, 0x1e, 0x12001, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r1, r2, 0x0) 05:03:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000180)={0x3, {{0xa, 0x4e23, 0xfffffffffffffffa, @dev={0xfe, 0x80, [], 0x1f}, 0xfffffffffffffff9}}, {{0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x19}, 0xffffffffffffff01}}}, 0x108) [ 599.038906][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 599.130297][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}, 0x0}], 0x1, 0x0) 05:03:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:24 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) rt_sigaction(0x3a, &(0x7f00000001c0)={&(0x7f0000000080)="ff9322a20000c483817ca83223333300dbf5d9eb66450fddad1f251cfcd8ebc483c9207ac4df98c4c3ad409249370000763666470fd1e6", {0x800}, 0x40000000, &(0x7f00000000c0)="c4a3fd68ad8e704cab00c402199b3b3626f042018c912a000000676567f3a5f00fc7890e000000470f2f0f670f01dcc01c687cc4e3cd0bad0000000006c4814d73f908"}, &(0x7f00000002c0)={&(0x7f0000000200)="c40165d0326745dbd1c4a3c10cdbc746d9eec482f5969f6ec40000c4217e1015f339be0766430f384104c6c4e17459636fc4019155bb2c670000c4e1fc29e1", {}, 0x0, &(0x7f0000000280)="410f18e10feb28d198f8e4b82b4e0faeb0a6000000c4c35d7963fe00f3460f18d3644663c1c4627918f53ef30f5bc8366566460f3a163e07"}, 0x8, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x800004000, &(0x7f0000000000), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000740)="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", 0x1000, 0x40001, &(0x7f0000000080)={0xa, 0x4e22, 0x6, @rand_addr="140196a4c24f3cbde28c817e4e8df193", 0x78f8}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) [ 599.330826][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 599.340788][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 599.359022][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0xd00, 0x0) setsockopt$sock_int(r1, 0x1, 0x3f, &(0x7f00000004c0)=0x7ff, 0x4) openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) rt_sigaction(0x0, &(0x7f0000000080)={&(0x7f0000000000)="262e666cc4a27921e0c441fc28f0c4c2f9477200c4c1fc2ec0c4e31d0d99ff61ffff0e67400f38cd997c5c0000c40281aa1347c0667307c4627d1e27", {0x80000001}, 0x80000001, &(0x7f0000000040)="40a7c4816dd2718336f20fd09df600000044c6c3c72e0fa7c090c461fe2d6d2766410f16559c660f3a0de1f70f41cd"}, &(0x7f0000000180)={&(0x7f00000000c0)="440f0d4c5e6b644600fc65fe470043d033480fae724b8e0a879d5c7f0000f36dd9c936f043839b6556666627", {}, 0x0, &(0x7f0000000140)="8f09580172eff2a6c40315483e05c463050f6e5d00c4412b5da7c7cc45d3c4427d19fb41b400dbe1c481fb599c37611b0000c4a2b1bd5ec0"}, 0x8, &(0x7f00000001c0)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x100000001, 0x2800) preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e24, @loopback}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, 0x629ffa66}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@loopback, @in6=@empty}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000400)=0xe8) r3 = getpgrp(0x0) ptrace$getenv(0x4201, r3, 0xc9fd, &(0x7f0000000480)) socket$inet_udp(0x2, 0x2, 0x0) 05:03:24 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = dup3(r0, r1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x36, "2f7a1a07c5cdf0051073abb775464b660427eba7a64089c3fd600ba4c6b3f19d252aafcddd9cdf7d40c1d6b02f509d4e8bf644c27689"}, &(0x7f0000000040)=0x3e) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000080)={r3, @in={{0x2, 0xe861626, @broadcast}}, 0x7fff, 0x7}, 0x90) 05:03:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}, 0x0}], 0x1, 0x0) 05:03:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x7d94aa6e, 0x0) ioctl$VIDIOC_G_SELECTION(r2, 0xc040565e, &(0x7f0000000240)={0x2}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:24 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) 05:03:24 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1}}, 0x18) 05:03:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0xf) setresuid(0x0, 0xee01, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) setresuid(0x0, 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:03:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x20a802) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f0000000100)=0x4000000) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:25 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(r0, 0x75f5, 0x80000001) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24, 0x0, 0x40000}], 0x10}}], 0x1, 0x0) 05:03:25 executing program 3 (fault-call:2 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:25 executing program 1 (fault-call:5 fault-nth:0): r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x220000, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000100)=0x1) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="24000000000000000000000000000000c157e84c4e0095c6b1115a31fb014429db9ab9238666c782b356ebccc4a89a441fad85258a2ac92f73fea8c829c8a242c9a4d60b8558f6fbe083711e38987d63e191d777667a7533f297e18453b49d6281890a20b163b9075b39ff1635f59756d33e18754e3451e12918e756ebd4a540623b7fcc4e9ee589f8c3ded0db6acd2a8139c40b7e23d1a3d52a445648c78d85237d4672894968c810c967c62e1b5425a5f1d4516f078bcdce7c565462a3eae09912bfb337a53376b8aae2b7222e25d807234712319e54a4b38d44"], 0x10}}], 0x1, 0x0) 05:03:25 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:25 executing program 4 (fault-call:2 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) [ 600.548607][T12364] FAULT_INJECTION: forcing a failure. [ 600.548607][T12364] name failslab, interval 1, probability 0, space 0, times 0 [ 600.610209][T12364] CPU: 0 PID: 12364 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #43 [ 600.619085][T12364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 600.629186][T12364] Call Trace: [ 600.632504][T12364] dump_stack+0x172/0x1f0 [ 600.636860][T12364] should_fail.cold+0xa/0x15 [ 600.641474][T12364] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 600.647295][T12364] ? ___might_sleep+0x163/0x280 [ 600.652166][T12364] __should_failslab+0x121/0x190 [ 600.657117][T12364] should_failslab+0x9/0x14 [ 600.661627][T12364] kmem_cache_alloc_node_trace+0x26d/0x720 [ 600.667453][T12364] ? lock_downgrade+0x880/0x880 [ 600.672371][T12364] __kmalloc_node+0x3d/0x70 [ 600.676888][T12364] kvmalloc_node+0xbd/0x100 [ 600.681431][T12364] xt_alloc_table_info+0x41/0xa0 [ 600.686383][T12364] do_ipt_set_ctl+0x25a/0x492 [ 600.691061][T12364] ? compat_do_ipt_set_ctl+0x160/0x160 [ 600.696530][T12364] ? mutex_unlock+0xd/0x10 [ 600.700941][T12364] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 600.706923][T12364] nf_setsockopt+0x77/0xd0 [ 600.711342][T12364] ip_setsockopt+0xdf/0x100 [ 600.715845][T12364] udp_setsockopt+0x68/0xb0 [ 600.720369][T12364] ipv6_setsockopt+0xb6/0x170 [ 600.725056][T12364] tcp_setsockopt+0x8f/0xe0 [ 600.729574][T12364] sock_common_setsockopt+0x94/0xd0 [ 600.734773][T12364] __sys_setsockopt+0x17a/0x280 [ 600.739625][T12364] ? kernel_accept+0x310/0x310 [ 600.744400][T12364] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 600.749857][T12364] ? do_syscall_64+0x26/0x680 [ 600.754534][T12364] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 600.760593][T12364] ? do_syscall_64+0x26/0x680 [ 600.765288][T12364] __x64_sys_setsockopt+0xbe/0x150 [ 600.770407][T12364] do_syscall_64+0xfd/0x680 [ 600.774913][T12364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 600.780799][T12364] RIP: 0033:0x459519 [ 600.784690][T12364] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:03:25 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) [ 600.804303][T12364] RSP: 002b:00007fa87d0e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 600.812720][T12364] RAX: ffffffffffffffda RBX: 00007fa87d0e1c90 RCX: 0000000000459519 [ 600.820683][T12364] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 600.828650][T12364] RBP: 000000000075bf20 R08: 0000000000000001 R09: 0000000000000000 [ 600.836617][T12364] R10: 0000000020000000 R11: 0000000000000246 R12: 00007fa87d0e26d4 [ 600.844581][T12364] R13: 00000000004c745e R14: 00000000004dcb48 R15: 0000000000000004 05:03:26 executing program 4 (fault-call:2 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:26 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r0, 0x80000) 05:03:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='@\x00'/16], 0x10}}], 0x1, 0x0) 05:03:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x223}}, 0x18) 05:03:26 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x20000380) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) [ 601.099574][T12484] FAULT_INJECTION: forcing a failure. [ 601.099574][T12484] name failslab, interval 1, probability 0, space 0, times 0 05:03:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) [ 601.168029][T12484] CPU: 0 PID: 12484 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #43 [ 601.176047][T12484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 601.186111][T12484] Call Trace: [ 601.189421][T12484] dump_stack+0x172/0x1f0 [ 601.193771][T12484] should_fail.cold+0xa/0x15 [ 601.198379][T12484] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 601.203940][T12484] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 601.209765][T12484] ? find_held_lock+0x35/0x130 [ 601.209782][T12484] ? rcu_read_unlock+0x16/0x60 [ 601.209802][T12484] __should_failslab+0x121/0x190 [ 601.209820][T12484] should_failslab+0x9/0x14 [ 601.209833][T12484] kmem_cache_alloc_trace+0x4b/0x750 [ 601.209847][T12484] ? kasan_check_read+0x11/0x20 [ 601.209868][T12484] memcg_kmem_get_cache+0x244/0x5f0 [ 601.209886][T12484] kmem_cache_alloc_node_trace+0x1b5/0x720 [ 601.209902][T12484] ? lock_downgrade+0x880/0x880 [ 601.209925][T12484] __kmalloc_node+0x3d/0x70 [ 601.259266][T12484] kvmalloc_node+0xbd/0x100 [ 601.263788][T12484] xt_alloc_table_info+0x41/0xa0 [ 601.268740][T12484] do_ipt_set_ctl+0x25a/0x492 [ 601.273426][T12484] ? compat_do_ipt_set_ctl+0x160/0x160 [ 601.278995][T12484] ? mutex_unlock+0xd/0x10 [ 601.283418][T12484] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 601.289442][T12484] nf_setsockopt+0x77/0xd0 [ 601.293870][T12484] ip_setsockopt+0xdf/0x100 [ 601.298389][T12484] udp_setsockopt+0x68/0xb0 [ 601.302904][T12484] ipv6_setsockopt+0xb6/0x170 [ 601.307591][T12484] tcp_setsockopt+0x8f/0xe0 [ 601.312107][T12484] sock_common_setsockopt+0x94/0xd0 [ 601.317308][T12484] __sys_setsockopt+0x17a/0x280 [ 601.322157][T12484] ? kernel_accept+0x310/0x310 [ 601.326924][T12484] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 601.332379][T12484] ? do_syscall_64+0x26/0x680 [ 601.337049][T12484] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 601.343114][T12484] ? do_syscall_64+0x26/0x680 [ 601.347790][T12484] __x64_sys_setsockopt+0xbe/0x150 [ 601.352902][T12484] do_syscall_64+0xfd/0x680 [ 601.357411][T12484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 601.363389][T12484] RIP: 0033:0x459519 [ 601.367282][T12484] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 601.386891][T12484] RSP: 002b:00007fa87d0e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 601.395299][T12484] RAX: ffffffffffffffda RBX: 00007fa87d0e1c90 RCX: 0000000000459519 [ 601.403280][T12484] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 601.411253][T12484] RBP: 000000000075bf20 R08: 0000000000000001 R09: 0000000000000000 [ 601.419218][T12484] R10: 0000000020000000 R11: 0000000000000246 R12: 00007fa87d0e26d4 [ 601.427181][T12484] R13: 00000000004c745e R14: 00000000004dcb48 R15: 0000000000000004 05:03:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) recvmsg(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000040)=""/64, 0x40}, {&(0x7f0000000140)=""/186, 0xba}, {&(0x7f0000000200)=""/14, 0xe}, {&(0x7f0000000280)=""/182, 0xb6}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f0000000380)=""/173, 0xad}, {&(0x7f0000000440)=""/168, 0xa8}, {&(0x7f0000000500)=""/9, 0x9}], 0x9, &(0x7f0000001700)=""/151, 0x97}, 0x12123) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000001a80)) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f00000017c0)={0x0, r1}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001900)={'vcan0\x00', 0x0}) sendto$packet(r2, &(0x7f0000001800)="cfea66a75789bc2ea03108a70ddf62408fcb6ba7cc8163fa5b76ca1edc08b3a646e99be6c860d9bbcf36d6dcbbd715e0e9e7928751f69172d9ac91929334ad91882b054ba62281fe1c575be46058243858ea7fb97db5075211550936a32104156f0135ed36d1d6ff32d376ce7eafd6e4576e28ba597e6882257e4085c06e072245637f6cb063b2543e52946d5b53680e8aa9a80a13a8e88d31126f97aa04f1bd8f57021e923eb33bb82bccfd8d9dc2fcc85eb0b855316c887a5223d15cbcbe0d52d85b9721e6b1a3f60a4f183648545a5925", 0xd2, 0x40844, &(0x7f0000001940)={0x11, 0xf6, r4, 0x1, 0x5, 0x6, @dev={[], 0x1d}}, 0x14) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000001980)="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") write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r3, 0x1}}, 0x18) 05:03:26 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0xfff, 0x10}, &(0x7f0000000200)=0xc) epoll_wait(r2, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0xcfdd) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000240)={r3, 0x400, 0x7}, 0x8) socket$inet6(0xa, 0x80000, 0x8) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @mcast2, 0x80cd}, 0x1c) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x102, 0x0) renameat2(r2, &(0x7f00000000c0)='./file0\x00', r4, &(0x7f0000000180)='./file0\x00', 0x7) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r5, &(0x7f0000000300)=""/128, 0x80) signalfd4(r5, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:26 executing program 4 (fault-call:2 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:26 executing program 0: syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x8000000000, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) [ 601.869381][T12629] FAULT_INJECTION: forcing a failure. [ 601.869381][T12629] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 601.883623][T12629] CPU: 1 PID: 12629 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #43 [ 601.891618][T12629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 601.901678][T12629] Call Trace: [ 601.904987][T12629] dump_stack+0x172/0x1f0 [ 601.909332][T12629] should_fail.cold+0xa/0x15 [ 601.913958][T12629] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 601.919777][T12629] ? ___might_sleep+0x163/0x280 [ 601.924693][T12629] should_fail_alloc_page+0x50/0x60 [ 601.924710][T12629] __alloc_pages_nodemask+0x1a1/0x8d0 [ 601.924732][T12629] ? update_curr+0x3c4/0x8a0 [ 601.939863][T12629] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 601.945589][T12629] ? __lock_acquire+0x54f/0x5490 [ 601.950550][T12629] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 601.957239][T12629] alloc_pages_current+0x107/0x210 [ 601.962360][T12629] ? mark_held_locks+0xf0/0xf0 [ 601.967142][T12629] pte_alloc_one+0x1b/0x1a0 [ 601.971657][T12629] do_huge_pmd_anonymous_page+0x9f6/0x1660 [ 601.977468][T12629] ? __lock_acquire+0x54f/0x5490 [ 601.982414][T12629] ? prep_transhuge_page+0xa0/0xa0 [ 601.987539][T12629] ? pmd_val+0x100/0x100 [ 601.991798][T12629] __handle_mm_fault+0x2d59/0x3eb0 [ 601.996923][T12629] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 602.002476][T12629] ? find_held_lock+0x35/0x130 [ 602.007246][T12629] ? handle_mm_fault+0x292/0xa90 [ 602.012195][T12629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 602.018441][T12629] ? kasan_check_read+0x11/0x20 [ 602.023308][T12629] handle_mm_fault+0x3b7/0xa90 [ 602.028076][T12629] __do_page_fault+0x5ef/0xda0 [ 602.032855][T12629] do_page_fault+0x71/0x57d [ 602.037373][T12629] page_fault+0x1e/0x30 [ 602.041563][T12629] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 602.048149][T12629] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 f3 a4 [ 602.048158][T12629] RSP: 0018:ffff8880575f7b60 EFLAGS: 00010206 [ 602.048169][T12629] RAX: 0000000000000000 RBX: 0000000000231b00 RCX: 0000000000031b60 [ 602.048177][T12629] RDX: 0000000000231b00 RSI: 0000000020200000 RDI: ffff8880409fffe0 [ 602.048193][T12629] RBP: ffff8880575f7b98 R08: ffffed1008146368 R09: 0000000000000000 [ 602.097751][T12629] R10: ffffed1008146367 R11: ffff888040a31b3f R12: 0000000020000060 [ 602.105722][T12629] R13: 0000000020231b60 R14: ffff888040800040 R15: 00007ffffffff000 [ 602.113723][T12629] ? _copy_from_user+0x10b/0x150 [ 602.118677][T12629] do_ipt_set_ctl+0x29d/0x492 [ 602.123375][T12629] ? compat_do_ipt_set_ctl+0x160/0x160 [ 602.128868][T12629] ? mutex_unlock+0xd/0x10 [ 602.133294][T12629] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 602.139286][T12629] nf_setsockopt+0x77/0xd0 [ 602.143717][T12629] ip_setsockopt+0xdf/0x100 [ 602.148228][T12629] udp_setsockopt+0x68/0xb0 [ 602.152748][T12629] ipv6_setsockopt+0xb6/0x170 [ 602.157440][T12629] tcp_setsockopt+0x8f/0xe0 [ 602.161957][T12629] sock_common_setsockopt+0x94/0xd0 [ 602.167166][T12629] __sys_setsockopt+0x17a/0x280 [ 602.172027][T12629] ? kernel_accept+0x310/0x310 [ 602.176804][T12629] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 602.182279][T12629] ? do_syscall_64+0x26/0x680 [ 602.186964][T12629] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 602.193205][T12629] ? do_syscall_64+0x26/0x680 [ 602.197895][T12629] __x64_sys_setsockopt+0xbe/0x150 [ 602.203013][T12629] do_syscall_64+0xfd/0x680 [ 602.207541][T12629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 602.213432][T12629] RIP: 0033:0x459519 05:03:27 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x20400, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x8) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x800) ioctl$UI_DEV_CREATE(r4, 0x5501) r5 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x3ff, 0x2) ioctl$DRM_IOCTL_GET_STATS(r5, 0x80f86406, &(0x7f0000000280)=""/49) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r7 = accept$alg(r6, 0x0, 0x0) write$binfmt_script(r7, &(0x7f0000000300)=ANY=[], 0xffffffaa) write(r7, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r8 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101800, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r8, &(0x7f0000000040)="bcbad89c1dd9ffe55d99c90dccf743f1c0eda058d03bac77a32d0ad5443634ef970106542715e6863bf9789342d865f9fd7798cc45cbb69b380990b2e11a7864d325f562bd8e5c59aff1daa2842448a110a295dbd3a3f11a6822c2c1ef74cc67c79156b75429a8efa3e6c8732b08f70f8010a91fd6d58e0265627b3b8484a2798ac61265b914c96d1a9f79140571e365a960d3f747b7581bb43efec31053e9d8ec5103630737af7f432bb3bb3dab35339b1fcef62f9c6a3135a2bf6baf8c"}, 0x10) ioctl$DRM_IOCTL_SET_VERSION(r8, 0xc0106407, &(0x7f00000001c0)={0x3, 0x9, 0x8001, 0x7}) dup3(r1, r2, 0x80000) 05:03:27 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x1c) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)={0x80, 0x8000, 0x6, 0x8, 0x4, [{0x5, 0x7, 0x50, 0x0, 0x0, 0x1}, {0x800, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x80}, {0x8, 0x80000001, 0x1f, 0x0, 0x0, 0x1000}, {0x3, 0x9, 0x4, 0x0, 0x0, 0x2}]}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) write$binfmt_elf64(r0, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x7, 0xfffffffffffffff7, 0x1000, 0xfffffffffffffc01, 0x2, 0x3e, 0x76, 0x339, 0x40, 0xa6, 0xd62, 0xffff, 0x38, 0x1, 0x800, 0x10001, 0x20}, [{0x0, 0x800, 0x63dd, 0x6, 0x6, 0x4, 0x0, 0x10000}], "43faa7ce549bf8b812dfef9fbaac44d8713d400595594598d6f82161a697307b830773e6df607f49b366147a", [[], [], [], [], [], [], []]}, 0x7a4) 05:03:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004006, &(0x7f0000000180)={0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x278) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={'ip6gre0\x00', {0x2, 0x4e23, @multicast2}}) r2 = socket(0x9, 0x2, 0x200) accept4$llc(r2, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000280)=0x10, 0x800) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="24000000000000200000000000fa0000"], 0x10}}], 0x1, 0x0) pipe2(&(0x7f0000000200), 0x800) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:ksm_device_t:s0\x00', 0x22, 0x3) 05:03:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(0xffffffffffffffff, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) accept4$unix(r2, &(0x7f0000000180)=@abs, &(0x7f0000000100)=0x6e, 0x800) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(0xffffffffffffffff, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) [ 602.217332][T12629] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 602.236939][T12629] RSP: 002b:00007fa87d0e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 602.245350][T12629] RAX: ffffffffffffffda RBX: 00007fa87d0e1c90 RCX: 0000000000459519 [ 602.253338][T12629] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 602.253348][T12629] RBP: 000000000075bf20 R08: 0000000000000001 R09: 0000000000000000 [ 602.253356][T12629] R10: 0000000020000000 R11: 0000000000000246 R12: 00007fa87d0e26d4 [ 602.253364][T12629] R13: 00000000004c745e R14: 00000000004dcb48 R15: 0000000000000004 [ 602.375859][T12756] QAT: Invalid ioctl 05:03:27 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000080)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:27 executing program 4 (fault-call:2 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(0xffffffffffffffff, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000080)={@rand_addr, @remote}, &(0x7f0000000100)=0xc) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) [ 602.565841][T12852] FAULT_INJECTION: forcing a failure. [ 602.565841][T12852] name failslab, interval 1, probability 0, space 0, times 0 [ 602.633399][T12852] CPU: 1 PID: 12852 Comm: syz-executor.4 Not tainted 5.2.0-rc6+ #43 [ 602.641409][T12852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 602.651475][T12852] Call Trace: [ 602.654783][T12852] dump_stack+0x172/0x1f0 [ 602.659142][T12852] should_fail.cold+0xa/0x15 [ 602.663758][T12852] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 602.669583][T12852] ? ___might_sleep+0x163/0x280 [ 602.674452][T12852] __should_failslab+0x121/0x190 [ 602.679398][T12852] should_failslab+0x9/0x14 [ 602.679413][T12852] kmem_cache_alloc+0x2af/0x6f0 [ 602.679431][T12852] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 602.679455][T12852] ptlock_alloc+0x20/0x70 [ 602.699338][T12852] pte_alloc_one+0x6d/0x1a0 [ 602.703863][T12852] do_huge_pmd_anonymous_page+0x9f6/0x1660 [ 602.709696][T12852] ? __lock_acquire+0x54f/0x5490 [ 602.714649][T12852] ? prep_transhuge_page+0xa0/0xa0 [ 602.719773][T12852] ? pmd_val+0x100/0x100 [ 602.724036][T12852] __handle_mm_fault+0x2d59/0x3eb0 [ 602.729161][T12852] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 602.734719][T12852] ? find_held_lock+0x35/0x130 [ 602.739494][T12852] ? handle_mm_fault+0x292/0xa90 [ 602.744452][T12852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 602.750697][T12852] ? kasan_check_read+0x11/0x20 [ 602.755558][T12852] handle_mm_fault+0x3b7/0xa90 [ 602.760337][T12852] __do_page_fault+0x5ef/0xda0 [ 602.765118][T12852] do_page_fault+0x71/0x57d [ 602.769638][T12852] page_fault+0x1e/0x30 [ 602.773799][T12852] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 602.780393][T12852] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 f3 a4 [ 602.799997][T12852] RSP: 0018:ffff88805d33fb60 EFLAGS: 00010206 [ 602.800010][T12852] RAX: 0000000000000000 RBX: 0000000000231b00 RCX: 0000000000031b60 [ 602.800019][T12852] RDX: 0000000000231b00 RSI: 0000000020200000 RDI: ffff8880405fffe0 [ 602.800028][T12852] RBP: ffff88805d33fb98 R08: ffffed10080c6368 R09: 0000000000000000 [ 602.800038][T12852] R10: ffffed10080c6367 R11: ffff888040631b3f R12: 0000000020000060 [ 602.800054][T12852] R13: 0000000020231b60 R14: ffff888040400040 R15: 00007ffffffff000 [ 602.845958][T12852] ? _copy_from_user+0x10b/0x150 [ 602.850916][T12852] do_ipt_set_ctl+0x29d/0x492 [ 602.855608][T12852] ? compat_do_ipt_set_ctl+0x160/0x160 [ 602.861093][T12852] ? mutex_unlock+0xd/0x10 [ 602.865521][T12852] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 602.871514][T12852] nf_setsockopt+0x77/0xd0 [ 602.875942][T12852] ip_setsockopt+0xdf/0x100 [ 602.880458][T12852] udp_setsockopt+0x68/0xb0 [ 602.885669][T12852] ipv6_setsockopt+0xb6/0x170 [ 602.890343][T12852] tcp_setsockopt+0x8f/0xe0 [ 602.894844][T12852] sock_common_setsockopt+0x94/0xd0 [ 602.900026][T12852] __sys_setsockopt+0x17a/0x280 [ 602.904858][T12852] ? kernel_accept+0x310/0x310 [ 602.909609][T12852] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 602.915047][T12852] ? do_syscall_64+0x26/0x680 [ 602.919706][T12852] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 602.925765][T12852] ? do_syscall_64+0x26/0x680 [ 602.930428][T12852] __x64_sys_setsockopt+0xbe/0x150 [ 602.935521][T12852] do_syscall_64+0xfd/0x680 [ 602.940008][T12852] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 602.945876][T12852] RIP: 0033:0x459519 [ 602.949753][T12852] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 602.969338][T12852] RSP: 002b:00007fa87d0e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 602.977728][T12852] RAX: ffffffffffffffda RBX: 00007fa87d0e1c90 RCX: 0000000000459519 [ 602.985676][T12852] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 602.993622][T12852] RBP: 000000000075bf20 R08: 0000000000000001 R09: 0000000000000000 [ 603.001575][T12852] R10: 0000000020000000 R11: 0000000000000246 R12: 00007fa87d0e26d4 [ 603.009526][T12852] R13: 00000000004c745e R14: 00000000004dcb48 R15: 0000000000000004 [ 603.178053][T12756] QAT: Invalid ioctl 05:03:28 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x4, 0x200000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000004c0)={&(0x7f0000000280), 0xc, &(0x7f0000000480)={&(0x7f0000000300)=ANY=[@ANYBLOB="6001204e", @ANYRES16=r1, @ANYBLOB="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"], 0x160}, 0x1, 0x0, 0x0, 0x40004}, 0x4000) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0xa8000, 0x0) vmsplice(r2, &(0x7f0000000580)=[{&(0x7f0000000640)="e7cf49ecfe2645e70e1a0875d6b5786b2c2142e51b62a175df40ed5d75a596c48cf560bec22c1d8bdfe8286c72ff68f0bbbf24163e5374ff3c3eaf6e3bb32c0d898ef486f17094ccfba4d50e352a552e8ab1139ea5593975a055ebc0c197044292fc5078940366ea3f9c8e24", 0x6c}], 0x1, 0x7) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000540)) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r4, 0x1}}, 0x18a) r5 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x10000, 0x20002) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000001c0)={r6, 0x2, &(0x7f00000000c0)=[0x0, 0x1], &(0x7f0000000100)=[0x8, 0x7, 0x40], 0x10, 0x4, 0x3ff, &(0x7f0000000140)=[0x40, 0x8, 0xdb, 0xffffffffffffe6cf], &(0x7f0000000180)=[0x80000000, 0x8, 0x5, 0xfffffffffffffff9, 0x10000]}) membarrier(0xb, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f00000006c0)={0x8, 0x1, 0x6, 0x6, 0x7, 0xfffffffffffffffa, 0x2, 0x8000, 0xfffffffffffffffe, 0x7}, 0xb) 05:03:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="24000000000000000011ae1378008d1c"], 0x10}}], 0x1, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xfff, 0x100) r3 = creat(&(0x7f0000000100)='./file0\x00', 0xc) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000180)={0x3, r3}) 05:03:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, 0x0, 0x0, 0x0) 05:03:28 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x5, 0x400000) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000000c0)={0x3, [0x10000, 0xfffffffffffffff9, 0x2]}, 0xa) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:28 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RRENAME(r0, &(0x7f0000000000)={0x7, 0x15, 0x1}, 0x7) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:28 executing program 4 (fault-call:2 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 603.308208][ C1] net_ratelimit: 23 callbacks suppressed [ 603.308219][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 603.331944][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, 0x0, 0x0, 0x0) 05:03:28 executing program 1: r0 = getpgrp(0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x101000, 0x1) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x3, 0x5, @local, 0x400}, {0xa, 0x4e23, 0x100, @rand_addr="e891fdf357927e0159c62ee106a7ca48", 0xfffffffffffffff8}, 0x6c2, [0x6fe, 0x7, 0x5, 0x6, 0x80000000, 0x1f, 0x1a, 0x9]}, 0x5c) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000080)=0x4000, 0x4) r3 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, &(0x7f0000000140)=r4) rt_tgsigqueueinfo(r0, r3, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r6, &(0x7f0000000300)=""/128, 0x80) signalfd4(r6, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x2, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 603.540579][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="24000000000000e40000000000000000"], 0x10}}], 0x1, 0x0) 05:03:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, 0x0, 0x0, 0x0) 05:03:28 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000), &(0x7f0000000040), 0x8) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r0, 0x80000) 05:03:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x6, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:28 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x101000, 0x0) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0xffffffffffffffcc) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendfile(r0, r0, &(0x7f0000000080), 0x2c1345d3) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) [ 603.823749][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 603.904007][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780), 0x0, 0x0) 05:03:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) mq_open(&(0x7f0000000000)='\x00', 0x1, 0x8, &(0x7f00000000c0)={0x3, 0x3, 0x48a7, 0x7, 0x2, 0x0, 0x8, 0x7}) 05:03:29 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0xffffffff, 0x701000) ioctl$SIOCRSGCAUSE(r3, 0x89e0, &(0x7f0000000180)) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40000, 0x0) write$UHID_GET_REPORT_REPLY(r4, &(0x7f00000000c0)={0xa, 0x6, 0x7fff, 0xffff}, 0xa) 05:03:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:29 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000080)={0xf, 0xce71, 0x8, 0x4000, 0xffffffffffffffff}) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) r4 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x200, 0x40200) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f00000001c0)={r3, r4, 0x1}) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_STREAMON(r4, 0x40045612, &(0x7f0000000280)=0x88d) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) pipe2(&(0x7f0000000200), 0x4000) dup3(r5, r6, 0x0) [ 604.113409][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780), 0x0, 0x0) 05:03:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000180)=@srh={0x33, 0x2, 0x4, 0x1, 0x71, 0x20, 0x24, [@mcast1]}, 0x18) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x50400) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x7) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000100)) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14, 0x49, 0x2, {0x0, 0x3}}, 0xfffffffffffffe58) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000000c0)={0x13, 0x10, 0x7, {0x0, r1, 0xffffffffffffff7b}}, 0x18) timerfd_create(0x4, 0xfffffffffffffffd) 05:03:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x10, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:29 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400, 0x0) prctl$PR_SET_FPEXC(0xc, 0x80003) statx(r3, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) [ 604.317010][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 604.368199][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780), 0x0, 0x0) 05:03:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x11, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:29 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x4) 05:03:29 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x408040, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000001c0)={0x0, 0x62, "1205f35a71adc6eb82fe5588373708f86e988f2afbf04ddcfa7323a3008ca5f273cf3d31d5bff55070b3533ea1baf92d6c71615cdfa2407362251bff57a41c585ee39b7bc113212abe5761ee919b7cbb2f6e61bb988a54504e2a88a67da165cc8874"}, &(0x7f0000000280)=0x6a) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={r1, 0x9ee4}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r4, 0x1}}, 0x18) 05:03:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="2400000000000000000000ec000000001d7e443ad98f8ff0091ff85c8fc42c6af5576552da405f56ed1e2543c320bac655010aea5cedbefd22fc2b3924c2d9cc61bc2c4e2224cdcf51badef7242c040cff9b9cb27d0dc31199745ee58488830ef2178033378458367deb72d35c596c6b09fd955a9b4516cd40c0265159236fda"], 0x10}}], 0x1, 0x0) 05:03:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x88, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 604.628307][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 05:03:29 executing program 1: r0 = getpgrp(0x0) r1 = gettid() pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) shmget$private(0x0, 0x4000, 0x84, &(0x7f0000ff8000/0x4000)=nil) io_uring_register$IORING_UNREGISTER_BUFFERS(r2, 0x1, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) signalfd4(r3, &(0x7f00000002c0)={0x4}, 0x8, 0x80000) rt_sigprocmask(0x2, &(0x7f00000000c0)={0x80000000}, &(0x7f0000000140), 0x8) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/234) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) [ 604.708351][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:29 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = dup3(r0, r1, 0x0) io_uring_enter(r2, 0x8, 0x8001, 0x3, &(0x7f0000000000)={0x7}, 0x8) 05:03:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x80001, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x48e}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000200)={r3, 0x8001}, &(0x7f0000000240)=0x8) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="000000000006000000000000000700000072013f336b9f383f0d673f17648bd01dd4fc0939cbe15c3e1f8a8a55"], 0x10}}], 0x1, 0x0) 05:03:29 executing program 3: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x181400, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x600, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 05:03:30 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) signalfd4(r2, &(0x7f0000000080)={0x1}, 0x8, 0x800) 05:03:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x1100, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:30 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x1, &(0x7f0000000040), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x101, 0x7ff, 0x1, 0x7, 0x7, {0x0, @in6={{0xa, 0x4e22, 0x9, @remote, 0x1f}}, 0x2, 0x98, 0x7fffffff, 0x1000, 0x7a27}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x100000001}, 0x8) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x6, 0x4) 05:03:30 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5, &(0x7f0000000640)="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") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 05:03:30 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f00000001c0)={0x80000000000064}, 0x8, 0x0) rt_sigtimedwait(&(0x7f0000000080)={0x9}, &(0x7f0000000140), &(0x7f00000000c0)={0x0, 0x989680}, 0x8) 05:03:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22, 0x202000000000, @ipv4={[], [], @empty}}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x400000, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0xf1) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:30 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x4, &(0x7f0000000040)=[{0x8, 0x4, 0x6, 0x6}, {0xe53, 0x1480000, 0x3f, 0x3}, {0x0, 0x7, 0x101, 0x5}, {0xd1, 0xe6d0, 0x0, 0x100000001}]}) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000008, 0x8010, r0, 0x0) r3 = shmget(0x3, 0x2000, 0x0, &(0x7f0000ff9000/0x2000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) 05:03:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)}}], 0x1, 0x0) 05:03:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:30 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x80) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="78696e6f3d6175746f2c6d657461636f70793d6f66662c64656661756c745f7065726d697373696f6e732c78696e6f3d6175746f2c64656661756c745f7065726d697373696f6e732c6d657461636f70793d6f6e2c61707072616973655f747970653d696d617369672c7063723d30303030303030303030303016303030303034302c657569643d", @ANYRESDEC=r3, @ANYBLOB=',uid<', @ANYRESDEC=r4, @ANYBLOB="2c6673757569643d63637565003673622d333071772d0064383d2d77777f772d37643361387b36772c6673636f6e746578743d73797361646d5f752c00"]) getsockopt$sock_timeval(r2, 0x1, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r5 = dup3(r0, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f0000000200)) 05:03:30 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0x0) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8800, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)}}], 0x1, 0x0) 05:03:30 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x80000, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r1, 0x2, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000011}, 0x40) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x402, 0x0) ioctl$RNDADDENTROPY(r4, 0x40085203, &(0x7f00000000c0)={0x992, 0x85, "d9e856ee790c270465c255bc80b9a8e0298c57e5ea9cc691574644d590c1558a3da1aa5d3770d5e669b3af92f17d2287210c4db8724d2ab9662c2856cc1087e59e79206f81347ac8201bbf6a6d3428745fe1c38530349836ffa05708ebd5b295c0095a93b62e7085e7f4e1295e4e940f85cc40bc0d845f8dbef8cfcfe47a13e707fc91e5c7"}) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r3, 0x1}}, 0x18) 05:03:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x100000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = getpgrp(0xffffffffffffffff) ptrace$peek(0x1, r2, &(0x7f00000002c0)) truncate(&(0x7f0000000100)='./file0\x00', 0x8000) r3 = msgget$private(0x0, 0xa0) msgrcv(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e90000000000000000000000000000000000000000000000000000000000000000000000000000000070b60000000000000000000000000000000000170000000000b246adb092026ed56af5aa88c62a134556b3e5e6c6d36044aa070f7057"], 0xb3, 0x3, 0x2000) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r4 = fcntl$getown(r0, 0x9) ptrace$peek(0x1, r4, &(0x7f0000000080)) msync(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) r5 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x2ac617eb, 0x2000) r6 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x2, 0x101000) perf_event_open$cgroup(&(0x7f0000000200)={0x7, 0x70, 0x7, 0x2, 0x98f, 0x1, 0x0, 0xffffffffffff0001, 0x2002, 0x4, 0x1, 0x4, 0x8, 0xfff, 0x200, 0x3, 0x5, 0x2, 0x40, 0x1, 0x0, 0x20, 0xffff, 0x52, 0x80, 0xee86, 0xf7, 0x6, 0x3, 0x0, 0x80000001, 0x800, 0x10001, 0xfffffffffffff95d, 0x4, 0x100000001, 0xfffffffffffffffd, 0x6, 0x0, 0x6, 0x5, @perf_config_ext={0x9, 0x7}, 0x20000, 0xfe, 0x0, 0x0, 0x8000, 0x1ff, 0x3ff}, r5, 0x1, r6, 0x1) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="24b1000000d7abe3b83131546400003ed8fc7b00000000000000004f4c641175c5fe040000000000000078e738d667a252e4be53d1af247517ce36b5429af1fd14fc000000000000000000"], 0x10}}], 0x1, 0x0) 05:03:31 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000080)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)}}], 0x1, 0x0) 05:03:31 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) 05:03:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/current\x00') getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0x20, "60712cb75977fd4523b52d88419b82e40b38389870e05fe87aab976a334d34ac"}, &(0x7f0000000100)=0x28) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000140)={r3, 0x0, 0xd7, "ea788cc7f199fa8104fb42d6a02f2491edf4aa6ceabedbbfde5e73493c49e54a236813ca3dec0616c936f4cea20837db10c66e67e8537db1de0218c22a250304668d549b4275e065601c3c0b4dcf21eb7f538043ca6a43c65fe7c3a1f4a124f45898b807ca7221ee9be5606250f3142232d31c429a80d1784f64f027d0c448a1b3658cc8e720a402d3e21afae7ef4b95d2f364ea029963b269308bf3976bb460add401e49fceb960c3ee296092ae828e4a62c3b6fcd9e507ea742aa3048c81385e890ac6beb883a403f7ca99516c8d346903c5270957a6"}, 0xdf) 05:03:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x1000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000), &(0x7f0000000040), 0x8) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r0, 0x80000) 05:03:31 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r3 = socket$inet6(0xa, 0x80000, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000080)={0x3, [0x55b1, 0xff, 0x4]}, 0xa) 05:03:31 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x2ac, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = dup3(r0, r1, 0x0) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000000)=0x200) 05:03:31 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80000, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x28, &(0x7f00000001c0)}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r1, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="24003f00000000e94e86bf7f33dace32"], 0x10}}], 0x1, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x800) write$UHID_DESTROY(r3, &(0x7f0000000100), 0x4) 05:03:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x2000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/128) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x7, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x32b) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:31 executing program 5 (fault-call:7 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x6000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:31 executing program 1: r0 = getpgrp(0x0) r1 = gettid() r2 = socket$bt_hidp(0x1f, 0x3, 0x6) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f00000001c0)="0d00a3db0dde851e8adeda41adae79b109083135b1827cfd0826af07f9e207b628235fad43407752b49c9486c5938ff9f464548568b0a46fa32d5218b65e1107c4de112559f84565775a220d87194a299b83514753fb89a9761857eff8d608075e098b7b7c416ae3f7397d7bb078e9773a001998", 0x74}, {&(0x7f0000000240)="47dd2b94b39d11faf3210c702844815784dd9fcdcc9e913b121af3a67f2c573e689fa0644155ee1106032595cdc0f299aba5eea25b3f6dfd919ba0df76449372706dedf33f753ef97184ddb727cfa8313795ca2c1a8a242f043178676725ecd3ddc17c41c35d0aed3413", 0x6a}], 0x2, 0x0) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000080)) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x34647c79fb59c791, 0x0) r5 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCRMFF(r5, 0x40044581, &(0x7f0000000140)=0xffffffff) 05:03:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/vcs\x00', 0x80, 0x0) r3 = getpid() write$P9_RGETLOCK(r2, &(0x7f0000001900)={0x33, 0x37, 0x2, {0x1, 0x0, 0x7fff, r3, 0x15, '@.\x92trustedvmnet1eth0)'}}, 0x33) sendto$inet6(r0, 0x0, 0xfffffe9b, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x9f75, @mcast2, 0xfffffffffffffffd}, 0x1c) r4 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x3, 0x2) sendmsg$kcm(r4, &(0x7f0000001880)={&(0x7f0000000380)=@in6={0xa, 0x4e21, 0x1f, @loopback, 0x6292}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000400)="9a8c25af94eacb58b78ddbd0bd0bc46c3bf6a0b1ea5e387c7e9dd1fd9612817f1b202420de7aff2121ffe479eb0edbc7c117e81effc089db454437cb580c9d5bf28f7706306f681a8ab88be52c756b34512a92f3ca621aea01204a592cdaa2cc54ad8d3173a8c3560aac4a3994837b659a392d277affeaf7abbe95a1275ad2e3d42324db308fd2751e5277eaddb666a51d5fd9a2a47fe70b558e4c9ed1799b9a4ee9bc9f24ee13023d180f01785ee18763892d9704aa804baec1a38bcc8e3261e51943", 0xc3}, {&(0x7f0000000500)="0c651291cf82d12737e8f18e0ceffe1f06f89100889fbab9a1f4df37c9d9f995bb97382f2ca319e277fd336220409e183e8fc2f5b4172569b158603425a66720ff", 0x41}, {&(0x7f00000002c0)="a6b9b5840773acada14ed1853990366a8c8cd280c7", 0x15}, {&(0x7f0000000580)="8db24a3ef42bb73c27b23a4eeb94628187e24a3f687ec2c20236e83d36df93ce3836e6bf07b37d3a81e59dcca586e3ba0abff064a4289abd28591883fabed229e68094faaa9578104ce7d93e545a1f3627e917a76e7a43758d342192df1f026a5fdf5d1bf3446663f6db1520fbfee227d5a01fbce3302f55d6dd90127e34b133502d5b0b9365d0f2f7c265c70d0ec91d4b92a6c49bf30efb8cf685088ea4b0dbc47d5f289c1c653458edd4276ff42447bb1f692fa389ad3770f2769b9641e7c529440a", 0xc3}, {&(0x7f0000000680)="51c55284103fc20a8aa3665640ec7f2ba439ce95ef3c6db08555df4d45a7772a2c650394397bfb14d637294a2d1ff7f3dc4cf99e8693f93202a4320f86b4d3422ce3d0f1c8bd113715878eeb30fb241b83e01773cd0c6af7f97ad33fe6820b00e5baffb0f0b872fea6de8fc79936aa1e273d71d66c898f3f12086a9ea9bbbd5bb5758ee564ddef36b573dbd1decd762932490de2f95abd6f7a4356066417c8907928ef7943fc5aa137ea895f9fe6f638899e2e4ee7b37ced8e5a2e051088d76de8ba3b0252fb46cf5f43261a9076f695851a4c239c079462bc574fbf3a691ba6a05834207a016e29dddd033e7d491f48dbfad57f48a70b43174823ebae3ba4c2db24214da8dd40b3a0c167cec4f26510b09d6423fdabda11f446428a4554efbc44b33a46f3d0c4d13ab3ece3f7c6f326ebd0f1cf236bdde12d194b4e8c3a840985accfcbc6bd7bebc10f94302e8dac6442b4828aaa6ab1f06edf608781ec935c4aaf843056440a9d591abb72582411cdf599d22519a210d333cc84f7e898f35334cef7265a74fc3bedb4573b24e24cf3c6420260652bc3c8f942262510d2f92e6559fc4731e5ee20f10225a045cd958b527c5fd8b77adbed6f6f216f1ea79a74730a83cc1b8d395fa898191e6ab4b1712b111354854cba18f945c3bb143b0b6ea5d1022662f061b398e4416666a8e35e1c2d8d56b2592170943dbc6059708e85abd1d5eba043a5ed6bede943a8926bd317b101b15f2612f2e6f0efc3d958573603a85fcaeb0bbaa32e3fd9e94fe048feb8d0a9c04f827474acfe314c0c94e2585a43bdc6f793600128e839b47d2fc33141f59e46665dfe63b0ea549e8beab0fe2a943892ca6c753c94d536a074001837951944736dc4f590f33867001acf4e3e33f82e0ba115b6e70a5c17b216e08ccf9f2d6d7dba54a6ffe01fc3def0f72578d79733cb1d7663d94f872d562134ee7c0f7dcdc9549bdde89bc4410c2251ce7a45522c4f90297982cbff37baa6c8c6c2b2e4e0ef55aacc4c681236c2d9280f66e7b9f6783175836f8cd517a1888b643eb8b2b4fb802060dcf6eeeaa67d2e385d870ba7d0520cfa595a1d9c5c4750a91724da1fbd9e1c31344799f2f9cc7fff548e53b453ada6f671350d0b7f39d0eddd5150ccfcd1806d77fb7dfe13526a87e856edf023c1bdab5251b03dae952bdcbd5230c3066d02d6784a4cd4e8f021f19e5563434623a7109e2418b81890f0fa609c8eb8363ea47d6983d6607bf564bd5cead060384431952f44e01c5fc60df63a0e24c852777ef6e40056aba3ec9bea117b6ff9333b363f680f744ff26b9d5b672c5922dd35cf67d2b9b00faf43b491392c93ae230d5f39360256379930331fc414177746f1a1fcac4e50f62053991cfa90a90b3b6351e6ba00bf4e5aa5261cd5a9e91a5ca4f43e7db2b2fb287482bac998b5fae5e16f4051de1b8e307312b98bd9e6e35e4a2dfa69c87c8dbb03e1c51d22a7a63b4ad87cd9cc61b85dad7df12a65a1a73aa068bff0b6f8c820ba453e92af53762eec3333055b3ce465bc36c9a316e443a37de32d408f0e10971f24b1878f281c634913f0426533907c7a5bf509505715a36d369af78f13db9270e827fe08fc58a441f848aca85cbfaf5c3d62752c9390afbbb9a5422d752c29f3a965517dcceabfe5d77f1fcd390a28d3afcc2b071ab560913a99ef526312dbdc1b9c86fc65ebec4aaa0cfba7ef5184af5beb275271061be703f02c6f6a5651697f7152bd4323185ba788070965020c01df69bc27fd27c5900a51c6d9c49e3f52ca9ef36cdcb538d307cd8e05e0081c5d62fec947657e4f81be57db162027b082428dffdd06357488c3b0c56800363484c9a377010396fbe61724e4eb02239285bde4d8e45c1ad8af23d84bc6ce9a51ab1e83f745644ff74e4d102af346e26193f49350aebdb595af783c885e2b6a58e7c83cd561afe6ba807a4737dc582d5cfb79b0835c05aac24964a7cf049a9315625dc6784ed4f82a24ae704329a770121ae326b9631db7526c670bf7f26b24c254d067b88141d258c1bc4fc96ca121fa4ac54e228f4b61d908a1d8be080b7ba3ccd77c3915b59c2a90c7138fd2076b46e86db7d5f7b2aa4a4c7d32340c8cc91d5f5fba807785959a96528b895db409eea8ebf1e52b213162fbcf72613a29b609dcae32cb4c8fbaea073bd9873e148f4cd0ee9b2b5cf5888cafbaf559314db958e4a106a217544d27158470fe155f2189cea0c333210d3efa4dccd225a43a5dc9b8a1938dc2feb8becceea18afdc1f60fd366e81bac404a30668e9eef45827756744d7f6d36921b00c3a9e10504ebe76e39ace55e7c08ea3193fd54139894b5dbdaeda41624033f4b2b09555ec8ccba4d5aa1f075cbc403e55e58b3cb800e0c2c49e4873c9da6c034359aa79b05030243e60657f6e09da51b6bb1ffb5fdfc1d9c563fce9e7aa4eece0fa29868d2e49dec8cf3d585356d5add23d873bcec92b7c8844ae3e36888626503f1bf60a938b5bdc6c5b0384c62447b72167258c268dcdc9e7417f9ffe181c29c95bfc5c44d04932579342f31387b0494143681768f993fa7bb16ee9d6310708f9fe665c4889f23d856f4c3e53a6ca9cf9e8c7964186c2268375ceb3148d2cf059e93ace94279af945794006a77368cc59a7ca66a06dd5471d22f30802b8fcbefbe6ab40f6d33f998024c5d746c06a3c4736f4a053a206b37dc24e7611303d048b8e23f16bc263a98bec588723fdbef6f03541b2c621d666cdd9935da1bbb51326e82a712626fa021dd3535f9523c6fac712205c66f5bea0c22dcb9a6c7582596b2e9db0d2a59191607c22ba324673833b6719d0265f90049526c235a2e987f8c931c9d635ca4d2acaa03460020dacfcc0fe8b2cbcdfa0a8d2e7d32791eba0638c2dfdefae46327a2ec97a64460ba89647553c7d040f0d06aa2b249e5cd620ccba8a30988e2d681ac5e900da147ad5cedc1d3f2f28da5ff8292d66c487bd503fb5b27ea2d6e07140e5a1d870c62abce9e77ffced5a04c565ec723e18f24613ec79f21bbbbf952ae420dfd8c2509b73f85e5189c02c8c6179b9fa464b1c1941c28347285aa27c4ee0bfb1045f4a00e509d1bdd86797386dfdc2c4c88872bfda8dd108d52dc2372f1cd55f94575244b22e0d15ec82989b9e4eda14b6cc81552ff198e7627f1aedd9497f28159c290f8eb22eac5826fc2063306ba1de72fe370924188143a6abdb353a23ac838e85d14f7d7405f9cab6f88edb633e6a1ecc054106973aaeeb5ce10e111e5255ed01e3a25b83777dcda1880ba66718a124a332fca2bfdde26ab6e2c7dc43f28e8b73fab86e43f648f9b40aa5acb9042f99503acb14ead217c2ba84a6cc433ca23ce8df747196db4ea520a4aa58925531c688e2548635d3dc41bda3472cf92f654190a29f652fd20984b5439f96958fc9aef367a47de6c4adc24a2eb9e6e9063899f1e6a63bab4add79d16492d2667e7428dc76f13ef30c7c7c9f3231a36712cb6ffbeb7c3435ab6f859ba77e3c3fc857a7105f03be04b866d355c8352e63afebfd8cfb9167389d97c6111191571bbdae36cc56141a4042adc3f96fd9ef2cc438f260ad2df9596a3419c88241f313b6fa253a3af476559e771ff1b10a9cbeb69e0f3283001828b79715e11b81d04ed9fcb252944d1d8a2128407333196c1289c2e36b16c62809d9ae18ba56e76cf3063821650be371901dcc8eb40125704cfd6421970d279c1375fed4a26b2d89a4166444189933009f84caecfb531ec9120cc987c231789beb7250d050cab9f1481dcdb227c16f59ff607a97b21d5e658fa669de29d936708b15f3d69c9a16e3144fdab05742166bee29fdb45a42a578743eff4a439950e8aeffe9c68164981e15952bcdb61fc7e63651572f1ab68baf1c089ab8428447620f8e78936fc741ff18a9eaf816cebe24ae50e83a3260024118200ce847a16fe5c818ba44fc575dacb3e54cabb23b3b0ef23e880650f79f1752a81e5c79fc69019c32111fab8fffd4a165831f646284a90f8b26a1f3ca54f0f8547615b1d1567bc9e2582470d673851de10cb11a644aeeb95d7049e3ef811b098684be02b479578799d8838742ec98aeb70c3036e803ced6b2515bb5b08c4bdbfa037627caf4c6780d526c65070985d1b3217ccaced43869cddd17c32896fdf3c69941acd02fb340485a3e9267ba1769af3fca18f4fe1142a2e8be5b43666a2fc68cc39fcbc3bd472ccf1e68f49b37ddb5f5882ca81f96bc8b41a779c881814d8ae6bc704584f7c83fe60c62aa5d213ed5b78e1fe6f23e26bd50b2b219be2b054133dceecd0a697f8bcab99ed53268cf8c48e96f48e052e2349559773e0ac4bf8f5548872e7f70ba61b413adcf23ceefba4f2ebb7daa6db9f31576e7e0be53848d53000af5c9bd36a75147c3851170ae968b426bc5eb96ce67a641945ac5904946e36d6e486da448ed7748cc35e2a4c203bbbef9073adef60ea9da3481df9b5f3cb64ec346f02c766dd842673780cb25c8ac660a74e87ee7a05dd5af8e731c1fa4a69c8380e6ee0217d6976eba859a042bf80e4d9051cfd10cc71e3fc7d7f704cdd0c6c74081019731779b1988dd0a80841a955cd2cc53420219ba7187cdad44a73dc7b9a533fb191d5b926233b9d99f1b4d1e7def9f745832d79829c11fecc798b3d15746578d542a83ed5cd90cc27ad0018b2ef528f8836d40150c445da6a7bec69c72c0218f52dc0b16be1f5c2069db4d0b585f04a5c21190deda297e4fd77a6281b302dfb9fc2286754e29efc6fd6f8579dec92a780e2ed193a7c5d629a0bb8ed2f3cbabb3bf88bca2a8f1f7798595f295a8a9575fe2d0e3c8305b5d354ce06025bb5208c711171e556a245680f0d25c2aa147f00fb7ad1fcc0ccc28891f9bde6e3760e0a2513fd4deac1303810d1c55c100de6f904b7251ca76ffc59f1088da0ab2b6e7e959b9804e512c5076be110e17bedb0f57c3f88d2d4b95c4a904840a326041994460947e7eb17b0daf607613f8869dddadc8f6251ebb0921bda0385ce9eead92dfccb2617a0fd3e8798bf752ccc64567aa304cd8ef30b3432c98f7939156e2a27025427bb919977c2b6cad36f3349256ee0a947384ef4f90a9bb5087bd50dd56dce5a81df389374aad259f088268b53106674ce5489efc54e518314c6436e9229a03d8e87068da3e95b5e9a4ee1bd42e9de844d233d0b3b6a6f8dade89b4181a01c196f49197642a4cef9c0f1ba355cfc2ba269e06461877eb1e53e257207b0536a708f4d3512e3cd71faade4a2422f7af1a0781692971b35cd7e079c4196e72b88db2bb2e00699487a2dc47d301fd85ede80383c4c030c7afb3745fd16eaef785c59c3af464dc60ea71b0ea04b748c070f4ce7a1e0d24971d541712a7897d7bdfb59f8d83c9409335d99836aa8a407d73ec83d0a131d7daed476cce2a0d57570eeba7d7f2680dcdc3b0a39cf0642345e4723f0cfd30e744c0d29a64f098789d6ffb6636d5b8a9193fb4f86f059cf051bf0fbd4047c499141235d9705fd8c0428520fb3a32219bcedfc529cc7b696fd1b5f743ede4b4b680d6448c8627ae3d638169e35b90432cd4207245e626e8c8bdec135275cecb05a3f1c7521dc21e730fcbf5409bdc2025df755a93cdb1204af3135578acac992757ed92ae7dc215dfd6a727c6aa2a5b20eb38f2ca86226d60ce5589717afb795daed17802f1f3251ab4a6f50658ede926b1b8720f9f01295eaeaf32d56837b09d657086401f2", 0x1000}, {&(0x7f0000001680)="b21b0c99d163110b59429b9d81375e91db752175a04739eefb3beb392f9616239d72d7cd231dd825e890e45747cf51cbf1b0768d523983cb6d257bae60d320d67b688f0bdbe784e86b536e692fb8e761656561084f1deda56b96811e25db33fd01e717127401bad02a019989646a5306a72d209da7af564c867c758bb235", 0x7e}], 0x6, &(0x7f00000017c0)=[{0xc0, 0x109, 0x100000000, "a052b7e25dd783aefe3d69f710a0347043f95a3943155ff0605a2c990cfd486875f896708da992ac8850af7b6970804aa42d4f6ec3df90586c7bd0dd7379c9996447dcefc09fa7aee11c7e413c1544a3a77628ffc7e03125fa3aa9e6d771ea558f4dd7ecd830c9ef66101c01c5466bf7c2e9545b827a8c955fd64852b549a43546d46f5293232c697e46d8d84a37de181f8919b7a1d356a6e08268280068694e6f75011dab131926295321"}], 0xc0}, 0x80) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) socket$xdp(0x2c, 0x3, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000180)=0x0, &(0x7f0000000340)) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000080)='./file0\x00', r5, r6) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="4a1fb735e982fe8e00000000000069000005095feb9da30de0225692627dd7f52586b7d6f31fa3e4f8ccde"], 0x10}}], 0x1, 0x0) 05:03:31 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x102, 0x0) dup3(r0, r1, 0x0) 05:03:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f00000000c0)={0x1, 0x9, 0xffffffff, 0x0, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) 05:03:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) mknod(&(0x7f0000000100)='./file0\x00', 0x22, 0x3) listen(r1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xfffffffffffffff8, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000180)={0x2, 0x1, {0x2, 0x0, 0xfffffffffffffff7, 0x3, 0x7}}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x2a7) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0xfffffe6d, &(0x7f0000000700)=[{0xffffffc4}], 0x235}}], 0x196, 0x0) 05:03:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x4, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x11000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) socket$inet6_udp(0xa, 0x2, 0x0) 05:03:32 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) getsockopt$inet_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000000)=""/118, &(0x7f0000000080)=0x76) r2 = dup3(r0, r1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000002180)={0x0, @dev, @remote}, &(0x7f00000021c0)=0xc) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000002200)={r3, @multicast2, @multicast1}, 0xc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) ptrace$pokeuser(0x6, r4, 0x400, 0x9f) 05:03:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x11a, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:32 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x400000, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x403, 0x88) fanotify_mark(r2, 0x91, 0x8000022, r3, &(0x7f0000000140)='./file0\x00') r4 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r4, &(0x7f0000000300)=""/128, 0x80) signalfd4(r4, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x40000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:32 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40880, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r1, 0x3b, "a444a1", "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"}}, 0x110) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000580)='/dev/cec#\x00', 0x1, 0x2) ioctl$SIOCAX25CTLCON(r3, 0x89e8, &(0x7f0000000800)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, 0x5, 0x15c8, 0x2, [@default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x98, r4, 0x310, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xff}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x14}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xb2a6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0xffffffffffffff82) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r5, 0x1}}, 0x18) 05:03:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000740)="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", 0x1000, 0xfffffffffffffff8) r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="17edfbbf7b3bd3bf5058a1b78cf2c9c946611637705c7cbc5be785516bde58ddaebf8fb6aff2fc8b126025c8972c4842da0fdb9e7d3d17981d", 0x39, 0xffffffffffffffff) keyctl$link(0x8, r2, r3) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:32 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup3(r0, r1, 0x0) 05:03:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x1a01, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x88000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x40000, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="240024d70000000000"], 0x10}}], 0x1, 0x0) 05:03:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) io_setup(0x2, &(0x7f0000000000)=0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x80000000, 0x256501) io_cancel(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x1, r0, &(0x7f00000000c0)="89092c42f34f7801b164641988a65d92f398c7c6595643bdefc0deaf944a3572d833e8ab860c5a62ae555266fbdae73c5974575e2cbc6c2e2fc0c812f8a9bbd3067595cda458cea7af231efa36a96dbbb079341bf79d369e88e77cdfbd9e9245002a19404c8bafe1d4e4bd75dc45833077c7f28fb506dcc5ce499213165e5aa5d9afa67b5519568bb5623a89294331651f7ca9afbdd7b92c2f58cb983d9fe447d26b467bb77cf335551276f6b5814bc35268a9b607afb9", 0xb7, 0x1, 0x0, 0x0, r3}, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:33 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r1, r2, 0x0) 05:03:33 executing program 1: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = getpgrp(r0) r2 = gettid() r3 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x2, 0x103) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'nlmon0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r2, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x300, 0x0) getdents64(r5, &(0x7f0000000240), 0x275) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f00000000c0)) read(r4, &(0x7f0000000300)=""/128, 0x80) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000180)=0x2) signalfd4(r4, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x800000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x1a010000, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x4010, &(0x7f0000000100)={0xa, 0x20004e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="24de456220e55774718c00ffffc7000000"], 0x10}}], 0x1, 0x0) 05:03:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x10000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:33 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, 0xffffffffffffffff, 0x106, 0x3}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r2, 0x0) 05:03:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x3df) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000640)={0x0, 0x1000, "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"}, &(0x7f0000000080)=0x1008) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={r2, 0x1737, 0x0, 0x2}, 0x10) r3 = getpgrp(0xffffffffffffffff) r4 = getuid() getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)=0x0) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={r3, r4, r5}, 0xc) getsockname(r1, &(0x7f0000000140)=@ax25={{0x3, @netrom}, [@bcast, @default, @null, @default, @rose, @netrom, @null]}, &(0x7f00000001c0)=0x80) 05:03:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) write$binfmt_misc(r2, &(0x7f0000000180)={'syz0', "86418377d03e435e472ee9faa610f2e18ba720452c8f1cc51582293b8ab4093c52e66ce95bd1e6785e628192d2e9b924088878d463cd74d9eaee62ccffffec968639ba73b13d18977148c587688058845e90a73ee1bb8c910ff51096394c825f9cf0e2ab9e0aad8e496623fe18"}, 0x71) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)=0x0) migrate_pages(r3, 0x7, &(0x7f0000000340)=0x100000001, &(0x7f0000000380)=0x7) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) signalfd4(r0, &(0x7f0000000080)={0x101}, 0x8, 0x80800) pwrite64(r1, &(0x7f00000003c0)="03c6b677b011a9868cd622e025a67d92731b7aa56102a20196f7754b4c4e42c1b99f935f896db5c2692fe7a8d18082e281d6b0aeadd218d0ac6d6e49c99d7d", 0x3f, 0x0) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="24000000000000000000000000100000"], 0x10}}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000200)=""/252, &(0x7f0000000100)=0xfc) 05:03:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x4000000000000, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:33 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x80000, 0x0) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f0000000140)={0x8, @raw_data="daa305046537f1683f4e80af635d19020b603aaaa1bd07c6f941bb029888a8dbf47b8feda95d0a51523df6ae8451b563b1094b85f57448e2e37fe24a4dfc17528c9c50375107d563bb08cf62c840b12d40a85af2d1d5ff132415dfb32103fa94d6d3f4f737a05a455fc2fede11c55a2e82a4f7ce2fdccb1e227800876082403719332503f9e9552dbeff80cf60c37e6d2a58a7c5b89f45e308bf041df4f489a274649b38121b11adbc64a7aac0d5db7c9604f092188686465744bc1e5c033a7d07666d38bb5c8a62"}) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x100000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 608.511493][ C0] net_ratelimit: 27 callbacks suppressed [ 608.511538][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 608.532913][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x8000, @mcast1}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:33 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) eventfd2(0x6, 0x80000) 05:03:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x200000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xd22ded202129b533, 0x200000001813, r0, 0x0) [ 608.624718][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x1a01000000000000, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:33 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 05:03:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x600000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$sock(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @rand_addr=0x7f}, 0x7, 0x1, 0x2, 0x3}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000200)="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", 0xfd}], 0x1, &(0x7f0000000300)=[@txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x100000000}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @mark={{0x14, 0x1, 0x24, 0xab39}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}], 0xc0}}, {{&(0x7f00000003c0)=@caif, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000440)="094e379f214d740670e05e233954ca3e2118d75abdabf9c853061620e6ace53e115eff1be41d9480a3c1dffa23c3be9a13f35342ab43a01ed5130fd367d576079429cd186564c9bb12a46a70ce28aeb1c19983f6db801048e76d9bf436f6f9a224507596d21913d309d4bc0e6a0e9e4d7c24bae20d9f1b9c667b4d42d732f8027a6d14bd8976df27dbf7891449b60c678c8e21879b61fd058ae47cf3ce6696c90da8a29b5598ef0e884591f431484ded5da7c4384ec894febcda", 0xba}, {&(0x7f0000000500)="9b57ad661b9bb759f3db8e33176f0982de429b9a7ae2eca71829e9265d185c6f1b1af9cb883756ac82c98df820df6560fd4ed22e076dbcd8", 0x38}, {&(0x7f0000000540)="8e1452d3792605a42f2ba45bc03195562d20ffc37414725d424f1c238b6b2efa9fb9fcf64d7c06ae41f08aa8a790d2f620c09281b0b8a5ad277ec0c46d704aee18095294f1c414556108031a56a6dd41f412ce7ab8ebf2980cd4f303d119eda4ba7ef689126661da093b6161d0fa261aa928744b9d9efc1ba486d4af1495", 0x7e}, {&(0x7f00000005c0)}, {&(0x7f0000000600)="cd5cc755b7eec0344d7c3f8fb4202a598283dd9043dc9f554e0585bddbd4169f1974ebcec8a244fb1b52d54f26d9b9704a6ff5efc8582d6c6c67e92436362633debc5a42c097", 0x46}, {&(0x7f0000000740)="07ad3a9b5004c94f69695753dadb7419d0b978b1a16e150c9a98e14c580eff3ef9faebb7b0e3c2711e79e735cd6bda46702eaaac0173b70a8003d5878e1b779c91dfa7e66a500001d7261d0bca1fdf4ea50eb389abc59afb9b5fe0655f1b24c9ea664d97d0736153fd2838ebc91e8c203246b480093d13fed6c3ebf87088126b6a9b81f53fb84a6be77e554741b9bc5fef2f4494e12c9880faa5fbe64373145146205e8518a230dedca583f2e1961f0cc9c27a20bf495bf883dd0e79a4a1b8cca9160ae07d85b6098bf7da490a316c78ee", 0xd1}, {&(0x7f0000000840)="c4f3922ff88b71b910f405b917c098624545e4c8c826ad674c98207b2c9bbcbdc1cdf06743121a3f3deeff85803af2f8f24491417c0ad6677a7af082eca314b5e992dbfb476ce4c5679865eaf9f7946f3ab5b7cc1801246f6ee0aa603cff84cf34a4b22908e7868fd768c073367eb6ef3ef6a5ff576e607c4bc76a3f308f9b814fd8889c58848d38a68178d22a3441caf9b447783e37fa5b484cc33df3d38cabaf2ce2", 0xa3}, {&(0x7f0000000900)="f4c1231fcb0eeabf3ed4606e9d114ca9f1f2662c607da9e92a9647123271718cae80eb9c7aedf5455c6593a5a1acf258e74a0367ff808040c017820eeface48be7737c8a3db0dec0e23bb241fa139e30058d39680f2917972f133211777b1ee158e34d258712562f8f27713eac7d21919746ad14c51fa7bc7a1659cf584b29a230e8c9ad691aa24645e5310c6a8f635fb6a013ed0395ec9fd87d8b3912ed08d2c1c428afc86cc27c5734e043155fd8d8afc165bce66a70b7d36986dacf2cb8e7c9c6b469fbfc358c255e89a4ee221ff7b0debd44d4285c5ab5ed1671d4625a9a2ef85f2f9871ed6b2beb851928f206b0d768141b9a488b", 0xf7}, {&(0x7f0000000a00)="390fc1e1101f835269478bbd38de8b3c8e729e00f6542cc22cfd663c3c946c3f4818781e1422307f0eddc8f15d50d094e7481309978e97789fcaeb1ffca8cf082a2ea03c0cd3be47662731e9e6ced7908ae361edd51d76b09208ab6ff69341ec78c63fd1d6892975154cd479c4998c6ecc7d7d5ff973289a9d098477429ac4715409bea7221d78dbbac2660b3f054193b889ad35f0ac94117ee8b933dd1c66052f8d05ed6d72d95a42cbb9adabf67f550242439de5e31cccf59427b607d71f1b2872720eeb4a92c0b56a76fe2b091918af6ba29752654f155fd4e52798f249e72b790c", 0xe3}, {&(0x7f0000000680)="36eecdbcc955634f52a831a7b3516c3101a97350b185150120147e61146f5eeb753f007906944020121f99f0dbdae3358ef13214a8c8bcbdae", 0x39}], 0xa, &(0x7f00000006c0)=[@mark={{0x14, 0x1, 0x24, 0x1000}}], 0x18}}], 0x2, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) accept4$inet6(r0, 0x0, &(0x7f0000000080), 0x80000) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004005, &(0x7f0000000100)={0xa, 0x20004e21, 0x0, @empty, 0xfffffffffffffffe}, 0x340) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="2488f500"/16], 0x10}}], 0x1, 0x0) [ 608.849985][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f0000000040)={0x9, 0x0, 0x300a, 0x7, 0xbcba, 0xbc1b87b, 0x0, 0x1}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x1100000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:34 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x34, 0x0, &(0x7f0000000040)}) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f00000000c0)="2b2d0f65ec6f5ab936ecf7455008cb4ee3ef50705ca07ba3f08dcc3ab00e0b5f24f795b1dd474347b4c647556db8548240a90f28059373345f2095e0485400ff12bafa87f4673ab7f5a87c9e803df6aa7fdb4b4d4ef5e4d22cb23686") r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$setflags(r2, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r1, r2, 0x0) 05:03:34 executing program 1: r0 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) r2 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000540)=0x10, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0xfffffffffffff800, 0x28800) r4 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x4, 0x16380) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000600)='/dev/md0\x00', 0x0, 0x0) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ashmem\x00', 0x100, 0x0) r7 = accept$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700)=0x6e) r8 = open$dir(&(0x7f00000007c0)='./file0\x00', 0x2, 0x8) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000800)=[r1, r2, r3, r4, r5, r6, r7, r8], 0x8) r9 = getpgrp(0x0) r10 = gettid() r11 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$XDP_TX_RING(r11, 0x11b, 0x3, &(0x7f0000000480)=0xffffc, 0x4) r12 = socket$can_bcm(0x1d, 0x2, 0x2) listen(r12, 0x10001) ioctl$ifreq_SIOCGIFINDEX_team(r12, 0x8933, &(0x7f0000000080)={'team0\x00'}) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r9, r10, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r13 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r13, &(0x7f0000000140)=""/128, 0xfffffffffffffedd) signalfd4(r13, &(0x7f0000a71ff8)={0x64}, 0x8, 0xfffffffffffffffd) r14 = socket(0xb, 0x804, 0x7) bind$rds(r14, &(0x7f0000000400)={0x2, 0x4e21, @empty}, 0x10) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r14, 0x29, 0x20, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x1e}, 0x9e, 0x2, 0x1, 0x8, 0x4, 0x9e}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp6_SCTP_STATUS(r14, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x1000, 0x20, 0x7, 0x8, 0x8001, 0x7, 0x6, {0x0, @in6={{0xa, 0x4e24, 0x8, @mcast1, 0x2}}, 0xe70, 0x8, 0xfff, 0x3, 0x8}}, &(0x7f00000002c0)=0xb0) r16 = fcntl$dupfd(r11, 0x406, r12) setsockopt$bt_BT_FLUSHABLE(r16, 0x112, 0x8, &(0x7f0000000440)=0x8, 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r14, 0x84, 0x76, &(0x7f0000000300)={r15}, &(0x7f0000000340)=0x8) 05:03:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000240)={r3, 0x2}, &(0x7f0000000280)=0x8) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x10000000321000, 0x9) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000200)) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x3) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:34 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000240)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x80042, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000400)=""/128, 0x3a290e6d053c5a08) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000280)) ioctl$void(r3, 0xc0045878) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x42000, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r4, 0xc0285628, &(0x7f0000000140)={0x0, 0xfffffffffffffffa, 0xb6, [], &(0x7f00000000c0)=0x1}) ioctl$sock_SIOCADDDLCI(r4, 0x8980, &(0x7f00000001c0)={'team0\x00', 0x400}) fadvise64(r3, 0x0, 0x6, 0x0) getpgid(r1) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x200000, 0x0) [ 609.288976][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:34 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0xa00c0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000240)=ANY=[@ANYBLOB="ee00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fafaf20d06ab12033588a999238f8a08c29238d2280bec9bad5790902326e53fdedee300879e4a9c8e0a2b23ca4e4d73ece357e44153998e63df2c3853ae2aad912378b9bed22cf7e4ed95b205494de3ce630f260ebd"]) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) 05:03:34 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_open_pts(r2, 0x40200) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) ioctl$RTC_UIE_ON(r2, 0x7003) dup3(r0, r1, 0x0) 05:03:34 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x7ffffffff, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14, 0x800) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@local, 0x4e23, 0x1, 0x4e21, 0x8, 0x0, 0xa0, 0x20, 0x3f, r2, r3}, {0x2b31, 0x562000, 0x95, 0xffffffff, 0x9, 0x5, 0x7fffffff, 0x5}, {0x2, 0x973, 0xfffffffffffffffc, 0x1}, 0x9, 0x6e6bbe, 0x3, 0x0, 0x3, 0x2}, {{@in=@loopback, 0x4d2, 0x33}, 0xa, @in=@multicast2, 0x3506, 0x3, 0x3, 0x7ff, 0x8, 0xffffffff, 0x1}}, 0xe8) [ 609.647993][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:34 executing program 1: r0 = getpgrp(0x0) r1 = gettid() r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0), 0x0) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8800000000000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 609.767444][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:34 executing program 3: mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='gfs2\x00', 0x1, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0xfffffffffffffffc, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) readahead(r0, 0x8, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) [ 609.844801][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x80000001) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000000)=""/230, &(0x7f0000000100)=0xe6) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x8280) getsockopt$TIPC_IMPORTANCE(r3, 0x10f, 0x7f, &(0x7f0000000200), &(0x7f0000000280)=0x4) dup3(r1, r2, 0x0) 05:03:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000280), &(0x7f00000002c0)=0x10) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000d25647af46aa9ed2a400008000000000000000000048e8145f97cbb96ad149d630e5d9b7d5a7d7647477f4e917aa09539a197d1286175e4a02ba9db25836ed8ce88cacf73a87c9230000000000000006ce94cd017cfccda4d4e30708f98476e26b451d15957efdad7391cf2124e17aa041faecbf80f1c44b20895f72caa1ac37dbce624572e51080652c3a039b006ff811c25c183f56a9d0"], 0x10}}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r1}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000100)={0x3, [0x2, 0x4, 0x10001]}, &(0x7f0000000240)=0xa) 05:03:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0xffffffff00000000, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:35 executing program 1: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000140)={0x7ff, 0x14, 0x1, 0xffffffffffffff9c}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000180)={0x7, 0x4, 0x1, 0xffffffffffffffff}) tee(r0, r2, 0xffffffff, 0x7) r3 = getpgrp(0x0) r4 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r3, r4, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r5, &(0x7f0000000300)=""/128, 0x80) signalfd4(r5, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$UI_SET_ABSBIT(r6, 0x40045567, 0x5) [ 610.113198][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:35 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x4, 0x400800) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x300000000}, 0x1c) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0xfffffffffffffffe}}, 0x18) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0xa0}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000300)={r4, 0xfffffffffffffffb, 0x10, 0x99, 0x20000000000}, &(0x7f0000000340)=0x18) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000040)={0x3e, @dev={0xac, 0x14, 0x14, 0xb}, 0x4e23, 0x4, 'lc\x00', 0x8, 0x1ff, 0x46}, 0x2c) r5 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r5, 0x9, &(0x7f0000000140)=""/227) accept$inet(r0, &(0x7f0000000380)={0x2, 0x0, @local}, &(0x7f00000003c0)=0x10) 05:03:35 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000000)={0x0, 0xffffffffffffffdf, 0xfa00, {0x0, &(0x7f0000000600), 0x13d}}, 0x20) dup3(r0, r1, 0x0) [ 610.276354][T14934] QAT: Invalid ioctl [ 610.287843][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="24000000000000000000000000000000b7137540a8"], 0x10}}], 0x1, 0x0) 05:03:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:35 executing program 1: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x80040, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0xc) r2 = getpgrp(r0) r3 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r2, r3, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) read(0xffffffffffffffff, &(0x7f0000000300)=""/128, 0x80) signalfd4(0xffffffffffffffff, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64MMAP\x00', &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x18, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x113, 0x7}}, 0x20) 05:03:35 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x2, 0x2) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000280)={0x1}) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x3f3, 0x800) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000001680)={0x53, 0x0, 0x7, 0x0, @buffer={0x10e, 0xb8, &(0x7f00000001c0)=""/184}, &(0x7f0000000300)="00041b8fd622c9", 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f00000000c0)={0x3, 0xb877}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x0, 0x7}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x0, 0x541c1) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f00000003c0)={0x800, 0x1}) setsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f00000002c0)=0x8, 0x4) dup3(r1, r0, 0x0) 05:03:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$cec(&(0x7f0000000500)='/dev/cec#\x00', 0x2, 0x2) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000540)='syz1\x00') sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) r3 = add_key(&(0x7f0000000080)='ceph\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000180)="881702204851cb7d1d1993a1044421d3c83fbfdb803127fd7e9adf30899a15ef8dfced2a31a99ca3e8e27e086e0966c3d7b726f849df8660b867abec6966fdd85c4ab1e434625f412fc71ba3decf8f9fb6a0d71442ba683af2472a862507c7c487a818beddbbe09482ce1f62fbb0c849b4e827fa56d88d7fea9996bd1c0cd1666d428518f77a3a4ed0846ea0753ad773b6d4635223bb461ae3eacf43babdd43c8575e96b5fac4ea1ef31aa5db70ed5c9c6", 0xb1, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000240)={r3, 0xc7, 0xe4}, &(0x7f0000000280)=ANY=[@ANYBLOB='ens=pkcs1 hash=ghash-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'/71], &(0x7f0000000300)="9405fa8d87eaed1ffb38211bad0da5f0c452432be3f0e6939c224c1307dda69ba74a36a4a7815ff68b6399698eac8507f5374391dc1ba3c220883244f4f14fe4632cb1c260dca453477f5d9a31b35f143d2f4189d77a13503b6fe73616a66dd6f658e767df163dd735054dfa77b42941243acdcdb02c20c9ebd1f6dda03ac3d194218e56de23975b0790cb20635e501582659e4cfeb27411588d121dde6698b29bf079d3aa7f60e10887142c0322d46b996aaf20b76231c3ffc8ec34f879ae75bd45b8481f3753", &(0x7f0000000400)=""/228) 05:03:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:35 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) setgroups(0x2, &(0x7f0000000380)=[r3, r4]) wait4(r1, 0x0, 0x4, &(0x7f0000000140)) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x7, 0x7, {0x0, r1, 0x1}}, 0xfffffffffffffcfa) 05:03:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:36 executing program 1: r0 = getpgrp(0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@rc, &(0x7f0000000140)=0x80) sendmsg$rds(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/81, 0x51}, {&(0x7f0000000200)=""/48, 0x30}, {&(0x7f0000000240)}], 0x3, 0x0, 0x0, 0x4}, 0x80) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r2, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x5) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:36 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x40, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) fspick(r0, &(0x7f0000000040)='./file0\x00', 0x0) 05:03:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:36 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000000)) 05:03:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:36 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) rt_sigprocmask(0x3, &(0x7f0000000080)={0x3}, 0x0, 0x8) 05:03:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000180)={0x7, 0x5, 0x4, 0x40000000, {r3, r4/1000+10000}, {0x3, 0x8, 0x8, 0x10000, 0x800, 0x100000001, "98091669"}, 0x2, 0x3, @offset=0xfffffffffffffc01, 0x4}) 05:03:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = msgget(0x0, 0x0) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000000)=""/127) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x4, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:36 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x6, 0x10040) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="5b6c57dc3f09d6c4ee1841fd2517d757", 0x10) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000200)=0xff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x106, 0x2}}, 0xfffffffffffffc99) r3 = dup3(r1, r2, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x48200) linkat(r2, &(0x7f0000000080)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00', 0x1000) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000000)=r3) 05:03:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x9, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$BLKRAGET(r2, 0x1263, &(0x7f00000000c0)) 05:03:36 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xffffffff80000000, 0x0) recvmmsg(r3, &(0x7f0000002300)=[{{&(0x7f0000000140)=@ethernet, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/63, 0x3f}, {&(0x7f00000001c0)=""/77, 0x4d}, {&(0x7f0000000240)=""/26, 0x1a}], 0x3}, 0x2d3}, {{&(0x7f0000000380)=@hci, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000400)=""/85, 0x55}], 0x1, &(0x7f0000000480)=""/173, 0xad}, 0x800}, {{&(0x7f0000000540)=@isdn, 0x80, &(0x7f00000009c0)=[{&(0x7f00000005c0)=""/8, 0x8}, {&(0x7f0000000600)=""/214, 0xd6}, {&(0x7f0000000700)=""/65, 0x41}, {&(0x7f0000000780)=""/229, 0xe5}, {&(0x7f0000000880)=""/197, 0xc5}, {&(0x7f0000000980)=""/11, 0xb}], 0x6, &(0x7f0000000a40)=""/62, 0x3e}, 0x7fff}, {{&(0x7f0000000a80)=@un=@abs, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000b00)=""/2, 0x2}, {&(0x7f0000000b40)}, {&(0x7f0000000b80)=""/90, 0x5a}, {&(0x7f0000000c00)=""/154, 0x9a}, {&(0x7f0000000cc0)=""/23, 0x17}, {&(0x7f0000000d00)=""/202, 0xca}, {&(0x7f0000000e00)=""/129, 0x81}], 0x7, &(0x7f0000000f40)=""/18, 0x12}, 0x1}, {{&(0x7f0000000f80)=@isdn, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001000)=""/34, 0x22}, {&(0x7f0000001040)=""/70, 0x46}, {&(0x7f00000010c0)=""/221, 0xdd}, {&(0x7f00000011c0)=""/4096, 0x1000}], 0x4, &(0x7f0000002200)=""/195, 0xc3}, 0x3cd}], 0x5, 0x10000, &(0x7f0000002440)={0x77359400}) 05:03:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0xa, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x11a, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:37 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e4, 0x485d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:37 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x80000, &(0x7f0000000080), 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40)={0x10001}, 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = getuid() r2 = geteuid() syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="14060cc198cdaf397ffe9b8a462bf4fc6cc2abfea33182790afa2ab1", 0x1c, 0x10001}, {&(0x7f00000004c0)="67d6216182e4e8e96bf3a1b00de7b4e291d827bbb146fdddec7e6075d5f4d34d178e3521c7960408812daaec66ecde48227ed7502e08549dfdec5414f127c986478ef510b5a77509c7e3f8bb9109e9881239d578bf09373950bb915148435026516ba487c0d20f263630060a87fc44085b5ad7e38d6a866edcfdaf93ad2b501510909d63219889a68cdc38a9c66853b9cd51439ab5fcb47f41fe96df813a85f171eab93f9ed2e9d7c284643d781639cbc1158fc1c27a0de099b18326a0c18a2ef2183c5cd1c963693f", 0xc9, 0x4}], 0x1800, &(0x7f00000007c0)=ANY=[@ANYBLOB='quota,errors=continue,euid>', @ANYRESDEC=r1, @ANYBLOB=',fscontext=staff_u,fowner<', @ANYRESDEC=r2, @ANYBLOB="2c7065726d69745f646972656374696f2c7375626a5f726f6c653d2f6465762f696e66696e6962616e642f72646d615fab66636d00"]) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r4 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x101, 0x80) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f0000000880)="83ba8010cf373f2cd1fb84a8fb6276dba26086f1792a9cdbd45b4d3233ae287506bd0b9d7af6b7ab8a3afa23f27df5653c10bcf440cc02f674d7e34fac3c1f9e97") r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r6, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20002}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x94, r7, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x22b}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x100000000, 0x0, 0x2b, 0xffffffffffffff01]}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x4, 0x81, 0x9]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x7fff, 0x97, 0x5, 0xd2fc]}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x400]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7ce35f70}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x400, 0x0, 0xe14e, 0x9, 0x100000000]}]}, 0x94}, 0x1, 0x0, 0x0, 0x8001}, 0x4000) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="20010000", @ANYRES16=r5, @ANYBLOB="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"], 0x120}, 0x1, 0x0, 0x0, 0x1}, 0x4000) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r3, 0x1}}, 0x18) 05:03:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x1a01, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x40, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @remote}, 0x3af) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:37 executing program 1: r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/ip_tables_targets\x00') ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000180)) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r2, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0x100) setsockopt$bt_BT_VOICE(r4, 0x112, 0xb, &(0x7f00000000c0)=0x63, 0x2) 05:03:37 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7f, 0x400) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000100)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={r2, 0x7, 0x1000}, 0x8) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r4 = dup3(r0, r3, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000000)={0x100000067}, 0x3e9) 05:03:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x40000, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0xd, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:37 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) write$P9_RREADLINK(r3, &(0x7f00000000c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 05:03:37 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$notify(r1, 0x402, 0xebee0640dbdbe0f2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x1a010000, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000340)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x10800, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000002c0)={'filter\x00', 0x0, 0x3, 0x9e, [], 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000200)=""/158}, &(0x7f0000000100)=0x78) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0xffffffffffffff3d, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0xffffff20, 0x7, {0x0, r1, 0x1}}, 0xfffffffffffffe4b) 05:03:38 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) r3 = signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x8, 0x1ff, 0x401, 0x74, 0x89}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000140)={r5, 0x88, "1d3f48b99abfe7ec81305b9b6415510ad09ccba20faaeb8f9f6c4f6538723f9eb40ee349e86a34e3a2371b24a6b2c155a1b0e957cd5359fd377b56651c7b0996b54922be812ddf576bbd7f6793995587c9d14353980103d2220549b90acf9b5a223abc5167338320bb13d3eed5ba7d861b9bfde9c4132737112cd1b399e922d95c9bc78262de5649"}, &(0x7f0000000200)=0x90) 05:03:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:38 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xc) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x1, 0x2080) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000280)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x7, 0x4, 0xc7, 0x0, r2}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x9, 0x200, 0x7, 0x7fff, r2}, &(0x7f00000001c0)=0x10) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x9, 0x1030, r0, 0x0) pipe(&(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={r2, 0x1000}, 0x8) dup3(r0, r3, 0x0) 05:03:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x4000000000000, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = fcntl$dupfd(r0, 0x406, r0) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f00000000c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, r3}) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1195d956ba38553bd93ada8f64c08f9583109ecdab02395ae4d16e5f2e16db7d4920413bb2524a65c31e6f309d2400000000c869b6df2c06763619392c874bc765a9ffd3a0472acaf3009e96d1a98f57d3611b8623641f6e757f44a524b1816d88bb244616bb5904e4eebd77ce9d00bcff50145ebce54aad523a454b7ccfa91c78fe71eb0cb15b0324188c1fcf2786c2e9a5074f725699cc981dfc4c3f1a063075825dd0fbec684e096e0e5d60b11a6b01122246bdcfd630"], 0x10}}], 0x1, 0x0) 05:03:38 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) rt_sigprocmask(0x1, &(0x7f00000001c0), &(0x7f0000000200), 0x8) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4, 0x30b00) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000140), &(0x7f0000000180)) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r4, &(0x7f0000000300)=""/128, 0x80) signalfd4(r4, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:38 executing program 2: kexec_load(0x1, 0x4, &(0x7f0000000440)=[{&(0x7f0000000280)="a531e4b3cd70ec7f8c68b0290b953ec06388a69b866d0618f99b844442feb8a67012629d0ae8e3618f75f3bfe8c307d34be030f2f5e62987382213bfdce3971005415879af0be9aab37cf4442d7dc84e9884fcd8076247e0b220ce36db1d8ab7347a8758e85e0097c9014e1e4152b1fb772e4d52d802258037675fbf1d3f754da984d4b1aa3108e749c8ccbaf384160f100e822ec47859b4a623063d0c8772718e797b8c0936065863f83f00314aab5610cdb4715c5fbebd40eb98b2ae84a82bdc4ca876eee647cebd5d3dc96777dacc", 0xd0, 0x0, 0x200}, {&(0x7f00000001c0)="3f6f67bf320f7aab636319cfdf158980469edfee916b26d595839f5993991d5ef5083faba474d76ec8a3157ee7eb4ac8c6c207e56324c95ad987a20be8af143cbc721e2bfff93eb10b1c31a0a8c83a649798d9d955754a5579870676dcb60f5cd2196e75f4ccd3c1097631d03a51c5c46569bc0b364d22b69a", 0x79, 0x7, 0x8}, {&(0x7f0000000100)="bd9670e985f87a", 0x7, 0x0, 0x7}, {&(0x7f0000000840)="483157830e829a9816d7e32830aec4cf582f26153a9befe009e50a129d69e0f1880f7975511a6f642a01cfa23f9f9139a56cce658b6a9c02fdb0ec65dbfccf26eefedbb75a6043f2848d92ad3fb4146542e913dac76e579fd4d867ca1e35047a2dcb6d59d6ede911ff92c62c1eb4ad20195abcd5c68fb6dfd5c126b87f141726428c5f3459b00ba8979777144a3fe4f302db6e718f4f59d5f816966b5dba13c36b468a3f020000005193518a1a2f98006fe49fcf09602a1b7212b943f51a462544c9fa61f6d9caec0928fa213e9adf6e7a310ae57aa70bff662ab81a2fee3a90b653f34d2c68ddb2784e2ce4103be83eff08cf01b89a1d1225f8590d54c5002e5eea03ae25d9fcbff70efdcc5966d00d001cf4c53a18ff6f3ce93d5b96635a48300110d6fcc626eb1f549492c59ed5256f1104e3a4d426e875ce66db48b2f73fdb18ed93a4d9c20f9316207ea3", 0x14d, 0x0, 0x7f}], 0x140000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) r0 = request_key(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, r0, 0x401) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000780)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f00000007c0)={0x7, 0xe3e, {0x57, 0x9, 0xffffffff, {0x3, 0x5}, {0x3, 0x6}, @const={0x20, {0x9, 0xfffffffffffffffe, 0x1, 0x7f}}}, {0x57, 0x7, 0x7, {0xfff, 0x401}, {0xffff, 0x100000000}, @rumble={0x1eba, 0x5}}}) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000640)='/dev/null\x00', 0x800, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r4, 0x4040aea4, &(0x7f0000000680)={0xd87f, 0x16c, 0x2, 0x4, 0x81}) keyctl$describe(0x6, r3, &(0x7f0000000080)=""/89, 0x59) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000580)=0x81, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r1, r1, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000740)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000006c0), &(0x7f0000000700)=0x14) 05:03:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x1a01000000000000, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x11, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23, 0x200}, 0x0) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e23, 0x0, @dev={0xfe, 0x80, [], 0x27}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) [ 613.645434][ C0] net_ratelimit: 27 callbacks suppressed [ 613.645444][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) prctl$PR_GET_NAME(0x10, &(0x7f00000000c0)=""/103) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x4, @remote, 'lo\x00'}}) 05:03:38 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r3, 0xc034564b, &(0x7f00000000c0)={0x40, 0x73777753, 0xfffffffffffffff7, 0xff, 0x2, @discrete={0x2, 0xdc5}}) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) [ 613.694769][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x12, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0xf}], 0x10}}], 0x1, 0x0) 05:03:39 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x3, &(0x7f0000000080)={0xfffffffffffffffc}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) getsockopt$inet_mreqsrc(r0, 0x0, 0x2f, &(0x7f0000000080)={@local, @loopback, @remote}, &(0x7f0000000100)=0xc) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:39 executing program 2: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000001c0)) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_tables_targets\x00') ioctl$VT_DISALLOCATE(r2, 0x5608) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r4, 0x324, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4) dup3(r1, r3, 0x0) write$P9_RLERROR(r2, &(0x7f00000000c0)={0x20, 0x7, 0x1, {0x17, 'net/ip6_tables_targets\x00'}}, 0x20) [ 613.963074][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0xfffffffffffffebe, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0xa0000, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r3, 0x11, 0x1, &(0x7f0000000280)=""/14, &(0x7f00000002c0)=0xe) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000100)={0xaa, 0x6f}) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x80) sendto$inet6(r4, &(0x7f0000000340)="0d2058fa383e7fe2f80855e8de7de7dbaf3b6c24b709b0ad3bdfddac1ddefd7d9c6fe8fa2e6585c56d0813607b00da58", 0x30, 0x40000, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x6) ioctl$UFFDIO_UNREGISTER(r4, 0x8010aa01, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000380)={'team_slave_0\x00', 0x7}) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="28000000110001000000000000000000fe8000000000000000800000000000bb0000b900000000ff005bdd0cb3041d1c2f8e8606182a1da1a7cb5e4bf844d1912509098afdf0dd9a4148a81f5fdd85c2b4b600deed306525a32e7deaede2487da923c29fee3eadc4"], 0x28}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) setsockopt$IP_VS_SO_SET_DELDEST(r4, 0x0, 0x488, &(0x7f0000000840)={{0x3f, @remote, 0x4e24, 0x2, 'fo\x00', 0x2, 0x100000000, 0x51}, {@multicast1, 0x4e23, 0x0, 0x80000000, 0x5, 0x8}}, 0x44) getresuid(&(0x7f0000000500), &(0x7f0000000300)=0x0, &(0x7f0000000580)) setsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000640)={{{@in=@dev={0xac, 0x14, 0x14, 0x18}, @in6=@loopback, 0x4e22, 0xed, 0x4e23, 0x4, 0x2, 0x80, 0x20, 0x2, r5, r6}, {0x3, 0x3, 0x0, 0x5, 0xea2, 0x6, 0x1, 0x7}, {0x5, 0x32788e2e, 0x8c, 0x401}, 0x1, 0x0, 0x2, 0x1, 0x2}, {{@in6=@ipv4={[], [], @rand_addr=0x1000}, 0x4d3, 0xff}, 0x2, @in6=@rand_addr="820db0fd814d4e2e4af95f14132bf6ce", 0x0, 0x4, 0x0, 0x7fffffff, 0xbd, 0x7f, 0x5}}, 0xe8) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000740)="e8de4bcf39dc16bfb11cdc5f97471c6c8f7bbd1432986d4f2d20751a1b80e9af638893072a586686aae051f535196b2de5e6dfd6a88cb4e96484505683acbf2380de6e249b49c4a8c36d5ba81cee1493225a9cc224a1584e028e609fbafe320421dd8e1c78ae3a1b7d2bfc8fcc68ec4ba9b1d0b37a1aab0588dc202ce3712afebd510cf3cab6cf5c5fd211e300f9d0b1be7e13ceded94594b4bc0387f9d050e4e9543a1d2dd8ba1253d83009e8875a9785c4c79335dea5fc23b15621139d3f324e2e0e6a2ae5adc7e07a167af935a906dfef017918bb25a7a4ceef70eee01593becaab9eefbd", 0xe6) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f00000008c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) [ 614.043560][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 614.094119][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:39 executing program 1: r0 = getpgrp(0x0) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x400000, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f00000001c0)=0x2, 0x4) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x610800) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000380)={0x4, 0x8, 0x0, [{0x7, 0x1, 0x43a, 0x0, 0x4, 0x1, 0x7}, {0x7, 0x9, 0x1, 0x3, 0x81, 0x100000001, 0x8}, {0x6, 0x469a, 0xaf, 0x100000001, 0x4, 0x1767, 0x31}, {0x4, 0xb74, 0x5, 0x8, 0x8, 0xfffffffffffffffa, 0xe15}, {0x5, 0x8, 0x9, 0x6, 0x40, 0x5, 0x9}, {0xffffffffffffffff, 0x7fff, 0x80000001, 0x1, 0x8, 0x401, 0x1cf}, {0x4377, 0x2ea0, 0x326, 0x98, 0x40, 0x2, 0x6954}, {0x7, 0x5be, 0x7, 0x9, 0x7ff, 0xfff, 0x5550}]}) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r4, &(0x7f0000000300)=""/128, 0x80) r5 = signalfd4(r4, &(0x7f0000a71ff8)={0x20000000000064}, 0x8, 0x0) fsetxattr(r5, &(0x7f00000000c0)=@known='system.sockprotoname\x00', &(0x7f0000000140)='/dev/nbd#\x00', 0xa, 0x3) 05:03:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10008}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r3, 0x800, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x3d05}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:39 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3f, 0x10000) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000280)=0x1020) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r3 = dup3(r0, r2, 0x0) getsockopt$inet_int(r3, 0x0, 0x3d, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xa93, 0x100000000, 0x800, 0x101, 0x0, 0x52f5, 0x8000, 0x4, 0x1000000000000000, 0x573, 0x5, 0x516, 0x0, 0xffffffffffffffba, 0x48, 0x2, 0xeed8, 0x2f2, 0x40, 0x8001, 0xfffffffeffffffff, 0x5, 0x3, 0x800, 0x7f, 0x40, 0x4, 0x1, 0x5, 0xbd, 0x8, 0x9d, 0x2, 0x1, 0x1, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000080), 0xc}, 0x1000, 0x3, 0xfffffffffffffffd, 0x7, 0xe00000000000, 0x1, 0x1}, r4, 0x8, r0, 0x9) [ 614.294995][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 614.318982][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x20000710}], 0x10}}], 0x1, 0x0) 05:03:39 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) pipe(&(0x7f0000000080)) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r4 = request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='user\x00', 0xfffffffffffffffe) keyctl$reject(0x13, r3, 0x8001, 0xffffffffffffffc1, r4) [ 614.408660][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x2000000006, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0xfffffe96) mlockall(0x4) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x15, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 614.594104][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10, 0x4}], 0x10}}], 0x1, 0x0) 05:03:39 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20480, 0x0) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x20) dup3(r0, r1, 0x0) 05:03:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000040)=0x4) 05:03:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:39 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40)={0xfffffffffffffffd}, 0xdd, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000140)={'filter\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f00000000c0)=[{}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) [ 614.819434][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 614.865289][T16368] QAT: Invalid ioctl 05:03:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10, 0x11a}], 0x10}}], 0x1, 0x0) 05:03:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x17, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 614.991323][T16459] QAT: Invalid ioctl 05:03:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) io_setup(0x4, &(0x7f0000000100)=0x0) io_getevents(r2, 0x200, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)={0x77359400}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "57c0aeb16a9f390e", "3a7e13e09d4cc6cb808e1f6c58f162f5c4d8dad25dd4325ea1570fba42290e84", "32dee8d8", "90b3471c6226fe6c"}, 0x12b) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x1e34c3, 0x0) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) 05:03:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x18, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:40 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40000, 0x10) 05:03:40 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x101100, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000000c0)={@local, @broadcast, 0x1, 0x1, [@multicast1]}, 0x14) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10, 0x1a01}], 0x10}}], 0x1, 0x0) 05:03:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='children\x00') ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfff) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000280)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000040)={0xfffffffffffff801, 0xbd5, 0x3, 0x0, 0xefa, 0x800, 0x7f, 0x7, 0x2, 0x100000001, 0x7fff, 0x100000000, 0x0, 0x87c5, 0x3, 0x1, 0x8000, 0x100, 0x1000}) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000300)={0x6, 0xd7}) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000340), &(0x7f0000000380)=0x4) fadvise64(r1, 0x0, 0x9b, 0x1) 05:03:40 executing program 1: r0 = getpgrp(0x0) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x20040, 0x0) r3 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/attr/current\x00', 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cuse\x00', 0x2, 0x0) r5 = syz_open_procfs$namespace(r1, &(0x7f0000000440)='ns/pid_for_children\x00') r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f0000000480)='/dev/snd/midiC#D#\x00', 0x8, 0x8000) r8 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r9 = syz_open_dev$radio(&(0x7f0000000500)='/dev/radio#\x00', 0x0, 0x2) r10 = mq_open(&(0x7f0000000540)='@\'\x00', 0x0, 0x2, &(0x7f0000000580)={0x8, 0x3f, 0x100000000, 0x7, 0x8, 0x2, 0x5, 0xffffffff}) sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000240)="291596a25ab9befb5229b944a0f2ed504c836c698c68d3c8035854cacdf62cd6dd12c62f249d167e00b75ece917584742d74717fc84e42f6b6c6a92486e465550682fa7f0da22b47f9e18accd9511d0ce4dea95fa305d140497edc6584cb8528", 0x60}, {&(0x7f00000002c0)}], 0x2, &(0x7f00000005c0)=[@rights={{0x18, 0x1, 0x1, [r3, r4]}}, @rights={{0x18, 0x1, 0x1, [r5, r6]}}, @rights={{0x20, 0x1, 0x1, [r7, r8, r9, r10]}}], 0x50, 0x1}, 0x4000) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r11 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r11, &(0x7f0000000300)=""/128, 0x80) signalfd4(r11, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x19, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:40 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@empty, @in6=@empty}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="24000000040000000000000000000000dd72c696500bd1f864ce27b09137dc1383311a2c9bdd7f7784bcf1923512151ad651ac4e936aea3d323d62360e4ec0554f8ae5020000003192226dbf0aff300f0a18ffff8a01000000000000401c6a53bd67312b76da7111dd9ccc992f02fffa2687fe3ac6b93b9ec85c7b72301ff25a5d54a22e923f6202"], 0x10}}], 0x1, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r3, 0xc0405665, &(0x7f0000000340)={0x100, 0x0, 0x8, 0x1, 0x6, 0x4, 0x4}) 05:03:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10, 0x40000}], 0x10}}], 0x1, 0x0) 05:03:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x21, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10, 0x1a010000}], 0x10}}], 0x1, 0x0) 05:03:40 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) pkey_alloc(0x0, 0x2) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x22, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:40 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0xfffffffffffffde5, &(0x7f0000000700)=[{0x24}], 0x9}}], 0x513, 0x0) 05:03:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0xfffffffffffffcd6, 0x7, {0x0, r1, 0x1}}, 0xbd) 05:03:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10, 0x4000000000000}], 0x10}}], 0x1, 0x0) 05:03:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x23, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:41 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x7}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) prlimit64(r1, 0xf, &(0x7f0000000080)={0x101, 0x2}, &(0x7f00000000c0)) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) io_setup(0x6, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004007, &(0x7f0000000040)={0xa, 0x20004e24, 0x2, @loopback, 0x3}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:41 executing program 2: r0 = getpgid(0x0) r1 = semget(0x2, 0x0, 0x159) semctl$IPC_RMID(r1, 0x0, 0x0) rt_tgsigqueueinfo(0x0, r0, 0x30, &(0x7f0000000080)={0x3c, 0x6, 0x6}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r2, r2, 0x1000) 05:03:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10, 0x1a01000000000000}], 0x10}}], 0x1, 0x0) 05:03:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000000)={@dev, 0x0}, &(0x7f0000000200)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', r2}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0xffffffca) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e1f, 0x10000082a5, @ipv4={[], [], @empty}, 0x1153}, 0x3b0) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="240000000000ecffffff00ce000000009f0f7a463df0a40741ae9d622c297e3510903eda7edf4fbc11c88d0f3376773a363346dd83058d8d38c442cd61dc8fba82a34fe56bd36796f5e5c91c242cbb89a54011e81dcf0aa13a223d9c11c7a5d5dc32f7ed74fdea28b4e0adc71fc7629c8a630aa716e3"], 0x10}}], 0x1, 0x0) 05:03:41 executing program 1: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r1 = getpgrp(r0) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r2, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x25, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:41 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x3}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10, 0x0, 0x4}], 0x10}}], 0x1, 0x0) 05:03:41 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x800, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000b40)=0x2, 0x4) r1 = getpgrp(0x0) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x5, 0x8140) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) r3 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r3, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000740)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) r6 = getuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) fstat(r2, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000009c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000ac0)=0xe8) getgroups(0x8, &(0x7f0000000b00)=[0xee01, 0xffffffffffffffff, 0xee01, 0xee00, 0xee01, 0xee00, 0xffffffffffffffff, 0x0]) sendmsg$unix(r2, &(0x7f0000000c00)={&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000005c0)=[{&(0x7f00000001c0)="054f074d7a1e9da688bda6ac35e4af3134e77c5b29167f6cdb1bb5ff5e65f21c5b348e50454f075f6c52e055f72eac6b8e31a4a40143251d3981f71b00d638cca3c5b8a8cf5fd22cb8a3740233dd5844a556a14fd6c62ea5eb00ff3ad40167c8d9fd05603b6170e9be3b1c48a594a15adb083cbcc82f7ff2241d7f047cc2712f5fd64e", 0x83}, {&(0x7f0000000280)="b471c8a94711efdb2cc478df4235c4477638d8a78dd377b558fa638c602f1aa7ee8b02d699bec2257e213b512a055d6de695f81d8002fdd93af3166d2066e9e87e1a43de451731714556a8912669", 0x4e}, {&(0x7f0000000380)="35d6d48f9f5c0fd291be71764a2feffd2e0cfa0ac061a0bbb9f41a087febe19678294662010815590ed2c495c9ade096dc2918be8dfc65e9fa260a204796f9fa022b5342ce030ae4586138c55ea4afb27cd77af0bcff0b02826288a310ea6e131274122fb0e0d4303e8371", 0x6b}, {&(0x7f0000000400)}, {&(0x7f0000000440)="7bd32ef2243817a814279c1386687d2991e14cd65ab4bdb1051ba7e39c366aec40b973766a599d85b982c2ecfd848297b86937217f563f96b2632b49f0441aab140d1e04bf", 0x45}, {&(0x7f00000004c0)="cacd7efdef7d4e14ceb8e0c8ed9608e91e51c5d48088b69a64c9c6ac5f31c1574e2a2d39728bd695221b00e9ddf8325ad75fb390ac99908a78ff0f2fc703b86dfcddb32bd4cbb1d1b37bdc9b560e6fde05e310e5d5ce24ccb307c0377d4b339ca6a17d45342243476cd3bb73b5a862b6196a9eaa33205c49a8cc1a25a559d20d6f3d5c558e82", 0x86}, {&(0x7f0000000580)="effead66e981124dc804a45e0102d865f4d23fda65a4b9b82d68fdfc052b370223ae1c063837ce48ebbdbefd3e11750f2014c210", 0x34}], 0x7, &(0x7f0000000c40)=ANY=[@ANYBLOB="30000000001c00000100000001000000556728ce18fedf4de97b8fa3463e0c9cc66179072f1fab402aa37331", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB='\x00\x00\x00\x00'], 0xa0, 0x4000004}, 0xc840) r12 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r12, &(0x7f0000000300)=""/128, 0x80) signalfd4(r12, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x28, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x7fff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, 0x1c) 05:03:42 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f0000000080)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000040)=0x1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0xfffd, 0xfa00, {0x0, &(0x7f0000000600), 0x111}}, 0x58) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000280)={0x3, {{0xa, 0x4e22, 0xfffffffffffff550, @rand_addr="fba18270126aed87cbfd78bfc15d2817", 0x4}}, {{0xa, 0x4e23, 0x3, @local, 0x3}}}, 0x108) dup3(r0, r2, 0x0) 05:03:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x7dc) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = dup(r0) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000000)) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000040)={{0x0, @addr=0x3}, 0x8, 0x7, 0x1}) 05:03:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10, 0x0, 0x11a}], 0x10}}], 0x1, 0x0) 05:03:42 executing program 1: r0 = getpgrp(0x0) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000380)={0x0, 0x0, 0xa, 0x0, [], [{0x5, 0x1f, 0x8, 0x800, 0x0, 0xfffffffffffffffc}, {0x6, 0xcb2, 0x6f, 0x1, 0x0, 0x4}], [[], [], [], [], [], [], [], [], [], []]}) r2 = gettid() r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x41, 0x0) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000140)={0xffff, 0x8}) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r2, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r4, &(0x7f0000000300)=""/128, 0x80) signalfd4(r4, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) r4 = getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) write$P9_RSTATu(r2, &(0x7f00000004c0)={0x5b, 0x7d, 0x2, {{0x0, 0x43, 0x0, 0x3, {0x48, 0x1}, 0xd1080000, 0x4, 0x4, 0x5, 0x4, 'tls\x00', 0x4, 'tls\x00', 0x4, 'tls\x00', 0x4, 'tls\x00'}, 0x3, '(lo', r3, r4, r5}}, 0x5b) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="24d5a7c27479000035209d9aa9b97dcc73efd79446d8f37741f8d30f06fc8954b9a07f308ca545bdb69ce0c26f043acbd03af120ae0282a40d47cd652b23a5bc0fcb0594198d3bbe2e26d1d58ed862d91ce6082aa253280e0bef4c107030eb905796e87f3f47e7d2daf33be7b8dcfff1521715c89ff123cd0f46fd606d6bebb7b87ab8f20712a984064b7123a92c69fc5406cf18cdc67563c1b6f565ff94019a1b2cb5c91df7ad7442d01c99774bdef67b75baff8599ac7abee112cbf621317cd259c97081f20ebee2cee78c5a60d32e1d1182cceab420fe0ef590054a06f9e7d4d74fb4"], 0x10}}], 0x1, 0x0) 05:03:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10, 0x0, 0x1a01}], 0x10}}], 0x1, 0x0) 05:03:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0xfffffffffffffd75, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0xffffffffffffff88) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 05:03:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:42 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80003, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000040)={0xa, [0x2, 0x1d8, 0xbe8e, 0x5, 0x1, 0x81, 0x8, 0x100, 0x1800, 0x0]}, &(0x7f0000000080)=0x18) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r0, 0x0) 05:03:42 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) r0 = gettid() r1 = getpgrp(r0) rt_sigprocmask(0x2, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r1, 0x0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x40c00, 0x0) sendto$inet(r2, &(0x7f0000000380)="a0c3c5fdc377e2bffce5c248c16bc89d0c325bc47a627f6cf03a821c995ce3e76ac63aed3a69ae2d94c257404423c3b8d1611ef06e75cc8ea1fdbcd41d96a9a42e547658961bb64c49c72fbb7811f0dd50423d145d3d8e89460db35807cfa596eae06d2c117b824a9d04a874abba3141a00aee809ab81e780b9787fb9ec9fddc6007d696c676ab77eca973945d5662c74ae4c252f0d09c2e06aa2cbdc20c12048c2f2c68e1f730591a74935cdc20ace4999e6e14b8f113ac28c23f1c55fb87c4277714dc590f9ed2134b65c8a96b741b42d91111300c13", 0xd7, 0x4, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f00000001c0)) read(r3, &(0x7f0000000300)=""/128, 0x80) ioctl$VIDIOC_G_EDID(r2, 0xc0285628, &(0x7f0000000180)={0x0, 0x304c, 0x10000, [], &(0x7f0000000140)=0x9}) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000280)=0x1) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000200)={0x10000, 0x0, &(0x7f0000ffc000/0x3000)=nil}) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000000c0)=0x4, &(0x7f0000000240)=0x1) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10, 0x0, 0x40000}], 0x10}}], 0x1, 0x0) 05:03:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x2b, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10041, 0x0) write$FUSE_LSEEK(r1, &(0x7f00000000c0)={0x18, 0xfffffffffffffffe, 0x5, {0x101}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) quotactl(0x8001, &(0x7f0000000000)='./file0\x00', r3, &(0x7f0000000180)="43bec3ca05f0413021d1dcf8f57db45ebd0ba0648b21c57179e72dd031909cc26f2f8034f7ab26d14b9ed157fc1f94081103d0ef71971259e0de8e882d22beedba87a0bc0973a9d35053fcc7b5367d20c933d17caaf609d6488f76ad8996a08fb2f5cdd5635d5002167a5b6fd858e7c9f36d78170a26ae3a965c0bed51c7ea056e") openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) 05:03:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0xf8, &(0x7f0000000100), &(0x7f0000000140)=0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "64b7effdee0ea67a", "512eba2e86456a71ef6507e9123868fc", "74633299", "8cee7bea89cb96ee"}, 0xfffffffffffffefa) sendmmsg(r1, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)}}], 0x1, 0x0) 05:03:42 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x7ffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1000, 0x1}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r2, 0x22e}, &(0x7f0000000200)=0x8) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r4 = dup3(r0, r3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000000), 0x4) 05:03:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10, 0x0, 0x1a010000}], 0x10}}], 0x1, 0x0) 05:03:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x4, 0x1, 0x80000001, 0x1, 0x4}, 0x14) listen(r1, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x9, 0x2000) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000180)={0x3f, 0x1000, "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"}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/self/attr/exec\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@ccm_128={{0x304}, "0bcf8067bc9c3bc8", "ec88199328c54ce590ccccff7b78ca7c", "9d183d8f", "90e416d0ada83173"}, 0x28) sendmmsg(r0, &(0x7f0000001780), 0x40000000000017b, 0x0) 05:03:43 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @loopback}}, [0x7, 0xa94c, 0x20, 0x7, 0x1, 0x8000, 0x4, 0x2, 0x3, 0x5, 0x81, 0x40, 0x40, 0x0, 0x2]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)={r1, 0x3}, &(0x7f0000000200)=0x8) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r3, 0x1}}, 0x18) 05:03:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10, 0x0, 0x4000000000000}], 0x10}}], 0x1, 0x0) 05:03:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xfffffffffffffcc9) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:43 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10, 0x0, 0x1a01000000000000}], 0x10}}], 0x1, 0x0) 05:03:43 executing program 1: r0 = getpgrp(0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7, 0x2000) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000140)={{0x9ee, 0x100000001}, {0x6, 0xd9}, 0x5, 0x2, 0x10001}) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r2, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f00000000c0)={@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) write$9p(r2, &(0x7f0000000080)="d09ad43c", 0x4) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000100), &(0x7f00000001c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f00000002c0)={0x7ff}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r5 = getpgrp(0x0) sched_setparam(r5, &(0x7f0000000300)=0x5) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0006c1826da8000000000000000000002e1a46fec114687408f8c02956ee4cc03729d881ceb9add9ccc233b492e00dea0a9e844e2d9f85e340f8fa0d368cbbd03944f66601dbdd31f406f9c78d550cb8563fcd8041c79cad0aeeac71457ac34cd7fc70e81a565304c3c34c353685"], 0x10}}], 0x1, 0x0) 05:03:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x2f, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0xf}}], 0x1, 0x0) 05:03:43 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)=':)trustedwlan0:wlan0bdeveth1vmnet0\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) 05:03:43 executing program 1: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000280)=@un=@abs, &(0x7f0000000380)=0x80, 0x800) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f00000003c0)=0x20, 0x4) getpgrp(0x0) gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000480)=0x0) r2 = getpgrp(r1) r3 = gettid() r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x10000, 0x0) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000440)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xf052c96cd03a0184}) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r2, r3, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r5, &(0x7f0000000300)=""/128, 0x80) ioctl$IMSETDEVNAME(r4, 0x80184947, &(0x7f00000004c0)={0xffffffff, 'syz0\x00'}) timer_create(0x6, &(0x7f0000000200)={0x0, 0x1d, 0x2, @thr={&(0x7f0000000080)="f92c4cc5f538b14c3a0ff446ff3bfa7b07127482f681ee415c394af0f10b9b18cdbc93ac40c66353ac94cba6290b7d115d3c327a03caa558ac65597dff5560ab393ccb5bfb30f41457c4806e51b85a670339cfb81ef6925319f1bbe3f9e192a839c8e74d", &(0x7f0000000140)="2ad6aff7a2c7569272aac12b03cd4c801225fa6f21c22211231c7a2c8f4ab452dc5b88fea05b9cb5104a6b0a4c00b1c9aabfe5683a40684419f60fc81556dccae61a6325873ad97d960be2e55d24b93c232419bd5daea7bae16d0a4bf20d5b2237c5cbc247436b65d8482f002557d384d2e3fde4222ccc1faed4d83ad98b972cbe97e57b18f4ee06261d37eff2efd71d75ccb1b9c513ca572f"}}, &(0x7f0000000240)) signalfd4(r5, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:43 executing program 2: io_setup(0x18000, &(0x7f0000000100)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000003c0)={'ip6gre0\x00', {0x2, 0x4e22, @loopback}}) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000400)={0x7, 0x4, 0x80}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000340)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x4, r2, &(0x7f0000000280)="ae22c518c6f1ca00fab32d701b5f9c2570d2c1e5a99a1da5891fa5f17ea36cbde3a3ed1d63b980b877e0bfdde91b6b58b67f5108dd3db6bbfa62b986aa4261dc1fceb878c1dbf0a2f199cc5c0527dded9ba98f168e3216b01ae19f51282c85a1cf36068dde025b4bfd1d554784bd1cfa29c180d25493ed37a40debd47474960435536dca34e08ba1dfa1e846b199fdd8160693a4f20fbb027836af760b98d0fbfb779133696631d986814def81007dbbbd7f2a0a58", 0xb5, 0x6, 0x0, 0x3, r3}]) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300034, 0x0, 0x0, @ipv4={[0x6], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) clock_gettime(0x5, &(0x7f0000000440)) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r7 = semget$private(0x0, 0x1, 0x2) semctl$GETVAL(r7, 0x3, 0xc, &(0x7f0000000000)=""/225) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000005c0)={0x0, 0xffffffffffffff55, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r4, r6, 0x80000) [ 618.785435][ C0] net_ratelimit: 34 callbacks suppressed [ 618.785444][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x24}}], 0x1, 0x0) 05:03:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x50}}], 0x1, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x802, 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000100)=0x4) 05:03:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfb, 0x80) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x1fe, 0x1, 0x100000, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) syz_emit_ethernet(0x8c, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08004500001c000000000002907800000000ffffffff1200c875d8ed0001627da7750cea4be6826b68fd29546eca6ada8b7dadfa6a565990527faaa68581d01cb4fbd5baca9e8e8175041ac135c254d5ea87aea7c77b23a813049df46b741a31152d1d954e21003862e688aeca8196f61c2c4a6da307f4c6fbf6c627a1d1c830d928019607bf5dfed55836ad23da08e32136f3"], 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000000c0)={0x1, 0x16, 0x1, r1}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) 05:03:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x31, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 619.065684][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:44 executing program 1: r0 = getpgrp(0x0) r1 = gettid() socketpair(0x0, 0x3, 0x6, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/loop-control\x00', 0x1, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/dlm_plock\x00', 0x8000, 0x0) r6 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000ac0), &(0x7f0000000b40)=0x60, 0x80000) r7 = syz_open_procfs(r1, &(0x7f0000000b80)='sched\x00') r8 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c00)=0x14, 0x80000) r9 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000c40)={{0x3, @netrom}, [@null, @default, @null, @bcast, @remote, @remote, @bcast]}, &(0x7f0000000cc0)=0x48, 0x80800) r10 = socket$bt_cmtp(0x1f, 0x3, 0x5) r11 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000d00)='/proc/self/attr/current\x00', 0x2, 0x0) r12 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000d40)) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000d80)='rdma.current\x00', 0x0, 0x0) r14 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000dc0)) r15 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000e00)={0x0, 0x80000, 0xffffffffffffffff}) r17 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/vhost-vsock\x00', 0x2, 0x0) r18 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/ashmem\x00', 0x2800, 0x0) r19 = socket$inet6_sctp(0xa, 0x0, 0x84) r20 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000ec0)=0xffffffffffffffff, 0x4) r21 = accept4$llc(0xffffffffffffffff, &(0x7f0000000f00)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000f40)=0x10, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000f80)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0)={0x0, 0x0}, &(0x7f0000001000)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001040)={0x0, 0x0, 0x0}, &(0x7f0000001080)=0xc) sendmmsg$unix(r2, &(0x7f0000001180)=[{&(0x7f0000000380)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000400)="0c5737d2862c5987c5c8bc99544c306c6c20674ef2779a8b7240ecbaab733edfa18985300c099ca146c3056bf42ef50116b9e18133de903894acf0db8f4c457d92ad9a890daa55f1c419ececd551e7573e94f4d1c9463013f8814ba111d64e31ed3c915ade10663b510d2ef9e4efe0696715f09a4354a73c609f290c4413a4309a03d0bf889d3a4136f3b0a5dea637c093833a6259102177c32ff2b172f2b663034b720caa0d839f720656348380858373a254c41bf3871b4832c733a5d38ede6626024ef08650128e5e4ac4c62e8a04a6da1cea6acf4fb66ce29c448879306a003bb8e4c3d4a3bd49032ffd780cceecf7702790fe3fbaf91d", 0xf9}, {&(0x7f0000000500)="a2cdd67d51c86a6876c955a086d96e753f2a3590b8f2c07113ef70727ed490d1f031171687cf45ee88ccf53096542649df65b06203ba46e2deb3c47e0e500ef8784f502cc6e17c28c59f446981c3ac153263d118609092bcb6d9c904c59c54c5786d7da5ef230f0cc6b84d57312f713e90e8f3c3fd9ef6566ea967959bf96d6972984bc7e1f620a76691f7e1912a68a4d8e578133fe125c992b7069d9e35367d424aba81de106869ece98ad1488100338776f7360caa6702da4c2ddc0adfe05cc1d2aff2858b7cc984f45b", 0xcb}, {&(0x7f0000000600)="81a227893382badfb0648fb6b5314eb1466f0c4666d4f418422270c9c5c2157114c89799d0e81165bcbaea52e96ee10382e6dda2d30ae73f8cc5b76e4eb1f5f5e2fa666cdc38ff3166395e21547a1b9282a66df0b71df2c062ae2f21228a287547a269305ba3d7c9ccc3ffd36c373590ffe698b937261a72f6638bb4b482aa4ba9287c194590988efca9c855dab2cc", 0x8f}, {&(0x7f00000006c0)="81195dde6f976318e90f618fcc8136a912a8daeac6567202846143c0981eea1db1cfc794", 0x24}, {&(0x7f0000000700)="02600b4aae59a064619867996281c2775385f7ca8b8d8206f8f01d620bc1d96a3374e7a8cab78b210ccf2aa1f916d2e232b01dfd825394231109d6a7e4729d05461341877eea39d8c54ba23c17077625c01e2b31bc99219bc6b6ccbacd858b9e3902c9f7eb25fe5725164307f9582e7b9c33924188f2082387bb4efdd333847267c76df25b7438370667622546ad3c03a8b83f8a97e3bc2987cdf54a435e027f57c0af33e2d9655649d5f8f45ef70eaacc7e7fd88e6dc5b9d01c9a9a5cdf8fad9098a390b63b658d77f366a62e96", 0xce}, {&(0x7f0000000800)="a246add1bb02164bf55297965803f673731ef5618c3b20434fb6a916d0300976085a81df645d5326da29bf61ba0b45facf7a92da15be67c9826131cb4f9365adb5248a59ff6899dcb1e8936043fdeb3cf2c9604b4f3a97385cc136c39b5396200d3eec6d670b5099794dcf911d25dfa9eafd752eb2c4d2b3fafc99a48269f374ef7bd7227757a34a5d97691d0d271d8c51150cc3e601c673ab2ee0f9aeab5530f0086796205c7c9a6fd1c5e60ac1986885bd648a0af23baafdb285097e9b864cb3f44afc3a5594f9d81754abd22a05889d13398226645f5111017705220f660e0d75e182941fd563903bcde97739301b964342ed00", 0xf5}, {&(0x7f0000000900)="6aec83acc29b4a98e3811172b9bd4b6b1ac7718d6e2307bb64f1f7a2c79efd7db8d28a97c8bf3d5594c89911f30fe28e3406d39bd632de38972ae4aa54ab00bd5636cd962a87cf44ce3bb2c76b14a50083", 0x51}], 0x7, &(0x7f0000001200)=ANY=[@ANYBLOB="1400000000000000010100002acb1e872e09691696aecffbd070d6647474d9b14e311542c58f8d01b4f1a12d8af7df9c08d3ccb46663e6b58ee07a8c10ce78099328985db96a2446563ce8cbc16e6ce467f0d5dc2656f8c7d104063b2972dce39893a3e8019896de46fbb2f37bea0bff401a4919619af7000000000000", @ANYRES32=r3, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYRES32=r20, @ANYRES32=r21, @ANYRES32=r22, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r0, @ANYRES32=r23, @ANYRES32=r24, @ANYBLOB='\x00\x00\x00\x00'], 0xb8, 0x10}], 0x1, 0x20000011) r25 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x3b31, 0x3) getsockname$packet(r25, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r26 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) r27 = accept4(0xffffffffffffff9c, &(0x7f0000000080)=@in={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x80, 0x0) getsockname$packet(r27, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) read(r26, &(0x7f0000000300)=""/128, 0x80) signalfd4(r26, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) [ 619.105727][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 619.129458][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:44 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$RTC_PIE_ON(r2, 0x7005) dup3(r0, r1, 0x0) 05:03:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x32, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="2400000000000000000000867af3a2"], 0x10}}], 0x1, 0x0) 05:03:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x20000710}}], 0x1, 0x0) 05:03:44 executing program 3: getcwd(&(0x7f0000000000)=""/47, 0x2f) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 619.469511][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 619.494182][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:44 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x101080) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r1, r2, 0x0) 05:03:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10, 0x4}}], 0x1, 0x0) 05:03:44 executing program 1: gettid() getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) r1 = getpgrp(r0) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r2, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x42, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) fchdir(r0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) 05:03:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000080)="43e128a71af5e03839866c9bcade000f", 0x10) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x20, 0x60000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r3, 0x20, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x1f, 0x0, @l2={'ib', 0x3a, 'vxcan1\x00'}}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x80) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) [ 619.818236][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 619.877186][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:45 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xc17}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0xfffffffffffffef2) 05:03:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10, 0x11a}}], 0x1, 0x0) [ 619.942094][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:45 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x8c, r3, 0x102, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xfe, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1d}}}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}}}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7fff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40048c4}, 0x10) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000340)=@ccm_128={{0x303}, "d8296445a0bfe61e", "318cb8f85c024baafe9ecaaaacef552d", "967667e3", "bc707cb8c584cfe0"}, 0x28) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000000000), 0x0, r1}, 0x68) 05:03:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377402000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6, 0x8000) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f00000000c0)={0x1, 0x1}) [ 620.111016][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:45 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r3 = socket$nl_crypto(0x10, 0x3, 0x15) shutdown(r3, 0x1) 05:03:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x800) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x94, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x80, @local, 0x9}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e24, 0x4, @ipv4={[], [], @loopback}, 0x15}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x10}}, @in6={0xa, 0x4e24, 0x7ff, @empty, 0xfff}]}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYBLOB="81000300080000081d74ec2a8646771e1ebadbef5fa66c1551cd"], 0xe) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r4 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000300)={0x9, [0x2, 0x7, 0x1000000000000000, 0x7, 0x1, 0x8c, 0x80000001, 0x72, 0x10000]}, 0x16) setsockopt$inet6_dccp_int(r4, 0x21, 0x1b, &(0x7f0000000140)=0xa8, 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000340)=@ccm_128={{0x307}, "0bf80067f740912d", "f26540ca37c895708c0d36522fc53866", "d587e2be", "dd4566920391a039"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10, 0x1a01}}], 0x1, 0x0) 05:03:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377406000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:45 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0xc000, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8800200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r4, 0x300, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x24004005) ioctl$TIOCEXCL(r3, 0x540c) read(r2, &(0x7f0000000080)=""/128, 0x80) signalfd4(r2, &(0x7f0000000180)={0x64}, 0x8, 0x0) 05:03:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10, 0x40000}}], 0x1, 0x0) 05:03:45 executing program 2: syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x42aa, 0x80) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) dup3(r0, r1, 0x0) io_setup(0xfffffffffffffffd, &(0x7f00000001c0)=0x0) io_cancel(r3, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x10001, r0, &(0x7f0000000280)="2cbb6715229f379b8cc3ef812f8c6b840a33b52d702fbb40f677d012ede8777fd8bbd9569ad63b979aead74da60d1937a54d4cb032e9d81ce08a2b16ee85bb03bcc7c29d6ffa7b36b08e5d6819594d3057330bee1ac15d83c41a01cbc00694dcfaead028576d438e30cd91ea9f0ab9b9ddca1ed1ef6a733dc96f86a3b72528f14a6becf7bd89cd8133358f67e7d2f25036e35ef90f35fc67955603da3a54cccfdd18cc595e06af1ee375962a", 0xac, 0x3, 0x0, 0x2}, &(0x7f0000000340)) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000003c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r2}}, 0x18) 05:03:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="240000000000000000030000000000010ae6c8969e0004eb19e2b7400080d79ab794f7a80e76f6"], 0x10}}], 0x1, 0x0) 05:03:45 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) r1 = getpgrp(r0) r2 = gettid() r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x7f, 0x4, 0x773, 0x7, 0x11}, &(0x7f00000002c0)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000540)={0x9, 0x279b, 0x5, 0x101, 0xfffffffffffffffd, 0x1000, 0x6, 0x21, r4}, 0x20) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r2, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r5, &(0x7f0000000140)="5bd7a3ce21c7e57ea0989787af0ad1455ebec4cd494ac78848362ddaf9e2df62c880052b754fab921d16c133510ef17984082af71d87b1f87e0cd834f3ae38a30716716bd460039be899f941692f2ad4eccb2bd738538127792ad0da3f4a6d6e2e54dddc46004ec991cf894b8276d0c5817b9d6f2b31e56ef781c80d55f88f130b11f32600acaf6edbbf9da76a3f118fde0f6b72022af31b6d4228a212557c5810cab15933570d5907bfb790d85ab7257e906c720b1c13058c900f630bb470c68076f3c5afda3eee6ea22a31ab53db6af27b74d9e3c573e08843", &(0x7f0000000380)=""/213}, 0x18) read(r5, &(0x7f0000000300)=""/128, 0x80) signalfd4(r5, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377410000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10, 0x1a010000}}], 0x1, 0x0) 05:03:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x6409, 0x0) write$P9_RSTATFS(r2, &(0x7f00000000c0)={0x43, 0x9, 0x1, {0xdf6, 0x7, 0x7, 0x5, 0x10001, 0xffffffffffffffff, 0xff, 0xd14d, 0x5}}, 0x43) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x8) 05:03:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377411000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:45 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000000)=0xffffffff) dup3(r0, r1, 0x0) 05:03:46 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r1 = getpgrp(r0) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r2, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x1, 0x20000) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)={0x7, 0x5, 0x1, 0x0, 0x0, [{r3, 0x0, 0x9}]}) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f00000001c0)=0xb71) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r4, &(0x7f0000000300)=""/128, 0x80) signalfd4(r4, &(0x7f0000000140)={0x64}, 0x8, 0x0) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x80, 0x0) setsockopt$inet_tcp_buf(r3, 0x6, 0x1f, &(0x7f0000000240)="e3e938bb35bdb9cb3b3c2a5b546da187bf4868e0ddcb1b1ddaed7acc7985bfd73858f03110d6c80a29685fd6a937ff1e0f64aa4234b2fbe426f5eb38cd8ccdcd5a6707bfe8b207f6e974cb", 0x4b) ioctl$TCSBRK(r5, 0x5409, 0x8) 05:03:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="240000009549f3cb92ce60db67d03aac00000067382300000000"], 0x10}}], 0x1, 0x0) 05:03:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10, 0x4000000000000}}], 0x1, 0x0) 05:03:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377488000100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xa430, 0x40040) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000040)) 05:03:46 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8043, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="09004b84d45f6f56a8d8e30100ff07090001004300bf"], 0x16) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f00000000c0)={'bridge_slave_1\x00', @ifru_settings={0xd8, 0x3ff, @te1=&(0x7f0000000080)={0x9, 0x2, 0x6, 0x2}}}}) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f00000001c0)={0x2, 0x2fd, 0x53, 0x100000001, 0x5, 0x6}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r2, 0x0) 05:03:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10, 0x1a01000000000000}}], 0x1, 0x0) 05:03:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e23, 0xe6, @ipv4={[], [], @multicast1}, 0x6e1}, {0xa, 0x4e22, 0xffff, @mcast1, 0x9}, 0x3, [0x8000, 0x80000000, 0x100000000, 0x8, 0xffff, 0x9, 0x1, 0x80000000]}, 0x5c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback, 0x100}, 0x1c) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x4000, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000200)={{0x80000000, 0x2}, 'port1\x00', 0x10, 0x802, 0x4e, 0x3, 0x93, 0x2, 0x7, 0x0, 0x7, 0x1000}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x10}}], 0x1, 0x0) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000100)={0x2}) 05:03:46 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x2, &(0x7f0000000140)={0xfffffffffffffffe}, 0x0, 0xfffffffffffffed0) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x7, 0x2a202) write$UHID_INPUT(r2, &(0x7f0000000380)={0x8, "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", 0x1000}, 0x1006) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r4 = socket$nl_crypto(0x10, 0x3, 0x15) recvfrom(r4, &(0x7f0000000080)=""/32, 0x20, 0x20, 0x0, 0x0) 05:03:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400060100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x90800, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10, 0x0}}], 0x1, 0x0) 05:03:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400110100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:46 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xffffffff, 0x2) ioctl$KVM_SET_SIGNAL_MASK(r3, 0x4004ae8b, &(0x7f0000000140)={0xe0, "3855635502d1a088bc74cfc1c48726d4743a0829948661d5883ea0b14877efc20048de050b568e498471546bf818bb2a7cef007db4c9c505c459f677b69076eab624451fe72b928b6a95fa0fb8085cf47a4b478f9270e8e62438ce358a68442fe59af02dcfa6149bb7383ad72c7054888ce92246be35c73435f1ba0da330d73029fa02f5bb67795c286fb84ec029f19c007f85863b754bed490241b4abe978cd7ac0eedd7688039993b01c0c304374b3983d93d558283c7427544f920dc43ded7614a587bb6b7dff754fffd765b6cc927c680b28e4533a2091d14bb02fd65f84"}) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e1d}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) write(r0, &(0x7f00000000c0)="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", 0xff) 05:03:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10, 0x0}}], 0x1, 0x0) 05:03:46 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) connect$netrom(r1, &(0x7f0000000040)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x4}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null, @default]}, 0x48) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x800, 0x0, 0x10000, 0xadfa}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000001c0)=r2) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000100)={0x3f, r4, 0x1, 0x8}) dup3(r0, r3, 0x0) 05:03:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400400100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:46 executing program 1: r0 = getpgrp(0x0) r1 = gettid() r2 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x802) signalfd4(r2, &(0x7f00000001c0)={0x80000001}, 0x8, 0x80800) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000000080)=[{{0x0, 0xfd0b, 0x0, 0xfffffffffffffd5e, &(0x7f0000000700), 0xfffffffffffffeb4}}], 0xd6, 0x0) 05:03:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10, 0x0}}], 0x1, 0x0) 05:03:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x3, 0x8a000) connect$bt_sco(r2, &(0x7f00000001c0)={0x1f, {0x8001, 0x9, 0x6, 0xda9, 0xfffffffffffffff7, 0x8}}, 0x8) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x10000) ppoll(&(0x7f00000000c0)=[{r0, 0x405}, {r0, 0x8000}, {r3, 0x2000}, {r0, 0x404}, {r3, 0x2000}, {r3, 0x8002}, {r0, 0x8000}], 0x7, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000140)={0x7595b2aa}, 0x8) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000200)={0x36, 0x3, 0x0, {0x0, 0x15, 0x0, '/dev/bus/usb/00#/00#\x00'}}, 0x36) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000380)=0xe8) ioprio_get$uid(0x3, r4) 05:03:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400880100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:47 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0xfffffffffffffffe, &(0x7f0000000180)={0xf800000000000001}, 0x0, 0x46) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) r3 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x40000004a12, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r3, 0x114, 0xa, &(0x7f0000000100)=ANY=[@ANYBLOB="43d4447f43bac4ee01c3"], 0x2) r4 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x2, 0x40040) ioctl$SG_SET_DEBUG(r4, 0x227e, &(0x7f00000000c0)) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10, 0x0}}], 0x1, 0x0) 05:03:47 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000003000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000100)={{0xffffffffffffffff, 0x1, 0x2, 0x3, 0x18}}) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:47 executing program 1: r0 = getpgrp(0x0) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x400200) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x283) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x8, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000040)={0x78, 0x7f76, 0x101, 0x4, 0x16, 0x9}) 05:03:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400030000000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10, 0x0}}], 0x1, 0x0) 05:03:47 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setrlimit(0x7, &(0x7f0000000000)={0x4, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) 05:03:47 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x6, 0x80002) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000140)={0xd1d8, 0x6, 0x80000000, 'queue1\x00', 0x4}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000080)={0x6}) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000000240)=""/80) 05:03:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) move_pages(r1, 0x9, &(0x7f0000000100)=[&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil], &(0x7f0000000180)=[0x1, 0x261], &(0x7f00000001c0)=[0x0], 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 05:03:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400020100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0xfffffffffffffcd2) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e21, 0x3, @remote}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10, 0x0}}], 0x1, 0x0) 05:03:47 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f0000000100)=0x8) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000000c0)=0x0) ptrace$setsig(0x4203, r3, 0xec0f, &(0x7f00000001c0)={0x33, 0x0, 0x7fff}) dup3(r0, r0, 0x80000) getsockopt$bt_hci(r2, 0x0, 0x2, &(0x7f0000000640)=""/4096, &(0x7f0000000080)=0x1000) 05:03:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400060100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x4080) setsockopt$inet6_dccp_buf(r0, 0x21, 0x8f, &(0x7f0000000280)="6a35eebd36eaf5c753c56b67bb534fb3fb710d4ccf2a8bbb306bdad46fa1d9580a6c36f434fb557d05ea5681192a5f969d0b8137f8fae3f68a2f93743657b901010000f4cbbf2dd181990c961a477aac6d5e48d35eaaaf55eceb0000500b0000000000001000000000", 0x88) r3 = geteuid() ioctl$SIOCAX25GETUID(r2, 0x89e0, &(0x7f00000000c0)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r3}) r4 = getpid() setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x1000}, 0x14) capget(&(0x7f0000000040)={0x20071026, r4}, &(0x7f0000000140)={0x1, 0x8001, 0xffffffffffffffa1, 0x9, 0x8, 0x7}) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:48 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x502, 0x0) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1, 0x4202) r3 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000280)={0xff, 0xffffffff00000001, r3, 0x0, r4, 0x0, 0x3, 0x10001}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10, 0x0}}], 0x1, 0x0) [ 623.060139][T18870] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure 05:03:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400110100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x4}], 0x1, 0x0) 05:03:48 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2000) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f0000000080)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r2, 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000000)) 05:03:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8042, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000140)={0x917, {{0x2, 0x4e21, @multicast2}}}, 0x88) r2 = gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000100)={0x9, 0x0, r2, 0x0, r3, 0x0, 0x0, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0xffffffffffffff55) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r4, 0x1}}, 0x18) 05:03:48 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x1b, &(0x7f0000000080)={0x0, 0x0, 0x9}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200080, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0xb567193a2c41a7b8, &(0x7f0000000040), &(0x7f0000000140)=0x4) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x11a}], 0x1, 0x0) 05:03:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="24002000000000000000020000000000"], 0x10}}], 0x1, 0x0) 05:03:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400880100000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x1a01}], 0x1, 0x0) 05:03:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="1b000000bf000194a7e1c227973b537c292a2ad12300ecf0413bdabb402a436654edd9789f339e"], &(0x7f0000000100)=0x23) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000180)={r3, 0x3, 0x8001}, 0x8) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:48 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x113, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x2, @local, 0x3ff}, r2}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f0000000100), 0x13f}}, 0x20) r3 = socket(0x15, 0x4, 0x4) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000200)=0x44) dup3(r0, r1, 0x0) 05:03:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000300000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 623.793400][ C0] net_ratelimit: 34 callbacks suppressed [ 623.793411][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x40000}], 0x1, 0x0) 05:03:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) syz_init_net_socket$llc(0x1a, 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000500000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 624.013019][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 624.063287][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:49 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = dup3(r0, r1, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x64}, 0x1, 0x0, 0x0, 0x24000000}, 0x4) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000000)=0x9) 05:03:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="24000000000000002cc2108c02000000"], 0x10}}], 0x1, 0x0) io_uring_setup(0xcc6, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x0, 0x100}) listen(r0, 0x7) 05:03:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400004000000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:49 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0xa70, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xd4d, 0x4000c0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000000c0)) 05:03:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x1a010000}], 0x1, 0x0) 05:03:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000540)=0x100000000, 0x4) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, 0xffffffffffffffff, 0x1}}, 0x18) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x9) [ 624.329955][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 624.330444][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x4000000000000}], 0x1, 0x0) 05:03:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000200000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x8, 0x343800) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x13f, 0xb}}, 0x20) [ 624.503932][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:49 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r3, 0x4010640d, &(0x7f00000000c0)={0xfffffffffffff800, 0x8}) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="24000000000000000000000000000000b1d1ecd1e9db011ccf7f2d932923a0ce61c1ec56b7d8f5072268f88172ce1074e0d290269e94314b08981ac869e73a364301000100c8648808fc73117e1c5fecdaab"], 0x10}}], 0x1, 0x0) 05:03:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000300000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:49 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000000)={0x29}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) [ 624.620210][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000000)={0x13, 0xbd, 0x7, {0x0, r1, 0x1}}, 0x237) 05:03:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x1a01000000000000}], 0x1, 0x0) [ 624.765992][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000400000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:49 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) r1 = getpgrp(r0) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r2, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) [ 624.905566][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f00000001c0)={'ip_vti0\x00', 0x100}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="240100000000008364bc8630435d344488af00000052b5d37ff6ed66875983a73e10623d98a200000000"], 0x10}}], 0x1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xbc21, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000240)={0x1, 0x5, 0x2, 0x4c471be9, 0x18, 0x0, 0x1, 0x0, 0x8, 0x4, 0x80f, 0x3}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xc}}], 0x10) sendmsg$alg(r2, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000280)="7511d88d947befa23b36b4c0afdcda0debef602699bec64ea98c2bf045ebfd88ef58f53f9c11c5c7f1d65bd029cc3d979128c507c5e9dfb3", 0x38}, {&(0x7f00000002c0)="0bb97aed489a36a1c3ca81d2cf7d408f1b5ad851d61c7e9c995a646cca911fb371b78cae9448131775e2809234b1aa5502d63c7d2a8992c610ffa1185aa6a5507e622a8781653fdc4d55acdd15efeabcb8e6f98642166fb864572fd862f174bf750169cdf315e721eb56e10a5f48afd6a49a0e9ce9bc71731fefe67891b5bbba2b99634d3f3eeefaa864d448a73b508cddc4e8b781c0b03c9dbbb879fcdced080be2177731531b11e4abba58cd65a233b5edd19bcc32f66513a77ac22dc679", 0xbf}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="2387fbf7da33ba4e89b0b907014db8151f821176f808fb574d3b07dbf2c9bf14e112f657782bdeafc85ac17c52c9b648628a2c9c0985f7f8d1f7f4e7fbda9d29697b03c72494690c46864c5fd91a3bda9f520e97caece9ca51f00ea0903babe2fcbb13cee563fc8792fa06eda7fa4627c514db7bfeea7c064530c6b5efb0e82019b3bb892fcdcf1e5a3e79a8499ebb6b1c5759a4ccbd80d72206bb3772f5b0bd6a6f9ea78f14086b7a5a64700520aa28f17d936780bc2a53b3a5102cb5f91b59e48b1f937447c992fb204a1fb1e83e0b28d2d1f961b07467f30fcf82ca2a6f110468ef4c00f8501bcf22a452f2657c34b8845e6f19ef4307a27595608fb0f6d1ecd5bc2162490b7cfb01d1ab9ac72d857086f8c4ad7a12391b662f03994d5994b2ac31e1fa8a01d51a8d38a6a4cc9690518acdd5af52edab31a541ee5bded168472144cce5bbb1b38480cb30b4303a76a24eb154f739389abf40229ea18953b1eb77dfa312ba8f240105b0bd7d6a4897d15de1ac8dacb2a613beeb4cd8a583357fba53788cc3b16edca100f0822c487948dfbb80720e802c461949322337e656a1be1a23259e8dfe17b2221610c4cccd3c0709f90cfbdf9a8b2dcc1bfdb4b5f33b09f375e813f0dcfd09a8e6693324a4ebaa9c1f348da16f384b9eac493869a34b042026a63fc66452b0c7b67c506d8681bdcd477cd95b41908f98a5bcc059921cd96fb550244f8bb7791a2f6f2c9ab34260f5ac07dadac037b52d6b0fe8066c746b2e5d99f5214e89a744f4eb51ce1945ee4aec997387dec322981abd1bfee9ab636f788f071f534e655b2fc0f7aa035fad35ec47a8e9782d08a8ccbf7e455efe9d468c87b287c14a784823eb599e7233fdeed7ac0d11dc5f08e1a3863c7f2aa9c7b45ad86b5b7a01d43b3e168fede5c0ac575dfd84bc8366d089fbcb1f55b1f44ca6df15dc1bc7b29379224d5f1186a8b055e5100f68dfee2653b251bba6c9894fd5ee5d09837295911b731643db7b071785f1606519360cc4be979751533d58a733cbed04abfbaeb1f3e74b05a385fba4a8ece42716e86a0de73aac2c0ed7f520655c5b8444d69cf4009dc667e84a10af40f0717b770231c8a6cf298a857f3e62f469f3d06cd6e082d5de534df32e3e4665900d0e5d155d592a0f1f5b62d381343b4be5ea8f570068758a803a4fb66d09d28868d30fc2c8e3c5eadfb6c897d91bce97355225e479feb44393ed04b5e4f662f30699eba3287a7be17044ed511f65dfe861ade32b6998ae856f1dcdd0b5769d64adc5178c1f43c3971ce7f8350704793d18af38410431003d2c0696f800a6a09d194d76da07d4311baca010fdfd8753689f9f3369e59ee3d01d9a5277266afc629a0faf963080def4189a795b365a8f11b512d3f6d80cb440c4dfcb9c1d1428a6da6e30f215f7e3171e325b454416c8ce8a72252e9b8c23f7fe78fa4bdfff1972583a1fcf046810fd517c5b2454032529046157740bd9af0f034e2f7129db8129f79540a4217e2f1e16bcf13e335e6c0ccfd372afc52410a65f8ce1e3914e7bb724412c1fe6980d324ad9cc6b90ddbe23acb75ec73ce313351779690af8cfc8d57210135d9aa76ac42c995979211253fbe928e7744b6c6f67323f5e333f6952785ce98ba74e02b36ca06e06783424ef2d6bcc1865f27b72838ec7eb57e23cf0c0e50127654aadfec0bc716494964632274fa10fc15250f81d744a1344fbec5eff76b17c9372c641690d9cc4fc3fdbc5d4cdf689b16b6cbef484067f3a078db78d96719639c6610880601991c0e8c3f33e83f535e2858f1a31762fb803f59afbd8ddf3511354ee3f75b3a541839bb5ee767bdbacb4611fdc26412df7623cd9f4868e1d986338ca714760578c87195da66f2da290ee5515667a24ba42ece3dc4b5133e6bcddbcad5fbcd36e64d703f7abd73c6917c913e735d4993324dc1bd0ce2f9e23ba908fe2b33dbf9cf8a86dec39bca6dfe6f4df6f85bd121fc898bf87a3610a463d45ce757b8ec29513e0677bb43863ec408c0fc48c33a7f024748106ac57007b8fe148b866523a565ec473b0d426130ae6a163fff191aec127488bf83939c13b44373cce326862619b32a9dad4c0ad5adce52c204bb186da6c7973dc3f729ae483a9f42f03dbdc7c3b863f80cad03cceb39a6bc79f3486f612916688600d8cfad03db7b7aac6d2872db68a48029b78115c36b237be5c0f061d68ee971788852b72dd344014f4c1bb892dbdcceba9986114706fed0b35262cf3a99c410480dd5d95a6e6392c84ad7fff8602abaad5c35814576ae0a55d35cdb943d71d6903115b391c3224e48751f55878e041fad291f597c6693ff1b68bee0e2283ef153051e68307720f8e9c7a035efbf72c9372357cf5036ade1cdb1ba479a52fe333d97a900b27241df6d70c735cb4514029580f5f42cbc55ced7dcca46156943b86463626678048cdc31d2b073b495bdff42261a9b090a3ab3565a8c094db9cfc5331aa39012be8df8dec1f8d52a19d620aab3fb34a752467b392a2c7d41ec33041b0d26333fe4869885ca6ea8ba8d799b0b0ae9bbb238dafd51e11e5cb28a2e948794cf4a5cefcf4a1cbf8d4035c44b36ce57e0fddde49f33598fb40f591bb7559811b2f9bdad2786e6c4fb8ecdb6c9080877612401b36016ba3b46582f420fe8488c8156c6946a9555903765155f8c594e5dfbe0f9b3b0e4b26b548589451d4c888f02959d091da86520d177627802a5e42d3e2d5d91cd88ab257bcf041d7427ec758f15ab2b1c99bf04a7f7b7d9cdaba6f4292591f0e5af2900b305078852070c87cc9efd2ad7899ac1ac54cce42cdf82c261c1a47efce8bd63cf4a0fad0fe40fe699fee7e061f3af7fabca1fc565134b61deac510ef751234dd4402d3a74ab90a27ce95922d8bbaede8018c47cf985654bab80497fd39fb361dcd3316a011d271ebf3d2f8f1c0183780ad18750277a9f5d329dad1ef48a528a5654d7639832607ca01b8d10d4dcf111437c735128546954fcfc906a272acf462614a5263cd9d0c824750f8d2e0c73d2be11b0d3d2399fc99254b1ea10406655f20df3fec104d1910519b44db50030ce13f7615603d7e60ea049ac9be9d10ad7e00c0126985ab3ba06889bb13495d37315643f3ed8218411f6d49c5925627d0bd04c2529a05decccb7cae8c43f3e2438563a930b97ff201be149058129f2e259b28e8d0bd58fd4913a9248d577e6a05d99bf098276470757b5ea3585d22fa569c7461d0e08a2aaf472812e92de54c1ea739f95414d1a3c869699a5aef1a0886914a57208356df8c7a22394d65c156263e58178ef59534341b9b8376a42725c1f71588b47155a8542ed455c2b17c35c5b6f706ebd8432f65bb1477dd39c0df71d9e8558b65533518f883cd11702ace53dfed0922eb137e4ca73d6adda7a7ffd923f609bdf6859de6f03ff4481243d0fe3a627d23f259f5cc29ed2fe53810e8ff4dd7d0318bb9be9a8f85df6c412c095f656bdc2ca3e90d214de083bfbc7fed119cb44b64f1710ae0578bd7906fe8b02a470e59bb172feabd8adb17ea9b8e1a978cddf7fb058108e32b17e4223398f13c3c124f68fa1b9bd12ce8834066e130c1c2caddc8daa62bc967d5115421f81244d517f1fdab9bf96d41a04821442076584ff8b17f74849a1f92583c47d289c6234bde189aee7b8205a9956a291bf197931ade53e88d36939dd3091a8a95df1e207d9812df05a60cc53ff4e54437c3b1120ab8cbae35924e563350a7a468f3aec87366302523bba7f0d1fd1bcb4b6b61ec211204aa33be85693f7a365c9dc0df80863c6b0b34a07b7010ca11e391b76c766388d9b7a71860c0cee1bf3c320822fd36150ce2b7d14e0e69598c81dfee206cc0afbd40f940f68f699dd956a084bd18f3b8c188878b6ea405a2aa7895754e0f4b264e46cb6548fb0f2620f23a9e9afcd602f3583883e2f2e7c6e1a3bf4345703dfd25b9eea5563b39b5a4978ac318621805bdca4af2e84b36b19ba4ab49c8d048986a8c038967c5e9ef2d8c152663fbbbf8286bff6785583323b14ee601ae624b33afd6f3ecc596afcd23c1a786f7712e0a767b4cfdac0efc776277ac9035bb94df69f269305553ee51dd132a84e2584c030cdf7fd85ab8c0ceab96be71794012cb87b37b034822130a4b808da1929f4538a1fa3f67f2a005c3f1da83c382d6950ef0dd61ddf4a945658dc260c67d226e6a73b1fad67e1bd445bef8fd127afce68ca07135edea4792376bfdacad41005acad1a954778c9ecdd37b81fe9f5de00efc76b70d24725ee3f9ebbcbc65738872c849409fc13272e83e0b5903239de8d3a7347f11f71d7278c73322cfc8a2abdb1929c8a2fbc7a41cbd75601677d5b516636aaf3c55d33fd70d410a8d5b730fdfa25382bbed47f2a100d9c81a2fbdefd9b3f42eed074ab1701845e5e7d83dea749b9caaf18ebdf27f320e89a2d847b93c0bd2512178c713e40dcb8470bfd50ad285dc148e639d96f337732233a0dc3151fe83806419f8ec10fc157d1f8594c51e2b66752ffe08f1b87d3367712534ac7d98202e30d305c6aa204d87b9a2e3006fa8eef6846da2339e2ba9c48511d987db3918a943492cb26c7ce927ebabdaed6216b1c42dddddbb45ad02b6690d9962125e750568d9e1cc1803301941dd1fe31c7a08ab5888958229f5dd7d7428dbd7114b7ff05900810053a87b3e612620d4fde089ec51600587cc05491211f034635b99592308998b3041f51415e4d390c86ed8ebf13aaafad8e28186d67fdb6bbf362de81fe804e95619c1f31467b52b94f2cd0b2cb1cffa327751bb04292d487be899548a5048caf7a723c9984dbb3a5fbff9d61d4409c3fdc480b177cd38901ea33d11df9df529868621c38848979c982a7a6982e7e9722b10c24bfc7fcee7dff9ce015961f594b7bfdb3fdbed689763b7f4146d2cdce2013d0d98fa17ee5d77dfd99b5826dac091857b3ed448676a258be71997829e01ec801713a89865ebedb8e9ca2dc77500f1c6912e8f58fbacdf9ab358b56d5a7ae7900adeb3dcc4b4b5f20d586a884c32dbe7b6b73e43f14a4a4184fd7ac7d81c564612a07950db2207619d52bfd93ba898be3703f5bf52f08e2e2d43ae9b95375804bd7612b442b49fc5e590f916ac09ded2cd3d423bf264de87806e87e11b76d295241af737059dff3b274c1d23cf4273f9aa748bcdccd824951261f78617ece6b41c83e010227151c329a8127218489a0b058a3ed341486fc0f6c0cdcde5e8ca875fe9deb80686764c1fa8568a329be34455a832d5bdb95c7b9578f3e81fe714eacd65e2b33422d36f8a4636e5f3f0c70f099108baecf930fdbbed29bbc470b4c8f89e72752599bb230e687db17a8b12e99595332d2d2a0a181e5ffa2bd067b86ffaf89fb48da72a77bbe2898872212508de919756c0c4245ee004dcd72b80d006917b3c4f1d792684592d40c4f38a88d330398c242ac9851e12627f9cb7f7ee45c0ee6c0359b402eda333ab877d61505c35d6b8f0d425d019cd90e882ac2f32d3b04ab26a17ca75290771c887621cc97a11637c1d58d99bdfc5139d7e29560e7842bc857b022f34bdef366a9012482edcc93168b3a0eae029ae1be3bd6df02b1b91db091a3e007f9ca816a9d1b73b018b7a735094e39a7943574b592684641235ff59d15f1e38a1f5cf20c83cb2168e37b466b29eee94e2cc45a88b3fa8f1b547c1805f414a0b9c6e0f9b8b1ee44af7d58c81e60911bec4368d9150", 0x1000}, {&(0x7f00000013c0)="9bd534921401150c24d81a78c1efc0882694aed5e5084bf05f1f8c280e656b745e33a0d9a886b337a3fdf9392bb697bd054c4565c4a4ba43040d9df1afdfc5e00a9fe6d8d2f11017816fe8402af59da8bd7f73504667b0384fb64558a0060265f25a3ae9b37ca58a18de72371935b48716e98aee8ea4b5610bfa268238a0a4b962dc1a8ab357405f3a383284ecd826c114467c387cd86b915d62009dd1ffc76a4deb52dce6", 0xa5}, {&(0x7f0000001480)="afc5baa8328fc64bc3f859d417fc7f1c88ff0b30f7c44789d026a672ab5532e2d6a08f756f2968f75dbda98b279d3842cdb357c7a7e02898cbabbb9476d50f", 0x3f}, {&(0x7f00000014c0)="75581ba38843fcbbd10054a0", 0xc}], 0x7, &(0x7f00000017c0)=[@assoc={0x18}, @assoc={0x18, 0x117, 0x4, 0x401}, @op={0x18}, @iv={0x98, 0x117, 0x2, 0x82, "0207eaf07d6767d1ba7188ba500d60e0d6d572f3f990881a2b1e60ea66c20e0256328467c4a993957fe4355feb22f5ef274c86feeab7daea3e766713751ba32a6ad7c9a0341906ff1c1a30a0cee26cfa5d5617b7771305d30fdbb00b98cee11327286dd0ebd23f7341c9e8f9e34f0f45b6858da765c73eac1ddbe6652867462b2a2c"}, @assoc={0x18, 0x117, 0x4, 0x10000}, @iv={0x68, 0x117, 0x2, 0x4d, "9bb221a4d01407d535e83bd58d6e7e0195ac254f6118c782c20bccbbd038597d56a22adebff91e73430c3f2fc6f5468f70d3b85ae01103e1892290032fcdc29bb42cf3997f77709f792f0629cd"}, @assoc={0x18, 0x117, 0x4, 0x5}, @iv={0x40, 0x117, 0x2, 0x28, "577494dd234817c0f069062758168894b35f8e97db1b93a1095774a9d8ae20ac083a4cca0ffe1d87"}, @iv={0x78, 0x117, 0x2, 0x62, "2f380a9fe6153cea4a4ec786095b6758db194912f6650c275aac2e76ae0deba692f102b7f30b7945e824eadea11c5244fa7741da3a1e221280d1c1eca803acf4a4c683c7cf05adfe32491a1b0c41f34a188fd22d8283eac68d5d1c50c46ffb3c33a7"}], 0x230, 0x40}, 0x40) [ 624.950180][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0xffffffffffffffbc) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x100, 0x0) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000400)={'veth0_to_team\x00', 0x5ee780bc}) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0xfffffe5c, 0x7, {0x0, r1, 0x1}}, 0x18) accept(r2, 0x0, &(0x7f0000000280)) r3 = accept(0xffffffffffffffff, &(0x7f0000000000)=@l2, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000100)={0x0, 0xc8c}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000180)={0xfffffffffffffff9, 0x81, 0x8002, 0x764, 0x1, 0x5b, 0x7e504a0b, 0x2, r4}, &(0x7f00000001c0)=0x20) r5 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x100000000, 0x200081) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="fc0000000200001c4dfce32c0683be742c7bdef483bff5e0b39f285b18c572bee77be0b372121cb4d832e5e71079a795df85bad4cc9a5bfecfe51209a6ddf93f0866e7c8eb037235a652f9e3071f2e097758cfe00cf7a75016693aab9be6e9e8377d4d053c47b29b33ae339f55da1096e0f2ce5c5ebcf16b10612df5fbe0f9645dbbdec36a6ddce47781bbeeaf6a58cda7ffbdad75fe8b8cf8b1c298eed4791e6c7cd538b90b5a5a433c1f9a5024f296e8bb14769a21bf188f73b02ed6ab7c54be5b2581121f827a6237773b470ab5873fd62b3abeaf93bdca7657f5412fc576e6c1a9f155dfdde015c769b8fcf7f6865a874f882814f886099e815f06b339e670a295c1e3e1d256ef9161f66039696d82656a9f850cdd4412cf047eb2a300000000006c24f45f947dc601ed0dc0dabfcbf3b8aa88c8add0992d86bd9952f3853ed29b85ab552df1cd8fa2f1a0ad34698436904f97083290f06c8bb80cedbe9ab3e305b491ef5de20bf8bad998cc5f689d48644e6edcd6715998c39665cd7b7de6ad23492ebf50ac0fa1ba471c00a5643ac8bee287c73f9a0b76d32f97833642ff0700000000000067"]) 05:03:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000500000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x0}], 0x1, 0x0) 05:03:50 executing program 1: r0 = getpgrp(0x0) rt_sigprocmask(0x3, &(0x7f0000000200), &(0x7f0000000240), 0x8) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) socketpair(0xa, 0x0, 0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netlink(r2, 0x10e, 0xa, &(0x7f0000000140)=""/154, &(0x7f00000000c0)=0x9a) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:50 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) get_thread_area(&(0x7f0000000000)={0x200, 0x20001800, 0xffffffffffffffff, 0xfffffffffffffff7, 0x0, 0x7, 0x3ff, 0xfffffffffffffffa, 0x3f, 0x3}) 05:03:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24}}, 0x1f, 0x5ab}, &(0x7f00000001c0)=0x90) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000002c0)={r3, 0x6}, 0xfffffffffffffdb3) ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0106401, &(0x7f0000000400)={0x62, &(0x7f0000000380)=""/98}) r4 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockname$packet(r2, &(0x7f0000000980)={0x11, 0x0, 0x0}, &(0x7f00000009c0)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000a00)=@can={0x1d, 0x0}, &(0x7f0000000a80)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000ac0)={'vcan0\x00', 0x0}) syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x40, 0xa000) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000280)={0x3, 0x1}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000b00)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000e00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000014}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000c40)={0x180, r4, 0x108, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x164, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}]}, 0x180}, 0x1, 0x0, 0x0, 0x80}, 0x4) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000) 05:03:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000080)={0xa, 0x20004e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000003000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x0}], 0x1, 0x0) 05:03:50 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x1) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000100)=0x9) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0xbb83, 0xa, &(0x7f0000001a00)=[{&(0x7f0000000300)="d357acb963aed79ab0290862a4a19df6a97c2ee0be756530005eaa5ad79f61739743d2e67571ec00c8d70fbe1f83f972aac111c7bbd0813eb6061a61ffad948bfaf0c64b453cc475996caf812164e848890c75e17cb9bd5174b2e78bd8bf4885cfb9f62a669a1ad48d94fb4458786fa802f577e4561577476f245961ff41a98b7f0ced20b73d2ad8d8e043b30427fe2df389bbbd8ae814aa6e56365f9ff902b1e4d5d4018b71e6b5d926420349fabf051464450b8e2a4f5fc7bee8bd933b49d95022245ed4abe9c93b2ee2fa1ac4b58e65f47d486fa07eced0773717", 0xdc, 0x5}, {&(0x7f0000000400)="03c41a1b9b96e0b7a0a64145d52e626af3d513cb95e0392c64ad7f0a2337ecf804d33c7f9fe8b0ed0cc6d939a7d6f1cbf0c5a2de9d8ff6b979355cfc7e07ac5eb7034e7995fdc2fa5f86cb39e1ea08e34c167b9bb96dc894f880773d22c91f55eeeb04e8422f1f0d42b91535293f5a7f5e2660d0657ef0e1595acf859451c35840f07bd7455b3f1417c3e25f2e9b0ca340792d202430f4ecd65da18a660e0e1cd191858c26555bcbeb5301f89d96f952d544a21ccbf42a253e2a4501384c159b3b8e4bd5bcae1b4ada2522c1d2b791d3074aa68df2f6", 0xd6, 0x8000}, {&(0x7f0000000500)="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", 0xff, 0x3}, {&(0x7f0000000600)="87f110c8d303c42a3800e481e8e0f1eb382724fb5d0e5207de4c", 0x1a, 0x80000001}, {&(0x7f0000000640)="143c084e5f4206f45173868607c427199a87f2cd4ab5a7569fb3d112b33880cf9040255415f6a8ce6bbabe84c7985ac290c1e439f8e39b08c20f6325eaf46bfa9767322e1e94fa010acd414368e7a7973925f54742b197f88fe50f19b5bcb7a45e5c456013f7df9ccace0db3cd8f11a1776ebf65ce4e9011ba0233599cf09ff10a95d64ac7fa4cdbd884eb9b8a77480088e2f675cddb6f37a7662feba9999e6420b7f00640fe56b909944e1f9bb2913834829679de54", 0xb6, 0x7}, {&(0x7f0000000700)="623ab176dfcf11cc4d0dbc6bf9e26f96a519fc071627a7df4e9d02e793cc91f88984ad6905fa9c439e2fee3567c289ac0f73c86d6a5d69d23855d1750775074646031377fc56abe9003122108b27e8f9a19a2fe15a3d419a74dd41829d484335220f013fbd49c484db89aea14640c4097fa9db63ab6868dc14217a361536d253899376275849b698a31469faefaef7d2ed047f04b8d3eb79565b8574e666af3422e23487548ad51a97c4d9e3edbf21578103fd0aad5dd7c3d5d56f0befcee625d38d983bd7167fdd793cf58b16b1f8e29c6d436ea94f76c781947a9e4e1c5b0b0adb1321319c0637c2a63a2b25850bebad51b9", 0xf3, 0x1}, {&(0x7f0000000800)="11fb2782a405d87c80ec7619f811ea3b42c17a90ca07d8a6f64e19d1d792b761efc968f463fe1ef89ff7ffdc56b85ff2b5b83e3fa335fe2370658f5af00fb19148a19b95ac85ecc27f22c47f9291f10e2d7488cbb734b603cdad5f8a4a394745c9351aa3dd209d4ee2d2f4e9c7865c6bf636ce3a93b2cbc9339cad65db503198c35006c15b4cfa9072ae666f92a0ddf8a3631707210a7bae8ed436ab5195e570fd7517f4256dc4a419bb0c06322e7f4badf9fb6c6d745b3c7dbc7922d58bc1ee648cb5ff7259d751933e2f0172cd6ba4402ac973957e80951e5a1f100e627981fe05ef3b9bec4d9605aba1d76d0ac2839e48e0", 0xf3, 0x6}, {&(0x7f0000000900)="1779deb8cebb36203b3e3bc8a351af15aa0cb07d5b85bde008db4f341779f3efabdce846a2fbf645f4d42cbba7cab08c246399d2df933a74b4", 0x39, 0x400}, {&(0x7f0000000940)="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", 0x1000, 0x200000000000}, {&(0x7f0000001940)="cd04df6d9d924c852d988d378674d5d0eb8b6cf20ad4d2e760b1e2f69d3b45b0bed0aeb23c9682ae6ee6b2c38a2d06e62b14ea12fdb2f00c10d847f227cf05a6b4c610fcfb4d660a7f67855993ee6fbbbe2f50d2e0f1af56791734ac8078eebf86fe1fa03e4717e3942b316b965e014821e3ea27b3deb9885e41a62aa7388f1442181939a9cb95", 0x87, 0x4}], 0x4, &(0x7f0000001b00)={[{@type={'type', 0x3d, "582c9d88"}}, {@umask={'umask', 0x3d, 0x1a}}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@dont_measure='dont_measure'}, {@smackfsroot={'smackfsroot', 0x3d, '%@'}}]}) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000180)=[{r2, 0x8004}, {r2, 0x1080}, {r1, 0x20}, {r1, 0x8200}], 0x4, &(0x7f0000000200)={r3, r4+30000000}, &(0x7f0000000240)={0x5}, 0x8) sendmmsg(r1, &(0x7f0000001780), 0x0, 0x0) 05:03:50 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x22cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0xe484, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12ea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = dup3(r0, r1, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000000)={0x908, 0xff, 0x6}) 05:03:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400001fffffff00004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x0}], 0x1, 0x0) 05:03:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x0}], 0x1, 0x0) 05:03:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000102000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:51 executing program 1: r0 = getpgrp(0x0) r1 = gettid() r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x3eaf5db5, 0x202000) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x1e1) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xfffffffffffffffe, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x2, @local, 0x1}, {0xa, 0x4e22, 0x1, @empty, 0xfffffffffffffffd}, r1, 0x8000}}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/236, 0xec}, {&(0x7f0000000240)=""/229, 0xe5}, {&(0x7f0000000340)=""/19, 0x13}, {&(0x7f0000000380)=""/163, 0xa3}, {&(0x7f0000000440)=""/120, 0x78}, {&(0x7f00000004c0)=""/183, 0xb7}, {&(0x7f0000000580)=""/33, 0x21}, {&(0x7f0000000640)=""/117, 0x75}], 0x8, &(0x7f0000000740)=""/142, 0x8e}, 0x2) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000880)='fou\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000900)=0x14) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000a00)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x68, r3, 0x204, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @rand_addr=0xf43c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2c}, @FOU_ATTR_PEER_V6={0x14, 0x9, @local}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x68}, 0x1, 0x0, 0x0, 0xc014}, 0x40000) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:51 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r2 = dup3(r1, r0, 0x80000) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={0x0, 0x8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000040)={r3, 0x3, 0x6, 0x807, 0xffffffffffff8000, 0x9}, &(0x7f0000000080)=0x14) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000200)=@req3={0x759, 0x0, 0x8, 0xff, 0xe74, 0x1ff, 0x1f}, 0x1c) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000000c0)={r4}, &(0x7f0000000100)=0x8) 05:03:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000106000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x0}], 0x1, 0x0) 05:03:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x40080, 0x0) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = shmget$private(0x0, 0x1000, 0x2, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f00000000c0)=""/248) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000108000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x0}], 0x1, 0x0) 05:03:51 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000000c0)={&(0x7f0000000140)=""/65, 0x41}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r2, 0x0, 0x18}, 0xc) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x0, 0x0) connect$pptp(r4, &(0x7f0000000280)={0x18, 0x2, {0x3, @local}}, 0x1e) r5 = signalfd4(r3, &(0x7f0000002d40), 0x8, 0x0) read(r5, &(0x7f0000000300)=""/128, 0x80) signalfd4(r5, &(0x7f0000a71ff8)={0x64}, 0x8, 0x800) socket$tipc(0x1e, 0x5, 0x0) 05:03:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000300)={0xc, 0x8, 0xfa00, {&(0x7f0000000180)}}, 0x10) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) accept4$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0x14, 0x80000) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x4e21, 0x0, 0x4e24, 0x527, 0x2, 0x20, 0x80, 0x84, r3, r4}, {0x3, 0x3ff, 0x20000000000, 0x7fffffff, 0x101, 0x80000001, 0xffff, 0x7}, {0x8, 0x8000, 0x2, 0x7f}, 0x4, 0x6e6bb3, 0x1, 0x0, 0x3}, {{@in6=@empty, 0x4d4}, 0xa, @in6=@mcast2, 0x0, 0x3, 0x0, 0xff, 0x9, 0x2, 0x64309f53}}, 0xe8) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) creat(&(0x7f0000000080)='./file0\x00', 0x40) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:51 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = dup3(r0, r1, 0x0) ioctl$sock_ax25_SIOCDELRT(r2, 0x890c, &(0x7f0000000000)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x5, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @bcast]}) 05:03:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/116) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, 0xffffffffffffffff, 0x1}}, 0x18) r1 = dup3(r0, r0, 0x80000) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x101, 0x6, &(0x7f0000000700)=[{&(0x7f0000000180)="e6908145e3a9a7f14d7cd168067285fe601e6760af1eb536aab04a1955728825f246bce49a2611f35e89c7f351279e83f8e03837e4f07b6327949f40448330d1f89e181ab48b9fabf5891645f3222c8ce1869df027a6f03055f9ea3a63ef124be95542b3c993f21f7cbc39ccf7a820c055298db7bd0e693f2fa4217de7e97f56b91325edcb501b9ac2d78a4ab166f01ab04aa3932c45d116cf600fc27f15d9", 0x9f, 0x2}, {&(0x7f0000000280)="9d3b7be024d021dcfe3266d550992422ad12682810e2887c40ea8cda44b6d1169b5795cd334ceaa490a126755c151904a4a068d07b28e5781069c710c16709dbb8aa6fd0b6a42054f9b85f0f52bfe7241f0b9d286a71d8baffc16e8e70b24b3ba0c246b9e2d394ab23f4c2a776c31d604e8e3b6a72b4b8c4e868af6b7e2b2f9007b1109f6b9705802c6d02e859298f3ddc816b5ba97ebc1d48e79d6dd1bd3573b0502a0977ac8c2d35931d52c3b68d41c0d92afd2ff5f43932c2c840b53b47cdc1349c5efa143745aedb00f0c7303bf217a75d6692ea2f02e556908f2422992212fd5aeb408d56e45c2867e573bde8cb4ba0090cbddb48", 0xf7, 0x1ff}, {&(0x7f0000000380)="1ae0476deab5d889181a7c08f9c2613a1d19767554f5849d1601c0", 0x1b, 0x6f}, {&(0x7f00000003c0)="61e49adb7441cba0f0909d6ba52bbf7a194a3b75daa006b4fded8a7dc5a59bf72d83a93711f036e895bbaa23c459e8d3618bafb186147de4543b811645ddfe3fb4666c14d0c639cad3a09deece22c4", 0x4f, 0x3}, {&(0x7f0000000440)="6d425e257311928a0a61f27963d7a4aac33514300a86be07b58bc61c528b2fceab032efcacccf4fdac0a9a7fe11b73cf4cb3f74d9b54422484ac4025fcb4cc1c239f97a65f35330d56fb663567793792e02fa16459fc046ce4e6784f87c06ba021bcd461564de576302459e311cd85dd37c9c6081215863992fa2c841087b655c77f0027488876402a2052b0fe74556fc965acabf34e4c6fda32a74da5ead4026fbfbbc355545a9ad6af414c9da45e6c2a4e25306615c01ea04ccc49ce19322e55f18ebbe0b80668024ac4cab12c8f8aeaaa482a335c949405aab9ad99839cbc3453652bb3", 0xe5, 0x8}, {&(0x7f0000000640)="67ade4eceacd7e785e2e28ae060f213ce3adff5da07e81a5b6394563eff8511165406b5d5bc958782a17b2fb5a858ad8f173406bba849c1e0bc2302ed86c2fe6704c448fdefdc21621ccd79126167c7339e0dde25dbc6643893c1788de667fd4d01fa88fc39962b507aec46e78c8b01efa50e2e7fe5f5ad1f460ae140b507d7ed0b4", 0x82, 0xfff0000000000000}], 0x21031, &(0x7f0000000540)=ANY=[@ANYBLOB='jdev=./filep,usrjquota,usrjquota,dont_measure,measUre,audit,\x00']) accept$unix(r1, &(0x7f0000001880)=@abs, &(0x7f0000001900)=0x6e) getsockopt$inet_tcp_buf(r1, 0x6, 0x21, &(0x7f00000007c0)=""/4096, &(0x7f0000000580)=0x1000) 05:03:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000110000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x0}], 0x1, 0x0) 05:03:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0x3ff, 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:51 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:51 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f00000000c0)={0x984, 0xeb, 0x763c048b, 0x3ee}) 05:03:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x2, 0x0) 05:03:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000111000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) get_thread_area(&(0x7f0000000040)={0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x1000, 0x4, 0x9, 0x100000000, 0x0, 0x7}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x100, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) signalfd4(r0, &(0x7f0000000000)={0x6}, 0x8, 0x80800) syz_mount_image$nfs(&(0x7f0000000140)='nfs\x00', &(0x7f0000000180)='./file0\x00', 0x882, 0x7, &(0x7f0000000740)=[{&(0x7f0000000280)="9efaa51c128f6457b36863a0d16cd009ff82d970b877933093307b5b6c598431742901d643562250bee8ea5c832fa26d7f633f723f3195c39b16b89da48f7dc021c4174d51e3faef7c2067ce4623ce9ffdf4e791c79846439ae32cdd594dac3dd36032b8c15883d4d9b2a5143665eaaae4800a1814f0f7fffe6d8330c7702480e9ae39bdf219e9f492be170eaa3d067b0ab40dd880f16c1bc06a3785f6daa0cb7de9d9f37e8d8b40ba6bcaa1c9b1c2d54a8644bb8c4cefd617c3674fa1d3f5b915cacb1c5983eb3f8984c2f8ab35a2b7acbf98cbba7bf38ea00f5627a4bc5e8d7ce34b8ff2ac97725514afe5f3176096866746952dd6", 0xf6, 0x34a}, {&(0x7f00000001c0)="096460e02b9aeaee789492545a423386360ab52ab9319b2788e141d0d0b8dd1c4d8e61d633ce985f07255691d8df92640f5787bd3d86e05f6846c650dc5800c1160e26d9d5f43843870a8f804dc389cda208c277a823d85b9d912cb74cc5f482cd6b7d62772b367912ebb506806f4e07", 0x70, 0x7}, {&(0x7f0000000380)="463a89f5afbbef1731c6b828944ea25900619fabdd460d5a56b7075eb85ee5919d777b8ceb5489d05941dfa644c877a7da16786ba11f662824c76ce429643de00453d575ab7beddfed18e49a0d6a03d31b3027382775ad6734286d103912ffc9397c6586b2593d6b5455c584c7e181e1c4ef75c4e42accdbdc3b213ca9b51da6e39da91217d9af30b8855166d7a44ce86fa27c9758186c9ccb507b76ba970e8fd9abc6871a5d8e5236ebae5e066a00726b44a2e37ac8af50d47e1002940f77fbff08ddf6310ec1679c0a2603b81a41b837be44d4", 0xd4, 0x100000000}, {&(0x7f0000000480)="98acbbd17b55daf9c260b928c84824d5070d7a8cc30131fd241ccef305a6dc35da0b5bcaaa8e47215f05a1c330f4cdef91610e922e24e679de5d5c9694052a67c5e365f516193d50", 0x48, 0xc3d}, {&(0x7f0000000500)="d50ebede49d30f2328cd4d28716ddc0fba42be4255c4eecca4fc85f925a681e811b9b6f8eaac106698c36e23fcaefd6102d188b458ff97992e51e3622b0253fcf45cf8937330ef5fb97608629e04b94e9ca12f27fababecb97", 0x59, 0x3}, {&(0x7f0000000640)="5d604f684adcc89c857b3fc90df2239423ff3209cb392b0d25b1951c97cf3d824d195d6dbf33500045fef5837918815e8e137b9ac98737273ccdb7c9a0f440a6ea", 0x41, 0x9}, {&(0x7f00000006c0)="58ee0451bc318f2d7e2ff20d19b3e1027c016c270c0be3829a33660ea9343cf5e7f0327e72de06a235036e04d202b602381c82667d0f04736a63ef00201f00f269b01ab8b20a7672c076d8f574c3d2df1f72a5bbde005bfe27ecffa59a8a13f6917184dc47fdd375b4739fea969698", 0x6f, 0x2b02}], 0x211000, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00') ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000000c0)={r2, 0x0, 0x6d3, 0x7f, 0x4}) 05:03:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000188000000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:52 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0xfffffffffffffe7c) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x4000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r3, 0x111, 0x5, 0x8, 0x4) 05:03:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22, 0x80000001, @ipv4={[], [], @local}}, 0x36302c166077bb1e) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0x101, 0x4) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="2400000000000000000000000000000034d22e73e653ccf1b0d61883ec92af62e545209e5739b1a5b6333889c9fba94c947ee04e6c5d7f4a1a026469ba12a985c7810000000000000065752390d3292c98397b3e70e7426e3b9bdabe1525ecdcbdf536d29b2ea7523aa91059f190fe392c1c031157d64f19c00ad56de3d93cf7f0d136af17ffeab6413b9a7e05ddab53ca751f69e395bf2ad24501"], 0x10}}], 0x1, 0x0) 05:03:52 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) socket$inet6(0xa, 0x4, 0xca5) dup3(r0, r1, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x33) 05:03:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x300, 0x0) 05:03:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100060000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x7, 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) acct(&(0x7f0000000040)='./file0\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x800, 0x100) 05:03:52 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000000c0)={0x3, 0x0, 0xfffffffffffffff8, 0x3, 0x6}) 05:03:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={0x1, @null, @bpq0='bpq0\x00', 0xffffffffffffffff, 'syz0\x00', @null, 0x4, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) 05:03:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x4) 05:03:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100110000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) llistxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/125, 0x7d) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x248, &(0x7f0000000700)=ANY=[@ANYBLOB="240000006502000000200000"], 0x10}}], 0x1, 0x0) 05:03:52 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000140)={0x7ffb}, 0x0, 0xffffffffffffffa0) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x100, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000180)={&(0x7f0000fed000/0x13000)=nil, 0x13000}) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x2000, 0x0) ioctl$BLKRRPART(r4, 0x125f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000080)) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:52 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) dup3(r0, r1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000001c0)="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") [ 627.716421][T20255] Process accounting resumed 05:03:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x300, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000400)=0xe8) connect$packet(r1, &(0x7f0000000440)={0x11, 0x15, r2, 0x1, 0x3ff, 0x6, @link_local}, 0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) r4 = open(&(0x7f0000000000)='./file0\x00', 0x100, 0x12) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, r5, 0x100, 0x70bd26, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4040000) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18, 0x73, 0x1, {{0x80, 0x2}, 0x6}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r3, 0x1}}, 0x18) ioctl$sock_bt_hci(r4, 0x400448df, &(0x7f0000000180)="0ab6aef2b7e4bdf3584a21588eebe28d0622c71c837636a2e7f56f5fb6e6c6e47458ec51c0610ad0fba82071232c616af8c15c89d4d9f8c83908806ac8da15e426b04ba8a9a7c464b45cf214107729335cfe627e04a9350552a583fa3dbeeb6dc98e03b0a9976f47daef460298") 05:03:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x11a) 05:03:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100400000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:53 executing program 1: r0 = getpgrp(0x0) gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r1, &(0x7f0000000300)=""/128, 0x80) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x6, 0x40) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x40, 0x707, 0x100, 0x4, 0x0, 0x0, 0x80000, 0x1, 0x7, 0x80000000, 0x800, 0x1, 0x8, 0x4, 0xffffffff, 0xc5, 0x0, 0x101, 0x8, 0x3, 0x40, 0x4, 0x2, 0x8, 0xb2a, 0xaf9, 0x3ff, 0x3, 0x3350, 0x1, 0x9, 0x97, 0x1, 0x1f, 0x800, 0x4, 0x0, 0x8, 0x0, @perf_config_ext={0x7fff, 0x8001}, 0x8045, 0x101, 0x3, 0x3, 0x9, 0x8001, 0xb82}, r0, 0x10, r2, 0xb) signalfd4(r1, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)=""/213, 0xaf, 0xd5}, 0x20) rt_sigprocmask(0x2, &(0x7f0000000000)={0x5}, &(0x7f0000000040), 0x8) open(&(0x7f00000000c0)='./file0\x00', 0x200881, 0x82) 05:03:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept4(r0, &(0x7f0000000180)=@caif=@util, &(0x7f0000000080)=0x80, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000003d00)=0x0) ioprio_get$pid(0x3, r3) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmmsg(r2, &(0x7f0000003e40)=[{{&(0x7f0000000200)=@hci={0x1f, r4}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000740)="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", 0x1000}, {&(0x7f00000017c0)="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", 0x1000}, {&(0x7f0000000280)="3ebb4b92bf0f00c36389ab65a1693a6f2e841ad470e11cf10fa6d69c629168c71d1a0ef01625771c783a86b424003af535da275ba255ea1d9fa7cba461749a7f04ada34056bda0982173915a", 0x4c}, {&(0x7f0000000300)="8515ec4da5ee5a6a2f655af100d611", 0xf}, {&(0x7f0000000340)="2e4d88af4ef83b50f305383f17900a0bba1230c637c23c373ebf0c3d0343562bbfccdf5df5525de25c320a986e6cf68e6aa83c93b0abb6d5f6c2bce6e6478c8c246a5708ec0b54f2017366943912772c0f5a1ca5194ca7db39f73b7eb9f9aa96dcd8e9c2e913c6f25a298051a2f0145eac756584e8ede0d5a3b182830812ab78ffa30cc19c3cd0", 0x87}, {&(0x7f0000000400)="15b093396d29d685a2aeef3fb02f4961226371d59774df8bb17d3fa2a6419fe6a07dd8bcf162c8d6c85bfcb0f587d396187174c944e132ef6b014403ce6550a471180566f4eb6ac7d77682c302a4701ce0bf332e14ad73a5d18e53b7bca673d3f7bc93c3158c1ed492a6c621d4ce2d260efbc394f7a4c5ed82042f80b521d34db678ad438f826f2f18f20e0d4099fb54fd13d2b372e41a6a89f92a3115c9ae5fcfbd659945a08c209f374bc118916d1c567597bcf565cdfb2d7733a2184635d930", 0xc1}, {&(0x7f00000027c0)="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", 0x1000}], 0x7, &(0x7f00000037c0)=[{0xe0, 0x11a, 0x2, "447e02f7553319ed50426bd343aebe353b22c643bba61fd6407b18a62f8816fdcae56ed37f3122777d5af0ea2b9f9d682f806edcf48406d120fce1a1a067b817ba37d3902295dd4728c50e4c389128d4eb76909ab9cbca713e5c127b33364a3b68d92e610923d613e9fd768bb235d0bda46d9c60a523b8b2c6c0c77e63cba60210bf2e6d2ac7da67b40982db575b005ea59ae22212343a2fb0c06a14256d88e2515bffb50aca49d7ef3aa1796a4d32a7a540cb95901e3f2f7eb69112c2e887ae42a11ba7b9ae04fba0b20997429c67"}, {0x58, 0x86, 0x6, "523ef099a5c13d7b055d9a968c881a6c59b9a4e3543b730256811cc7c2820e94b2194a164dbd2e017ed30d076654f7f93c9e621756456104fdf24f1a2327517380efd63a53"}, {0xd0, 0x101, 0x7, "9fd190f966757c934d261669c3c5a33fabc467a269dfa21e98ab8959c32c763e4f6a5e15d34436a260798029a664f85531e1faba68b3e215402d72383a4cd82c58857ae07335bebe9acab3e56ebd73bbe1b4312752b65a2ab752c1938c644c731c92bf635e72e30c86aab3ff9742e8ed00e7e07d360787a7eb2ba0e09d796ad971bb6087da00a8ae1d01888beadf4c70ba2208ccaab265e10b87322ecc54a30460c8a3958957702242ee9b3c3758e7d53122c2fd1849d49b79fdb8f30c"}, {0xc0, 0x114, 0x4, "6eea9e4d9430fcaf94fcb42fad3c61393c948b169d430fb7d75b7ccdf817404888bcb810f83ef749ec031f1ac4648d3b6da7d761d225f9a1a57ba76c1385cb6b071e3e65f04a0650890bbab5c6b8d1b54675598bc3e8263aa93e3ccc6d42b3d8e05475720cde5e263758b3623fc7bf31147a206271d55dc05148979cb43e6926e81d3807712ddf592318a8712ca9698a3288a3099e32169135f115d19e5dc7f01f8aab252fb51792356c6ffe345f"}], 0x2c8}}, {{&(0x7f0000000580)=@rc={0x1f, {0x80000000, 0x7, 0x4, 0x8, 0x40, 0x1}, 0xff}, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000000600)="f3366e31adbb027b70094fa8e7d752840769c528470761305981e1705cc60312bf9cdeb4fe195919a879355b1fca284608672d878fca017391bf469d029ffa4687843755a8178a93e1e2d457ab2d614fe655110ee0bbffc7f7cb5dd3b8b1ecfc458db529b10700f525ebe2a3b3a74a35771ec0f9aa041e712c459a43c28ae192d8a378146e6a9b25f1ba78b00ce0afe8bcb8d3eee5b85900960f55f44619e6c47a2f52ef01a1de1577757f1e54c1f080e7a2bc188c8a78bcdb2b53d1f56e6c8217", 0xc1}, {&(0x7f0000001740)="6a921fe61d7fafba7262f7bad1e1b57d73073d690fb735357ff2e18ed184d7ce1407a401b9e917c383e23b8dcabbf2adc99bcbf0741ca090", 0x38}, {&(0x7f0000003ac0)="8493432eb064aac97be3d6dc3b31d14f237cd4ea9f5800725ca5275b103b733b9ef823fc848ba579453cdf2b9570f309ebffbf83be313420e0c094a4d53cbc4492207a238d0e6acba922aec0ce29ed7e47b741a6402253c9ef75ed6a078677820553471eb4a3691370ea39baf910ef09d3d177af7826ca50d5909ee99a97bf8000a29399668e95b28c5bcb922e73bf3a758f8cd32550d0a4d8ba7cd015f41c9887433885cc06", 0xa6}, {&(0x7f0000003b80)="bd4e1f4d323d63d2c7994916538fdc4cbc4ed652434e6295fb8e0fcf9d57f680db1991441bfbbef58ed177b0f13b48665b770b72a2989ca1f90dad23bf26e01ebe842a4113dd1919e684e71696d339b87bd94b8999e0a28cd56258a7eb32c2b40dad2311be9359c99d3cb45a5ace34fb0487df7a6e4863851492a589fd20f192e7504d8bc65206710a682131e456bc03e27f39666c056892fdb2ceb7d73f93fc52de106a2fe8242e3a56fe5921cc8f06bba9fa2361d9ae717d257254fb24ce3af8c49551dfd8fc896f186f65bc05996cf1cbaa16c01301c970af2bae917fe3f84ec6", 0xe2}, {&(0x7f0000003c80)="bf068868cf1a29318f08444ca16895cd6e05c1f9c6e27b3cda6486bb8fd47b43566b7edd5446668706eef7ad1b22d8ff1e3aa8607dc2fb1d538402389ff28af98e83dab4bc88bad3bcc822c5765c54cefd8e969906e5e61a8c613920d42817535281595acc", 0x65}, {&(0x7f0000003d00)}, {&(0x7f0000003d40)="2d1479705bf9a193483873e8b874e9b02dfbf8a04a89618a2f917ae43264ef9ddf617e197f2a16718c87751fed7ab4527bb34152dc66033466ca0f19903a89004a1c85cc7da7e1d7f6e2363539885775edf943bc48a792334eef5f9752a32f0818f26fc569d56db87269076304eb4872dd97e52cf5b1", 0x76}], 0x7}}], 0x2, 0x80) 05:03:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 05:03:53 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r0, 0x0) 05:03:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100880000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x1a01) 05:03:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000200)=r2) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r3 = accept(r0, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000080)=0x80) setsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000300)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="2401000000000016"], 0x10}}], 0x1, 0x0) accept$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'veth0_to_team\x00', r4}) 05:03:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100001000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:53 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000640)=""/4096) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) dup3(r0, r1, 0x0) 05:03:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000000)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0xffffffffffffff52) 05:03:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_int(r1, 0x6, 0x3b, &(0x7f0000000080)=0x9979, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000180)=0x14) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="24a69a00"/16], 0x10}}], 0x1, 0x0) 05:03:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x40000) 05:03:54 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x800) getsockopt$inet_mreqn(r3, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @multicast2}, &(0x7f0000000140)=0xc) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000001004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x82) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0xfff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000180)={r3}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x2, 0x201, 0x7f0e, 0xb0f, 0x1, 0x100000001, 0x58, r3}, &(0x7f0000000140)=0x20) 05:03:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x1a010000) 05:03:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0xe000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1001}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x700, 0x70bd28, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc004}, 0x40000) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0xffffffffffffff85, 0x0, 0x150, &(0x7f0000000700)=ANY=[@ANYBLOB="2400000000000000000000000000e200"], 0xffffff51}}], 0x1, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/dev\x00') ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0x7) 05:03:54 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) acct(&(0x7f0000000000)='./file0\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5a6b, 0x301880) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0xffff, 0x9ba, 0x1, 0xdfde, 0x0, 0x4, 0x8080, 0xe, 0x5, 0x5, 0x2, 0x10b, 0x7, 0x80, 0x7, 0xfffffffffffffff9, 0x7f, 0xffff, 0xa7, 0xfffffffffffffff9, 0x2, 0x7, 0x6, 0x400, 0x200, 0x7, 0x9, 0x10000, 0x0, 0x5, 0x329a, 0x70a9ea27, 0x3f, 0x4c2, 0x20, 0x7, 0x0, 0x7, 0x0, @perf_config_ext={0x2915, 0x1}, 0x8, 0x5, 0x7, 0x5, 0x8, 0xff, 0x101}, r3, 0x6, r0, 0x8) dup3(r0, r1, 0x0) [ 629.025228][ C0] net_ratelimit: 28 callbacks suppressed [ 629.025239][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000002004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x4000000000000) 05:03:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0xfffffffffffffcbf, 0xfa00, {0x200000000000000, &(0x7f0000000600)={0xffffffffffffffff}, 0x111}}, 0xfffffffffffffeae) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) 05:03:54 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) read(0xffffffffffffffff, &(0x7f0000000300)=""/128, 0x80) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x202400, 0x0) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f00000001c0)=@generic={0x2, 0xe8b, 0x5}) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x400) socket$bt_hidp(0x1f, 0x3, 0x6) r3 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video0\x00', 0x2, 0x0) signalfd4(r3, &(0x7f0000000140)={0x24}, 0x148, 0xfffffffffffffffe) 05:03:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x8001, 0x1, 0x5, 0x96}) r2 = dup(r1) connect$tipc(r2, &(0x7f0000000100)=@id={0x1e, 0x3, 0x2, {0x4e20, 0x4}}, 0x10) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) [ 629.251369][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:54 executing program 2: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0xfffffffffffffe7c) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x4000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r3, 0x111, 0x5, 0x8, 0x4) [ 629.353003][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000006004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x1a01000000000000) 05:03:54 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x2, 0x2) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000280)={0x1}) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x3f3, 0x800) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000001680)={0x53, 0x0, 0x7, 0x0, @buffer={0x10e, 0xb8, &(0x7f00000001c0)=""/184}, &(0x7f0000000300)="00041b8fd622c9", 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f00000000c0)={0x3, 0xb877}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x0, 0x7}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x0, 0x541c1) ioctl$KVM_SET_CLOCK(r5, 0x4030ae7b, &(0x7f00000003c0)={0x800, 0x1}) setsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f00000002c0)=0x8, 0x4) dup3(r1, r0, 0x0) 05:03:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) syz_open_dev$mouse(&(0x7f00000007c0)='/dev/input/mouse#\x00', 0x851, 0x1) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) io_setup(0x0, &(0x7f0000000080)=0x0) r3 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) r4 = creat(&(0x7f00000003c0)='./file0\x00', 0xb5) r5 = fcntl$dupfd(r0, 0x27de902e2764cd1d, r0) r6 = syz_open_dev$mouse(&(0x7f0000000640)='/dev/input/mouse#\x00', 0x10001, 0x200) io_submit(r2, 0x5, &(0x7f0000000780)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x3, r1, &(0x7f0000000180)="f29e79366cd262c93fa6c8e868e7865cfee5b9934b2a0900cec6b141f2236fcf48d9cd66fd7564fa108bc9afb8b3379f3456845870342b936946b2dce58c62003b0feeba778d9ddccc0482fd74464a854b7b5d4305a283639304d70aa93d25279841cb76b2a6a9ec14effde9cc7ec7a5f262c7a28ca24bf68465ea6a3f97e08bba192582695b049ba73f4a70ab12a21773da3c91a9e4fb3774316dfb3b3f538505f5889e45cb5c562aa7a039c84ef46b78d1f0499b76058252b20c50e083bda137e86fbef4d6cc0deb0bb76ddbf5b94642e65ff2cf5e31b423c415ba807e05101519ed6a", 0xe4, 0x4, 0x0, 0x1, r3}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0xfff, r0, &(0x7f00000002c0)="7e0ac0f725d65ea11258d727f1ce0fd2651131644262425fa4e44dacd3bea9947860b4589c50953d46029823731c84c77b865a8ea35b28c7f294836aa845cf6bc278157730cbcfa0e8bcf557e8261ffb67c374cfb1c99c45f356bdccbfe3e425f404ccfe605c600d4a4b7d8d5eaa75deb6aa1b3c50835fb812410a3304aa20bc8b41989671bae69623508c909e9d0e8e7eb97b18ef8d692a917114d752f60ffe071e2b41c9d5f68235346995d908d416fbfa4280b400704416e77bd292c944f0da2228f30768d1a83054d458aad20954a07c27b94102ed3555", 0xd9, 0x7fffffff, 0x0, 0x1, r4}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x3, 0x800, r0, &(0x7f0000000440)="85b2f08fef5821f34877a5fd0d3e70bd587983b25efb8271d0c94a3d88824b06788d4e93f91f737ddf8d9a492bbdb03addfbdd1501644e39035a74309d8ffdcc3e3ec47d6eba660e9631c09f1a1ec25c58bdda4986a0566839253d0e579285addbdc19caa59d78701e0ecdcc270da1006eba4cd63778dcdb2c0e154cdb4d0f71c579a9685a2e792cbf6d2bffb86cc27cb0b28cccad8bc9050c5657e5f410669fd8bc", 0xa2, 0x3, 0x0, 0x2, r5}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x5, 0x6, r1, &(0x7f0000000540)="91e67d7c6d1e776c523be8c7356012c4f88bbdfc81c360814d5ee06851b5079cf94ac3343cd2aa9882e4f0be156d28d61789a5839a75d9799c9b0b4e382766a536685f9ecad3e031a6e13f25425427785f1716ca15859009c5ac4bb211c0c699beed51d0017d6d019d3ccb857e9d64ade78a307165ca76238099f34b16175c90da26a7d1f97cb0e9e64a1af57741aa61473871cf8e5797febc301a347faea859580667999d679f50b73769fa88b0d7743915d82577aa1d626554a498922d695afff36236bab27075a240a3f52f21ef37c6f0f241379df6cf58557f72079bb3eba9f28c7adb0721813904bc5ca47b7e07f34756d0a8", 0xf5, 0x615e, 0x0, 0x1, r6}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x5, 0x9, r0, &(0x7f00000006c0)="52764538157051c9acdecff540a3ac169a0168ef7606a7a01ab7195954ee76fcec", 0x21, 0xe68}]) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:54 executing program 1: getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x47, &(0x7f0000000000)='(&wlan1.bdevkeyringmd5sumvmnet1ppp0selinux[##selinuxcpuset^wlan0system\x00', 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) r0 = getpid() r1 = getpgrp(r0) r2 = gettid() r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$KIOCSOUND(r3, 0x4b2f, 0x450d) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r2, 0x7, &(0x7f0000000080)={0x3, 0xfffffffffffffffe, 0x5}) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r4, &(0x7f0000000300)=""/128, 0x80) signalfd4(r4, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) prctl$PR_SET_FPEMU(0xa, 0x1) [ 629.625541][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000008004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0xab5) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000080)={0x7, 0x9, 0x4}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='attr/sockcreate\x00') ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000240)) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) connect$rxrpc(r3, &(0x7f0000000100)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e20, @multicast1}}, 0x24) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="240000000000000000000000000000003e1b5bea45d37d7fb30e2fec06689357b61dfeb4a85e2d4f0d9ec7502036c5d9677fdcaf39ea5d7b5402ebf85f7816404988cfcde6073102823a81e9758c65d56f798894b8320da3dcca2235e236f0219cbdaff6481caaf7e8b6f466c0"], 0x10}}], 0x1, 0x0) write$nbd(r3, &(0x7f0000000280)={0x67446698, 0x0, 0x0, 0x3, 0x1, "4cb68c8f637100689dab0a7d4bd455a1462a73ea820a4a46b5b5271798f274a3ce4732a8e5bf8191138ef8a5093e8e"}, 0x3f) 05:03:54 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x9, 0x409ff) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f00000002c0)={r1, 0x0, 0x1000, 0xfffffffffffff000}) r2 = getpgrp(0x0) r3 = gettid() clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080)={0x3, 0x1, 0xffff, 0xff, 0x3, 0x5, 0x81, 0x80}, &(0x7f00000000c0)={0xffffffffffffff7f, 0x2, 0x200, 0x4, 0x0, 0x1, 0x1, 0x288}, &(0x7f0000000140)={0x9, 0x3, 0x0, 0x8, 0x7, 0x8, 0x40, 0x9}, &(0x7f00000001c0)={r4, r5+10000000}, &(0x7f0000000240)={&(0x7f0000000200)={0x622}, 0x8}) rt_sigprocmask(0x0, &(0x7f0000000100)={0xbffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r2, r3, 0x1b, &(0x7f0000000400)={0x0, 0xfffffffffffffffd, 0x5}) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r6, &(0x7f0000000300)=""/128, 0x80) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r7, 0x80e85411, &(0x7f0000000480)=""/143) signalfd4(r6, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4025c0, 0x0) ioctl$TCXONC(r8, 0x540a, 0x82) 05:03:54 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x102, 0x0) dup3(r0, r1, 0x0) 05:03:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040)={0x5, 0x1, 0xed, 0x72fb, 0x10000}, 0x14) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0x1000) 05:03:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000011004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x405, 0x103100) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000020}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4004800) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000004c0)={0xa, 0x2000000004e22, 0x0, @remote}, 0x1c) r2 = shmget(0x3, 0x2000, 0x80, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) r4 = fcntl$dupfd(r0, 0x406, r0) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000300)={0x9237, 0x5, 0x5, {}, 0x95b9, 0x70e9}) get_robust_list(r3, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f0000000180)={&(0x7f0000000100)}, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)}}, &(0x7f00000002c0)=0x18) write$capi20(r4, &(0x7f0000000380)={0x10, 0x9, 0x1, 0x82, 0x37289755, 0x4}, 0x10) lsetxattr$trusted_overlay_redirect(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./file0\x00', 0x8, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000480)={&(0x7f00000003c0)=""/172, 0x24000, 0x800, 0x4}, 0x18) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:55 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x102, 0x0) dup3(r0, r1, 0x0) 05:03:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000040004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 630.152775][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 630.184417][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:55 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x141, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@rand_addr=0x5, @multicast1, 0x1, 0x4, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x24}, @multicast2]}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) 05:03:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x1, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x1c817bdde038a96) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000002c0), &(0x7f0000000300)=0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000380)) sendto(r0, &(0x7f0000000180)="07f08493579c2b00483e4d91add688eef683d345dca5716ed2fe7fd9c01aa13f41a994ab5c1cea8cc1fbd73049694891f6104cd550b52533154d8d0cdf4869694e9b1ebe1a5b4bfd5466911264f81aa2e06e45efce40a160f898864530db8fa40a78d7d39b662a84f445cc1026bf4a9fe596e92d7f1deaa0632ed9299e9eb65d046a13e2bf897eb3", 0x88, 0x80, &(0x7f0000000240)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="240001000000000000000000"], 0x10}}], 0x1, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000340)={0x2, 0x9, 0xfffffffff7a2d2f6}) 05:03:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000088004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 630.404277][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 630.475619][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f0000000000)=0x80) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) 05:03:55 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x102, 0x0) dup3(r0, r1, 0x0) 05:03:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100020000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:55 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x1, r3, 0x3c, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xa0) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x800, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000140)=""/158) read(r5, &(0x7f0000000300)=""/128, 0xffffffffffffff01) ioctl$sock_SIOCDELDLCI(r5, 0x8981, &(0x7f0000000080)={'bcsf0\x00', 0xfffffffffffffffb}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f0000000480)={0x0, 0x1, 0x6, 'queue0\x00', 0xf9}) signalfd4(r4, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) fcntl$dupfd(r4, 0x0, r5) sched_getattr(r1, &(0x7f00000000c0), 0x30, 0x0) 05:03:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1000"/16], 0x10}}], 0x1, 0x0) [ 630.888277][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x45) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, &(0x7f0000000300), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000040)='-vboxnet0\x00', 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:03:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100060000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffe09, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) [ 630.999216][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = dup(r1) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000180)={'filter\x00', 0x7, 0x4, 0x480, 0x140, 0x258, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000080), {[{{@arp={@loopback, @loopback, 0x0, 0xffffff00, @empty, {[0x413443e622b745b2, 0x0, 0x0, 0xff, 0xff, 0xff]}, @empty, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, 0x7, 0x4, 0x4a, 0xffffffffffffffff, 0x3, 0x79a79058, 'veth1_to_team\x00', 'irlan0\x00', {}, {}, 0x0, 0x2}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast2, @rand_addr=0x9, 0x1, 0xffffffff}}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x6}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="5e215cdbcc47", @empty, @multicast2, @multicast2, 0x8}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000680)=@ccm_128={{0x303}, "9c57c8265c51d256", "4d8371a3218135d40d768db701611580", "9c891c66", "59a6a895957e1df8"}, 0x7) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:56 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x163, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400141, 0x20) socket$inet6(0xa, 0x3, 0x10001) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x228000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r3, r4, 0x12, 0x2}, 0x10) 05:03:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x102, 0x0) 05:03:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100080000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) write$FUSE_LK(r1, &(0x7f00000000c0)={0x28, 0x0, 0x6, {{0x3, 0x5, 0x0, r2}}}, 0x28) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r3, 0x1}}, 0x18) 05:03:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x200, 0x0) fsconfig$FSCONFIG_SET_BINARY(r2, 0x2, &(0x7f0000000400)='syz', &(0x7f0000000440)="62fde76e45e1841851f368aecf6dae835b44538d33c6a0c3afd600ad2646330d8087e4fef4fd615f0c38e1628a63a9ca567d6d8e83a2975f5e28b45892eb2ce9731531774005888b1ac879c640b29127948b1578494d86f508df5224f410d810b95072a39e7e4cf23727256b11159e0fe79663d63d5fa3", 0x77) r3 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x7, 0x1) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000300)={@x25={0x9, @null=' \x00'}, {&(0x7f0000000200)=""/149, 0x34}, &(0x7f00000002c0), 0x70}, 0xa0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) r4 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="ef18c8d4bdd96d222934", 0xa, 0xfffffffffffffff8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000004c0)={'bond_slave_1\x00', 0x800}) keyctl$assume_authority(0x10, r4) 05:03:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="100000000000000a01000000000000000b9523ea198dd7b1898352"], 0x10}}], 0x1, 0x0) 05:03:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100100000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:03:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8, 0x101000) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000180)="2f26785c6b86ae6c7db990435310e9509f7ce01e1a99979f1544972dc596ca762e009fe95da30c50cca58dd7671eab9debce8148cb8b1643325c0056bcd225b50f4e8011e691d0115aa53dfcea0b667902719df826ad50f8d0fc92b2014953", 0x5f}, {&(0x7f0000000100)="6a2ad2280651606130d6c1cdb0bc92", 0xf}, {&(0x7f0000000200)="4f595cecec5a9232c4b27a9481039d2c195c8a", 0x13}, {&(0x7f0000000240)="eb4e8a740d371f269b5bf8687541cbc15f1651c3af75c8f38f796fee0a04a705f3d78ff47f251940bbc0426b0b11604e999169dc7cf143af20417eafe080bdd2382712e97de8468e05638b4add0f937bd4ac0682ca5d61e5cd8bad232bcbc30fb544bd7b0a151599eeab34dff41cea44abb49cddee91e53841d9e3fa96bd1e0327697fbb9dbd6db2da37ff1c6eeac8a85c63e29bec2385055d1ce5af77ddd1d75553df2c91a204f0d80ab02803ff1a55e94bb6b0e6a2b917a7d388237052caa39abb18c2a6b008bb7cc3533e168fb3bf3102bf943da7269785460b316bf765fd79ea2fe6ca7dc7a2768a63dd18066ccaf65102", 0xf3}, {&(0x7f0000000340)="9c9a625896e82f9b02b65569814a785fcc01f31eb055667a09f7c8a827f797366baffdad8d331d1688806e41d8ef05c6c54fe54939d1812a941dce270006567c0d88859c445bbdff7a0f1e063fec37c145d0e3e7e2415eb7816af97f5a206a05cd448203", 0x64}, {&(0x7f00000003c0)="15f0f6053855d1d947cbf06870220c82537f1ca2a171a7ef1f468dd9f434bffabd96b1855e46c4717aa65d818e5fd803760f43f838418f74ed2f10515883f253961034b97202f18283875b43bcbfef49ce5bfad6d7c1", 0x56}], 0x6}, 0x24000054) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000500), &(0x7f0000000540)=0x8) bind$inet6(r2, &(0x7f00000005c0)={0xa, 0x4e21}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="2400000000000000000000002407b59f2a3e81fa5cf87e668cd32e6f2ee5abf9a15e6fae23e3331ee22ee4ad2b62f8020c113ca60088ad4d13daaf8166c12046f3b3b48e7099a809a82358de2ced131a326f8b2b9fadd63079b7724022e28cc5f38ff4b0c2e954849cd5f6a147aa590c41e2b8ba80b8c4e2fcfd436d328dab6cb983f36757892c68a07b6b392b22d74f0d56fb0546a13b5a69d85e2d11295972f331"], 0x10}}], 0x1, 0x0) 05:03:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = socket(0x0, 0x805, 0x40) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000000)={@remote, @empty, 0x0}, &(0x7f0000000040)=0xc) sendmsg$can_bcm(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d, r3}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x7, 0x0, 0x6, {}, {0x77359400}, {0x3, 0xfffffffffffffffc, 0x8}, 0x1, @can={{0x2, 0x80000000, 0xffffffffffff7fff, 0x9}, 0x3, 0x1, 0x0, 0x0, "2cbde45b3deb6df0"}}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x8004) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x4) 05:03:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:03:57 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000180)={0x0, 0x4, 0x0, &(0x7f00000001c0)=0x10004}) signalfd4(r2, &(0x7f0000000140)={0x64}, 0x8, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) 05:03:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000200)) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8, 0x10000) connect$netrom(r3, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="2400000000a6d17299ac33d0b2000000"], 0x10}}], 0x1, 0x0) 05:03:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100110000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:03:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x8, 0x2b85, 0x0, 0x8, 0xc4f}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={r3, 0xff, 0x8}, &(0x7f0000000200)=0x8) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x59e, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x142}}, 0xfffffffffffffecf) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x80, 0x0) accept4$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80000) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000100)=""/103, &(0x7f0000000180)=0x67) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) unshare(0x20200) ioctl$SIOCRSGCAUSE(r3, 0x89e0, &(0x7f0000000040)) 05:03:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100880000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0xffffffffffffff9c}, 0x10) socketpair(0x10000000003, 0x2, 0x101, &(0x7f0000000100)={0xffffffffffffffff}) tee(r2, r3, 0x2, 0xe) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000000c0)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x10) ioctl$VIDIOC_REQBUFS(r4, 0xc0145608, &(0x7f0000000180)={0x5, 0x7, 0x3}) 05:03:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00I\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00'], 0x10}}], 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip6_vti0\x00', 0x10) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x2cd, 0x20100) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000100)={0x20, 0x7, 0x80000000, 0x0, 0x9, 0x3, 0x9}) 05:03:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200040, 0x0) fsmount(r2, 0x1, 0x80) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000180)=""/193) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:03:57 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x8000, 0x0) r3 = signalfd4(r2, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x3) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={0xffffffffffffff9c}) setsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f00000000c0)=0xea1, 0x4) 05:03:57 executing program 0: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000180)={0x0, 0x4, 0x0, &(0x7f00000001c0)=0x10004}) signalfd4(r2, &(0x7f0000000140)={0x64}, 0x8, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) 05:03:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000600004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000200)) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r3, 0x800, 0x70bd28, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xe75d}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x4001) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) [ 632.504049][T20935] dlm: non-version read from control device 3 [ 632.523719][T20942] dlm: non-version read from control device 3 05:03:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) 05:03:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x3, 0x2) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000180)={&(0x7f0000fff000/0x1000)=nil, 0x1000}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000001c0)={0x1, 0x0, [{0x40, 0x1, 0x0, 0x0, @adapter={0x5, 0x3, 0xffffffffffff8000, 0x800, 0x6}}]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x200, 0x8000000100079) ioctl$KVM_SET_CPUID(r3, 0x4004551e, &(0x7f0000000080)=ANY=[]) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000200)={0xffffffffffffffff, 0x1}) ioctl$sock_inet_SIOCRTMSG(r3, 0x80085504, &(0x7f00000000c0)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @dev}}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r4 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000, r4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="100000e9ffffffffffffff0000000000d8e8f8ca1adb5498e5d9509f53419fb3ae915d59869a0b0d87d99199149cf010b78e"], 0x10}}], 0x1, 0x0) 05:03:57 executing program 1: r0 = gettid() openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x30081, 0x0) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(0x0, r0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r1, &(0x7f0000000300)=""/128, 0x80) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x8480, 0x0) rt_sigprocmask(0x1, &(0x7f0000000140)={0x1}, &(0x7f0000000180), 0x8) ioctl$KVM_SMI(r2, 0xaeb7) signalfd4(r1, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100001100004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 632.783386][T21013] usb usb2: usbfs: process 21013 (syz-executor.5) did not claim interface 0 before use 05:03:57 executing program 0: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000180)={0x0, 0x4, 0x0, &(0x7f00000001c0)=0x10004}) signalfd4(r2, &(0x7f0000000140)={0x64}, 0x8, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) 05:03:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) [ 632.831226][T21013] usb usb2: usbfs: process 21013 (syz-executor.5) did not claim interface 0 before use 05:03:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x101000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x1f, 0x4, 0x80000001, 0x7, 0x20}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={r2, 0x100000001, 0xff, 0x9, 0x6, 0x8}, 0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x7fff, @mcast2, 0x800}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x23}}, @in6={0xa, 0x4e22, 0xfffffffffffffffd, @ipv4={[], [], @rand_addr=0x4}, 0x9}], 0x58) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000340)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r3, 0x1}}, 0x18) setxattr$trusted_overlay_origin(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x2) 05:03:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100004000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:58 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000340)='/dev/nbd#\x00', 0x0, 0x82) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0', [{0x20, 'tls\x00'}, {0x20, '*lovmnet0-:.selfnodev'}], 0xa, "327384bb491874e147aecd70923cfdfcef30406612745649c1c8632f26158b4fafa5f53ff6c40f4fe35ddb28fb9e109103fd189d4583e1b4beafdb8ba988478cf54c1a3275faa0b5b49b1f5dc056ddcf186d6859090759ce7f18a12913e57936eec2462ec7ac6b0206702145bf5da2232ca66177fccc076f9a4104c459a8f1e1181f3fdf5a"}, 0xab) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x408480, 0x0) write$9p(r2, &(0x7f0000000240)="9b0a5cd942c60f225f68d5149ba96e7e8990bb4f94444914f3dae0fc049e34d3e5f764d3ec4fdfb61ef66f99bcac3584fabbe869d337a446a3b7bff6ae26ce0ad5f1e2f02bac520f34a189bb33f35ee2e36ea099edf69fe61f24d8cc377acf8bbe11bb02e85fadaf7560004df68797d34dbb87a4371802c4b1b41f80e985f2c1fd426ac3ebcd81ecac8ad16c6721d7fb5e7d5344b3798a363169f78c45d5f46121dbb2bfd9668fbe2c6b398ee54bda311aff0e072aa0a09a24ba7a22fc6caaf9f742986f0177d807ef09a78863a07046c3946d2f7004d7e15148b50b3e8c26468c603fe74ecaac5c4450488d1c", 0xed) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000440)) listen(r3, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xfffffffffffffe2f, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1000008df6a26eae60332a46c2000000a240f9d7a59065e6989ee3877014f47757e1edd6e7ce4df152abb3e36458ccabe83455aa8594c9222f4257e5939be2df44641d638da34144bc80301f2fcf4ce8938c2353469ac39c11bc0001427c9b6c89ef4eba7b09a7ada7f977e9bfc4bb02db8ba0f0e7d6902bebf7f5a9365356c9d35994c2002d28bdd20b1f77129a70c1af12011c0523e0dc965c67e7d19aba3f20736ae7c65072c575a0394e03beb53d80942a9b0000"], 0x10}}], 0x1, 0x0) 05:03:58 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) 05:03:58 executing program 0: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000180)={0x0, 0x4, 0x0, &(0x7f00000001c0)=0x10004}) signalfd4(r2, &(0x7f0000000140)={0x64}, 0x8, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) 05:03:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100008800004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$isdn(0x22, 0x3, 0x27) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:03:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:03:58 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000000380)={0x20}, 0x8, 0x800) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x1) sendmsg$nl_crypto(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xfffffffffffffd7e, &(0x7f00000003c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="18010000130021062dbd7000fcdbdf2578747328616573290000000000000000000000000000001f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000002000000004000000000000000000000800010002000000080001000500000008000100001000000800010081ffffff08000100ff07000008000100000000000800010001010000"], 0x1}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) 05:03:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x307}, "3eb167792762c73e", "94125ced23263d8102c395afac0b7161d0a003311511b3cef33359b6d10e8e67", "e97e04da", "cd7ea53c92bca431"}, 0xdb) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:03:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000010004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x102, 0x0) 05:03:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1f, 0x2) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) 05:03:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:03:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000014300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:03:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80000, 0x0) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000040)={0x6000, 0x4000, 0x0, 0x1175, 0x100000001}) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000000c0)=0x3, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0xffffffffffffff45) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x80000001, {0x7, 0xffff, 0x3f, 0xd2, 0x0, 0xffd}, 0xa880, 0x40}, 0xe) 05:03:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000100)={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0xcb9786583396f7ec, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000180)={0x50d5, 0x14, [0x8000, 0x6, 0xbb2, 0x5, 0xfffffffffffffff9]}) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f00000001c0)={{0x5, @name="880725053e8b538a68827461b72c1ceeaeb9f45495b641f3e8614df1116dd6c5"}, 0x8, 0x100000001, 0x1}) 05:03:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x102, 0x0) 05:03:58 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:03:59 executing program 1: getpgrp(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) getpgrp(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)=0x0) r1 = getpgrp(r0) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r2, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:03:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x2100) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000040)) 05:03:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="10000000000000000000000000000000d00c47b982bbc5fa161cbaa6d231991ec2078db8ffafaae4eb4e94bf3a0cf7667fc30efa229b"], 0x10}}], 0x1, 0x0) 05:03:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000024300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:03:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x102, 0x0) [ 634.722813][ C1] net_ratelimit: 16 callbacks suppressed [ 634.722825][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:03:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000064300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:03:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffd06, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) [ 634.784708][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:03:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:03:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) ioctl$VIDIOC_G_CTRL(r2, 0xc008561b, &(0x7f0000000100)={0x3a81, 0x931}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000400)={0x9, 0x10001, 0x2, 'queue1\x00', 0x5525}) r3 = inotify_add_watch(r2, &(0x7f0000000240)='./file0\x00', 0x40000000) inotify_rm_watch(r1, r3) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x10}}], 0x1, 0x0) accept$packet(r2, 0x0, &(0x7f0000000180)) 05:04:00 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r3, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{r4, r5/1000+30000}, {0x0, 0x2710}}) 05:04:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000084300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 635.078364][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) epoll_create1(0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:04:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="01b1f952a847830f33cf2db4b0b30ef59f8af25e28a47d0cac30d7d0c5f4bc9cb4d29f6491b88676b1b6c9e553d82fb3dccc3197e6cf04a1248fbb2b089b44fe242eeafcf6fc7cd9ea02be44333496e629175d83e7b82f813dc0f6eece09c9246223f8461e93472de7ceead7a439a01320e59b1f16afc1b52e3fa647b927b8b2d21ee84ff9b52cd762bcf5"], 0x10}}], 0x1, 0x0) 05:04:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000114300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) [ 635.391222][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/cachefiles\x00', 0x8c00, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f0000000200)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @broadcast, @initdev}, &(0x7f00000002c0)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000006c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006c40)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000006cc0)={0x11, 0x0, 0x0}, &(0x7f0000006d00)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006d40)={{{@in=@broadcast, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000006e40)=0xe8) getpeername(0xffffffffffffff9c, &(0x7f0000006e80)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000006f00)=0x80) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000006f40)={0x0, @rand_addr, @initdev}, &(0x7f0000006f80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007140)={0x0, @dev, @broadcast}, &(0x7f0000007180)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000007280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000072c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000007380)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000011200)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000011300)={'vcan0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000011340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000011380)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f00000113c0)={@multicast1, @dev, 0x0}, &(0x7f0000011400)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000011440)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000011540)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000011580)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000011680)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f00000116c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000011700)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011780)={@dev, 0x0}, &(0x7f00000117c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000014a80)={@loopback, @local, 0x0}, &(0x7f0000014ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000014b00)={@remote, 0x0}, &(0x7f0000014b40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000019180)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000019280)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000192c0)={'syzkaller0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000019300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000019340)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000019380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000193c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000019400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000019440)=0x14, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000019d80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000019d40)={&(0x7f0000019480)={0x8a0, r3, 0x401, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0x1e4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x54f2}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0xd8, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x7fff, 0x7fff, 0x200}, {0x2, 0x123b19ac, 0x6, 0x8}, {0x3, 0x5, 0x8}, {0x3, 0x6, 0xf213, 0x8}, {0x7f8c9396, 0x0, 0xfd, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r9}, {0x174, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3f}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0xb4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x21}}}]}}, {{0x8, 0x1, r17}, {0x4}}, {{0x8, 0x1, r18}, {0x1a8, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r21}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r24}, {0x44, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r25}, {0x178, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r26}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r29}}}]}}]}, 0x8a0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) 05:04:00 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_G_TUNER(r2, 0xc054561d, &(0x7f0000000140)={0x7, "cdc686fce3d36249b8910db2457a8465ca082c5e7d96b1cae0cede647fa9e78d", 0x5, 0x200, 0xfffffffffffffffd, 0x3, 0x14, 0xd4aace639698a763, 0x20, 0x80000000}) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) [ 635.467182][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000404300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1000000000000000000097bc8aa871eabed2e644c1"], 0x10}}], 0x1, 0x0) 05:04:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:00 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) timer_create(0x0, &(0x7f0000000680)={0x0, 0xf, 0x0, @thr={&(0x7f0000000280)="d241c20faf3087843cad191965f90dc4c709c154e2b00d97226ba47beca26658a93ec53b18a198b07a5b3cca044f773e2a3cf6aec1726d15f3f41d9a2b112abfd23e26bb740625", &(0x7f0000000640)="6ab5a6cddbec323be9ca4596f9812a63dd66a748bdcc73f2f052b5d43e2c9de73c18a251b405610585856e"}}, &(0x7f00000006c0)=0x0) timer_getoverrun(r2) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) vmsplice(r3, &(0x7f0000000540)=[{&(0x7f0000000080)="0a59c0c390379b4034d08ec4397485ea4952ef064d06c4f15edfa8f56647", 0x1e}, {&(0x7f0000000140)="a55d197e67a3848e83ddfc7be154b9bef974d2fe0b910843b26b00337bd95d41614e72e54e7d84d689d467474e53b402c07fc9d61337c7b2b39082da77b26700c5e7a6f551323c1cb794ad10", 0x28}, {&(0x7f00000000c0)="81b8", 0xfffffffffffffd9f}, {&(0x7f00000001c0)="e357cb051847b28c96c39f7a29b422903393c11edd3cbcaa1fa26cf7f1bf16b7fa2172ec428059983642b615c7bebf08c9e30ee9e501dc0d9f6c3f5903477871b57747fe7b21177758a41d685048c7b1c7265998857b912eef9c5bac7ea787a8d9dbf46c8a5490a974d1430369508a49ec7daec5eecfa99b3e3dcf413386197c3f09cbca6d9ed7df388efa54699f0c52936430eda7a9f7bd0674", 0x9a}, {&(0x7f00000005c0)="af8996c5279a18b91e51b448a7ef56c066819744e5eea2184824e373c988969fccfdb457482815876375e791335f5b00000000000000000000006e5b4cd8bb64c13806d44676aa03d3fb95", 0x2a}, {&(0x7f0000000380)="dac8aea2c205a15510611ebf0c5c3673357be1c2416a578c6d5c52823301fdcdec1ab302120fe0c0b1a9e45e497e58a0ab2589d1bb0e45f548313d23ecac6ac69fb2f2a5365618c7f266093d59adf450cd607677f9534b74dc34ae5e357436ab41f3acb7411ea7622e4d796890b2034bb2e43dedc39d0ea5e7c829f8b40a8a68b48209eebccc4f6920d1e6f050f92d58294dabc9d7d66678887d52bbc238eeb7f8c79f29860eb590b7d2ef68a6b8b8468419ff5cf754f7ea6174cdf6338f5589aee88ac57be743c606ae9ed0e7907046413fcfed04d75abfc2ad835874d88be4d88eac123c511aa0aeec7108ee3be4153ec487c76208a8d8a014343f356e", 0xfe}, {&(0x7f0000000480)="baa8937026bcb9ce0e423a2d6a136f5e6ab4014e4cddaa7ac1acbee62e56547e8e3ba453790697c03deb16bba787e7173e09b95019d4d11f9051dac590927aec5083a24f22b1ca84cc0f3a9ece0023849926c4a441e8200ba4d10a70d48751912faee85d47d1cf4b650816a584c8ebad0273768e54556e14e2defc4208646b4c77cce4e214d04bc29e5cd609b5728cea6c6e6b899f241b6f3919997de6bd", 0x9e}], 0x7, 0x6) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:04:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000884300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 635.780158][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 635.818973][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xfffffffffffffff7, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r2, 0x1}}, 0x18) 05:04:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) 05:04:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x8) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x2) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:01 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x73, 0x20000) write$UHID_SET_REPORT_REPLY(r3, &(0x7f00000001c0)=ANY=[], 0x0) ioctl$VIDIOC_S_OUTPUT(r3, 0xc004562f, &(0x7f00000000c0)=0x3) 05:04:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) 05:04:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000180)=""/255, &(0x7f0000000080)=0xff) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0500000000c7000000000000000000de061d5f88e28770bc0694e5ac00"], 0x10}}], 0x1, 0x0) 05:04:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000200004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x400) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000040)={0x1, 0x1, [0x81, 0x0, 0x800, 0x80000000, 0x3ff, 0x787c, 0x1, 0x3]}) 05:04:01 executing program 1: r0 = getpgrp(0x0) r1 = gettid() r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x302, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f00000001c0)={0x20, 0x20, 0x5, 0x6, 0x12, 0x0, 0x8, 0x20, 0x1, 0x5, 0xeeec, 0x200}) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000200)="badc312943f275caac655b69734c87391fc1d22f1d2af6f84154f1a5ec607075251f7e1db02dbe28be2bd449e0271a251d86582a8cf4a20ab97445f0086c436bb2dd28b56ad72edbedebb968cc27d1c95635e8603d729822df3444a2c5b4d905de1ad869cd9f0e0e2e421689eb68c5e00c11d5ceee09dd3ab907d755d4de185bccd52a55da9663f9bbe3300142f2ee63d32a3876904365c588c52235ad85d7323650d703ee85ad37a366270d9e37bd79832629755e7dffb111e1ef0cbeced5d9f44e62886ce7b58833") r3 = signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0x2c5f, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) getsockname$llc(r4, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x10) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:04:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000600004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 636.400239][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r0}}, 0x18) [ 636.487212][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0x7, {0x0, r1, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1, r0}}, 0x18) 05:04:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, r2, 0x0, 0x0, r3) 05:04:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100001000004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:01 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x10000, 0x4000) ioctl$TIOCSBRK(r3, 0x5427) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2d, 'rdma'}, {0x0, 'pids'}, {0x2b, 'cpu'}, {0x2f, 'memory'}, {0x2d, 'io'}]}, 0x1d) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:04:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x280000, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x272, 0x7, {0x0, r2, 0x3}}, 0x18) 05:04:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100001100004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:02 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r2, &(0x7f0000000140)=""/128, 0xffffffffffffffba) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:04:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) [ 637.102726][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100008800004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000001c0)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "e37532d3b908bfec", "2d13b92a689f71d4db27653a43c4e934", "34bf816f", "84b5639f69065346"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="10000000000000000000000000000000f61643dfae680048b38ffed2c7190b17214b3994342957ee8413c95e2f80641935791eb605a33f5516d5be91a45653ffa834255d8a6a4f883d30d9077179e464bae73b930677feec3af6434dad9afd8183f37de62cddbfbe136bc7619b95447cd24426ad2a6ded55dfcd8b3391122bf1482ba1aa67e456e95dab"], 0x10}}], 0x1, 0x0) 05:04:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:02 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = fsmount(0xffffffffffffffff, 0x1, 0x3) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f0000000080)="6e6dca182619ddccadfea554", 0xc}], 0x1, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:04:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x24}], 0x10}}], 0x1, 0x0) 05:04:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000006004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:02 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:04:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "4750bb08017518e1", "9110712c79c08ea7414c7f04b96d90b4", "48c2d48b", "39a2665e90c7f358"}, 0x28) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x5, 0x0, "66f89faf8a2c272b976fbb2a1d511f75b85502a09444265f8bd0c36f49428965cf06eb68bec0b792e57d1c4cc3d9cabe6aa19267308e7ea6694c979c18f508d0a9893e0d9eb8461e467a73b97b767c33"}, 0xd8) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = dup3(r1, r0, 0x80000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000001c0)={r3, 0x6d, "5165ba3212664956984b787ce7d692e6d89507fc5ba261fd9ec0589b181a8fd50db2260f445993c678f28741581e0acf148fc041bbfae2a1f8e5aa43fcb4f98daeae7b9d25dba4bde23fce28445352f0db759f0c22274b762dc03a8e2c949348573cce7d54690f14e4b4086245"}, &(0x7f0000000240)=0x75) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="100000401f000000000000000000ed92"], 0x10}}], 0x1, 0x0) 05:04:02 executing program 3 (fault-call:7 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x5412, &(0x7f00000002c0)={0x5415}) 05:04:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000011004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:02 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x10001}, 0x8, 0x0) read(r2, &(0x7f0000000300)=""/128, 0x80) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400000, 0x0) bind$vsock_stream(r3, &(0x7f0000000140)={0x28, 0x0, 0x0, @my=0x1}, 0x10) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:04:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4d2f) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) accept4(r0, &(0x7f0000000180)=@x25, &(0x7f0000000080)=0x80, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) [ 637.892994][T21651] FAULT_INJECTION: forcing a failure. [ 637.892994][T21651] name failslab, interval 1, probability 0, space 0, times 0 [ 637.947739][T21651] CPU: 1 PID: 21651 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #43 [ 637.955791][T21651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.965862][T21651] Call Trace: [ 637.969183][T21651] dump_stack+0x172/0x1f0 [ 637.973984][T21651] should_fail.cold+0xa/0x15 [ 637.978587][T21651] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 637.984423][T21651] ? ___might_sleep+0x163/0x280 [ 637.989289][T21651] __should_failslab+0x121/0x190 [ 637.989322][T21651] should_failslab+0x9/0x14 [ 637.989342][T21651] __kmalloc+0x2d9/0x740 [ 638.003010][T21651] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 638.008744][T21651] ? rcu_read_lock_sched_held+0x110/0x130 [ 638.014561][T21651] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 638.020290][T21651] tomoyo_realpath_from_path+0xcd/0x7a0 [ 638.020306][T21651] ? tomoyo_path_number_perm+0x193/0x520 [ 638.020334][T21651] tomoyo_path_number_perm+0x1dd/0x520 [ 638.036945][T21651] ? tomoyo_path_number_perm+0x193/0x520 [ 638.042585][T21651] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 638.048406][T21651] ? __f_unlock_pos+0x19/0x20 [ 638.053105][T21651] ? __fget+0x35a/0x550 [ 638.057288][T21651] ? __fget+0x381/0x550 [ 638.061483][T21651] ? ksys_dup3+0x3e0/0x3e0 [ 638.065917][T21651] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 638.072180][T21651] ? fput_many+0x12c/0x1a0 [ 638.076623][T21651] tomoyo_file_ioctl+0x23/0x30 [ 638.081405][T21651] security_file_ioctl+0x77/0xc0 [ 638.086379][T21651] ksys_ioctl+0x57/0xd0 [ 638.090549][T21651] __x64_sys_ioctl+0x73/0xb0 [ 638.095165][T21651] do_syscall_64+0xfd/0x680 [ 638.099696][T21651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.105612][T21651] RIP: 0033:0x459519 [ 638.109542][T21651] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 638.129159][T21651] RSP: 002b:00007ff67f55cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 638.137592][T21651] RAX: ffffffffffffffda RBX: 00007ff67f55cc90 RCX: 0000000000459519 [ 638.145590][T21651] RDX: 00000000200002c0 RSI: 0000000000005412 RDI: 0000000000000004 [ 638.153608][T21651] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 638.161613][T21651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff67f55d6d4 [ 638.169623][T21651] R13: 00000000004c3a7a R14: 00000000004d7718 R15: 0000000000000006 05:04:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000040004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 638.203636][T21651] ERROR: Out of memory at tomoyo_realpath_from_path. 05:04:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:03 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) signalfd4(r2, &(0x7f0000000080)={0x8}, 0x8, 0x800) read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:04:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x26}, 0x400003}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x101000, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r2, &(0x7f0000000180)="9b077066861a42d302eac4e7e410c8f22a537a8d44b67b19616a2c9aec199faf2fc72ce2320b543639427f7d56035db311b13aee35d528999736e6bd4c6b79f827c9bb01b5dd40964e461df0f07bc3f73cb3d5489b7123de32af3c7d9ad5371b36381a67b531724c79f7f01447dbfda3c937ae833bd8d2c7fc0333c0c5758b", &(0x7f0000000200)="1308aef7966d9ad34c4ab313f4ac36e76c6f90ae0da62cb19fd1e8a49b716db54e17f7f82acd40ff17d2ade8605169d2aa7ef14cd306b82595634e35cd8e8f9a4aeef6a50aaf098a075f9cadf57433b5781e31e237d25ffbb6bd31ba734069b96b2d00c13ba907c18a81d47249e55380565818c6ae9b9881d328891857e350f9736b86077aa85962b1d6d2b8c839372eecee82d3de1b9ec05566794c405771d0bcc624e0ce70213213b6d9fab858f64e0ea756ec86cab36dbb99e95a3fbce485c02d252ccb99f09921364e9074", 0x3}, 0x20) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000088004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="00000080f6e9b68e199468851f8dba8f57ea3e0e967c2ed206d45da2230b9d77d3849b070f4751429771653849b2aea50d54f83550b8fc29bc469b9592e5a636193fb690b64248e35c606c609876ee1defa93a48f7c7ffc7b2"], 0x10}}], 0x1, 0x0) ioctl$sock_proto_private(r0, 0x89e8, &(0x7f0000000180)="2354d4da2c1546ed603723b9cb5cab475a4246fa6183260023af64aed5993bbc2117edd5b58d6ba3c6112542a885735af86d8773afd9f4b0e9cd187540406012a39e7e12659af85bf3ad235beeae936fd2c4050e4c1179a635a025f7949a356f705c1805bc5b847d23399df861c6d5dcf116048818698081773f36dce9929f51a1b210ad28d241c5bd8f0f4719e1cba0d85d17d664e1eec14c258a6e27443ce4106e50c7e05e5281dd8b5a8b94ec13d3d56465a858c019202e1e74bc828ad62857ed051b19ceda97d0474494aa67d67591260d16e0aca937") 05:04:03 executing program 3 (fault-call:7 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x5412, &(0x7f00000002c0)={0x5415}) 05:04:03 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000002004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:03 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm_plock\x00', 0x8700, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000400)=0x9, 0x8) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r3, &(0x7f0000000300)=""/128, 0x80) r4 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r4, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4100409}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x128, r5, 0x300, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xc6ac}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x96}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1000}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x4000}, 0x0) signalfd4(r3, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:04:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000006004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x6, @mcast1, 0x5}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="10000000000000000000000000140000"], 0x10}}], 0x1, 0x0) 05:04:03 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) [ 638.880079][T21711] FAULT_INJECTION: forcing a failure. [ 638.880079][T21711] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 638.893326][T21711] CPU: 0 PID: 21711 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #43 [ 638.901322][T21711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.911393][T21711] Call Trace: [ 638.914702][T21711] dump_stack+0x172/0x1f0 [ 638.919052][T21711] should_fail.cold+0xa/0x15 [ 638.923658][T21711] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 638.929485][T21711] should_fail_alloc_page+0x50/0x60 [ 638.934690][T21711] __alloc_pages_nodemask+0x1a1/0x8d0 [ 638.940090][T21711] ? __lock_acquire+0x54f/0x5490 [ 638.945044][T21711] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 638.950796][T21711] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 638.956618][T21711] cache_grow_begin+0x9d/0x650 [ 638.961392][T21711] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 638.967646][T21711] __kmalloc+0x67c/0x740 [ 638.971908][T21711] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 638.977638][T21711] tomoyo_realpath_from_path+0xcd/0x7a0 [ 638.983196][T21711] ? tomoyo_path_number_perm+0x193/0x520 [ 638.988846][T21711] tomoyo_path_number_perm+0x1dd/0x520 [ 638.994355][T21711] ? tomoyo_path_number_perm+0x193/0x520 [ 638.999998][T21711] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 639.005807][T21711] ? __f_unlock_pos+0x19/0x20 [ 639.010492][T21711] ? __fget+0x35a/0x550 [ 639.014699][T21711] ? __fget+0x381/0x550 [ 639.018869][T21711] ? ksys_dup3+0x3e0/0x3e0 [ 639.023298][T21711] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 639.029540][T21711] ? fput_many+0x12c/0x1a0 [ 639.033980][T21711] tomoyo_file_ioctl+0x23/0x30 [ 639.038752][T21711] security_file_ioctl+0x77/0xc0 [ 639.043697][T21711] ksys_ioctl+0x57/0xd0 [ 639.047859][T21711] __x64_sys_ioctl+0x73/0xb0 [ 639.052456][T21711] do_syscall_64+0xfd/0x680 [ 639.056992][T21711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.062880][T21711] RIP: 0033:0x459519 [ 639.066774][T21711] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 639.086378][T21711] RSP: 002b:00007ff67f55cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 639.094795][T21711] RAX: ffffffffffffffda RBX: 00007ff67f55cc90 RCX: 0000000000459519 [ 639.102778][T21711] RDX: 00000000200002c0 RSI: 0000000000005412 RDI: 0000000000000004 [ 639.110759][T21711] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 639.118739][T21711] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff67f55d6d4 05:04:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000010004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) [ 639.126716][T21711] R13: 00000000004c3a7a R14: 00000000004d7718 R15: 0000000000000006 05:04:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:04 executing program 3 (fault-call:7 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x5412, &(0x7f00000002c0)={0x5415}) 05:04:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000011004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:04 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) pause() read(r2, &(0x7f0000000300)=""/128, 0x80) signalfd4(r2, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xe4e0, 0x28080) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x100, 0x7ff, 0x0, 0x7, 0x0, 0x9, 0xa980, 0xc, 0xfc, 0x54, 0x0, 0x3, 0x5, 0x0, 0x7c, 0xfffffffffffffff9, 0x5, 0x2, 0x0, 0x1, 0x2, 0x8, 0x9, 0x0, 0xffff, 0x5, 0x8001, 0x2, 0xc0, 0x7, 0x9, 0xffffffff, 0x1, 0x1, 0x9, 0x3, 0x0, 0x400, 0x0, @perf_config_ext={0x9, 0x8}, 0x10, 0x8000, 0x8, 0x5, 0x8001, 0x5, 0x8000}, r1, 0x6, r3, 0x9) 05:04:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000100)={0xfffffffffffffffc, 0x7ff, 0x5, 0x4, 0xb, 0xab0, 0x200, 0x4, 0x7, 0x630d, 0x1ff, 0xffffffffffffbccd}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:04 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000088004300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8, 0x0) write$P9_RWALK(r2, &(0x7f0000000100)={0x23, 0x6f, 0x1, {0x2, [{0x50, 0x3, 0x2}, {0x0, 0x3, 0x8}]}}, 0x23) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="10000000000000000000000000000100"], 0x10}}], 0x1, 0x0) 05:04:04 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) [ 639.803400][T21764] FAULT_INJECTION: forcing a failure. [ 639.803400][T21764] name failslab, interval 1, probability 0, space 0, times 0 [ 639.860407][T21764] CPU: 0 PID: 21764 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #43 [ 639.868426][T21764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.868534][ C1] net_ratelimit: 9 callbacks suppressed [ 639.868545][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 639.878479][T21764] Call Trace: [ 639.878511][T21764] dump_stack+0x172/0x1f0 [ 639.878540][T21764] should_fail.cold+0xa/0x15 [ 639.878565][T21764] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 639.878591][T21764] ? ___might_sleep+0x163/0x280 [ 639.917912][T21764] __should_failslab+0x121/0x190 [ 639.922862][T21764] should_failslab+0x9/0x14 [ 639.927378][T21764] __kmalloc+0x2d9/0x740 [ 639.931617][T21764] ? tomoyo_unix_entry.cold+0x1f/0x1f [ 639.936987][T21764] ? tomoyo_encode2.part.0+0xf5/0x400 [ 639.942359][T21764] tomoyo_encode2.part.0+0xf5/0x400 [ 639.947559][T21764] tomoyo_encode+0x2b/0x50 [ 639.951971][T21764] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 639.957598][T21764] ? tomoyo_path_number_perm+0x193/0x520 [ 639.963235][T21764] tomoyo_path_number_perm+0x1dd/0x520 [ 639.968686][T21764] ? tomoyo_path_number_perm+0x193/0x520 [ 639.974404][T21764] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 639.980226][T21764] ? __f_unlock_pos+0x19/0x20 [ 639.984909][T21764] ? __fget+0x35a/0x550 [ 639.989075][T21764] ? __fget+0x381/0x550 [ 639.993227][T21764] ? ksys_dup3+0x3e0/0x3e0 [ 639.997636][T21764] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 640.003872][T21764] ? fput_many+0x12c/0x1a0 [ 640.008291][T21764] tomoyo_file_ioctl+0x23/0x30 [ 640.013048][T21764] security_file_ioctl+0x77/0xc0 [ 640.017980][T21764] ksys_ioctl+0x57/0xd0 [ 640.022131][T21764] __x64_sys_ioctl+0x73/0xb0 [ 640.026724][T21764] do_syscall_64+0xfd/0x680 [ 640.031227][T21764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.037108][T21764] RIP: 0033:0x459519 [ 640.040998][T21764] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:04:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000064300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 640.060594][T21764] RSP: 002b:00007ff67f55cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 640.069001][T21764] RAX: ffffffffffffffda RBX: 00007ff67f55cc90 RCX: 0000000000459519 [ 640.076962][T21764] RDX: 00000000200002c0 RSI: 0000000000005412 RDI: 0000000000000004 [ 640.084924][T21764] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 640.092890][T21764] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff67f55d6d4 [ 640.100851][T21764] R13: 00000000004c3a7a R14: 00000000004d7718 R15: 0000000000000006 [ 640.232798][T21764] ERROR: Out of memory at tomoyo_realpath_from_path. 05:04:05 executing program 3 (fault-call:7 fault-nth:3): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x5412, &(0x7f00000002c0)={0x5415}) 05:04:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:05 executing program 1: r0 = getpgrp(0x0) r1 = getpgrp(r0) r2 = gettid() r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f00000003c0), &(0x7f0000000400)=0x4) rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r2, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) ioctl$VIDIOC_G_CROP(r3, 0xc014563b, &(0x7f0000000440)={0xf, {0x6, 0x2, 0x2, 0xe107}}) read(r4, &(0x7f0000000300)=""/128, 0x80) r5 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x3, 0x800) signalfd4(r4, &(0x7f0000a71ff8)={0xfb5}, 0xfffffffffffffcb7, 0x0) io_setup(0x3, &(0x7f00000000c0)=0x0) io_submit(r6, 0x2, &(0x7f00000002c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x1, r4, &(0x7f0000000140)="02a1b4e462d11d14ef7dc5e22f75fc", 0xf, 0x100000000, 0x0, 0x1}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x3, 0xb, r4, &(0x7f00000001c0)="799bcd7015c564083f560798d7a922b8864d4b45d3eb22795dd1f07b329ae48ac67af1184751bb1dba1afe24c17777fddb4c456c25385f34eda88b20b995254e8da57459dccd9ee752b8af08fbbbf671ce56cb7c054efa05235ad2a2da5baee083615361d82a82ad1e900247a49659a86c7a3f4b01f817b1922b1c6c299e5d8a597baafcb08813c4f5dd8dec1fd2d5ae121726ca91fa736341807e8715792bcb937022", 0xa3, 0x1, 0x0, 0x0, r5}]) 05:04:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000114300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(0xffffffffffffffff, &(0x7f0000001780), 0x1, 0x8000000000000) 05:04:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000404300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) accept4$x25(r2, &(0x7f0000000100), &(0x7f0000000180)=0x12, 0x800) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f00000001c0), &(0x7f0000000200)=0x10) 05:04:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000884300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 640.889339][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 640.995318][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x5412, &(0x7f00000002c0)={0x5415}) 05:04:06 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:06 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000140)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0x10, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = eventfd(0x7ff) r1 = fcntl$getown(r0, 0x9) r2 = getpgrp(r1) r3 = gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r2, r3, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x5}) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) read(r4, &(0x7f0000000300)=""/128, 0x80) signalfd4(r4, &(0x7f0000a71ff8)={0x64}, 0x8, 0x0) 05:04:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000024300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000100)={0x100000001}, 0x4) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x0) faccessat(r2, &(0x7f0000000180)='./file0\x00', 0x40, 0x200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) 05:04:06 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) [ 641.609432][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000064300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:06 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000000080)=[{{0x0, 0xffffffffffffffcb, 0x0, 0x0, &(0x7f0000000700), 0xffffffffffffff7b}}], 0x400000000000175, 0x80) 05:04:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000114300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 641.905724][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 641.955527][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x2, &(0x7f00000002c0)={0x5415}) 05:04:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000884300000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0xffffffff) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0xa0, 0x0, 0x1, "c70671220fc101e1913d6c612e0ba8852b336ec502e291a26ec9a1b8a2c5ee3398479249efef216aac23dfacf2d30dd20db9a01013c4fd48d256323c29a5ee5d06aca63f78e0fa2c47794103a80d479c029faddeb5cb4b2ceea532156da6236100945af43c4f0babfc70456a041117ddb6215152b11d6afe0e2e33c0b361c9d80643f6e3484c030678e474c6aae4"}], 0xa0}}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@dev, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000700)=0xe8) sendmsg$inet6(r1, &(0x7f0000000b40)={&(0x7f0000000340)={0xa, 0x4e23, 0x6, @rand_addr="773b5ac3878c517cc0d5fd544368044c", 0x7}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000380)="dd9ce0624e76479c0993b177046e37934f50e06409b55da9bcd828360de51d28f8a7d2b8dae03ea5ad", 0x29}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="542be5b3071b439f27d2e885577b00039b3576b8edc50d627f5bf801a52b0902137c49f503dab4b94de1b3e9a6dad82ca7de6868223fe71fa199da839280a796a9fc2a2180b16e62ce", 0x49}, {&(0x7f0000000480)="a035ef9b36e993e9d2345d19e91000b8ae12afd817d57780bbca4c4a7249ade56be6a8ee3410d07335ddd1ff9622bd76c1bcb01dd70145d50d6b0e5ac05786bf7aea0bf7695dcd9f515037e69d23c75a2fe0", 0x52}, {&(0x7f0000000500)="65538661afdd56593ceabbd8a017de5de95b1dcc8ac99d59cdf621d6aa6fdfe581536c682b30e6997fa293a21ba04243c1d7e0dd19d690", 0x37}, {&(0x7f0000000540)="6522dc0837248cc4465fb6357ce107fc6584cc3429ca5a56c10374cbb63e3afa458a65188da3532c1597bbbd72e11476ea3f5e02627ded7378fcf7", 0x3b}], 0x6, &(0x7f0000000740)=[@flowinfo={{0x14, 0x29, 0xb, 0x8}}, @flowinfo={{0x14, 0x29, 0xb, 0x5}}, @hopopts={{0x140, 0x29, 0x36, {0x29, 0x24, [], [@padn={0x1, 0x2, [0x0, 0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @local}, @generic={0x7, 0xbb, "aee6955af4ed4ee71fc9a97d1646d80b324b8f3f0d98ff26cbf8aa918516bd007a0dcb9f5ebda5470679ed0be53b8352c717f83e3478627478b01e196d6404164f51ea2d22ac15ca9e3975c08cf285ef31089dbe8618e50f5436fcbc0c0b8c3d96e167cedfe1f73f8966cdcf0d61ad5234ff9715e7aea67f99fea4252348a3456cbacc5d976ac3075d0a16d9a2a353eec2d6d9e3490078aaa3520b091d825ab0f98ff2f77b0d3c4151ca62815f0a368b1795e4753164cc6c963dcb"}, @calipso={0x7, 0x10, {0x7, 0x2, 0xffffffffffffffff, 0x0, [0x6f]}}, @calipso={0x7, 0x38, {0x10000, 0xc, 0x6, 0x7, [0x7fffffff, 0x9, 0x5, 0x2, 0xffffffffffffff01, 0x4]}}]}}}, @hopopts_2292={{0x130, 0x29, 0x36, {0x0, 0x23, [], [@enc_lim={0x4, 0x1, 0x7}, @generic={0x1, 0x64, "6bbebe9101d26c1018707b36f12717b0df9416fa4a0d487bf7de5d99a0595c284cf550f7dabda8e33bf0a5f8ab49e5d1230ff9e45f826587f5fa141c4818be643004d3d4fc8442717ca2dde3ccd9a591cae2215007c07cb951611e3dbd7aee0bc6fbba6f"}, @calipso={0x7, 0x38, {0x1f, 0xc, 0x401, 0x5, [0x80000001, 0x1, 0x2, 0xce7, 0xd9, 0x80]}}, @pad1, @calipso={0x7, 0x58, {0x5, 0x14, 0x4, 0x1, [0x100000000, 0xffff, 0x3ff, 0x6e, 0x1, 0x0, 0x5, 0xfffffffffffffff7, 0x6, 0x1]}}, @ra={0x5, 0x2, 0x2}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x5}, @pad1, @pad1]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x7909}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r2}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0xad, 0x0, [], [@padn={0x1, 0x1, [0x0]}]}}}, @rthdrdstopts={{0x78, 0x29, 0x37, {0x5c, 0xc, [], [@hao={0xc9, 0x10, @rand_addr="7e56584d70c5696a565a90abbd66fc41"}, @hao={0xc9, 0x10, @rand_addr="7e8c2a076ef935549024d53a37b22f7a"}, @calipso={0x7, 0x28, {0x1, 0x8, 0x1, 0x3, [0x0, 0xfffffffffffff8c6, 0x8, 0x8000]}}, @jumbo={0xc2, 0x4, 0x1dc8}, @jumbo={0xc2, 0x4, 0x735a}, @jumbo={0xc2, 0x4, 0x3f}]}}}, @tclass={{0x14, 0x29, 0x43, 0x5}}, @rthdr_2292={{0x58, 0x29, 0x39, {0x2c, 0x8, 0x1, 0xf138, 0x0, [@local, @dev={0xfe, 0x80, [], 0x16}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast2]}}}], 0x3e8}, 0x0) mount$9p_tcp(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x20, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e20,cache=None,aname=tls\x00,rootcontext=user_u,rootcontext=user_u,smackfsfloor=tls\x00,subj_usEr=,seclabel,appraise,\x00']) 05:04:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="10000000aa0001000000"], 0x10}}], 0x1, 0x0) 05:04:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004302000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) [ 642.632968][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 642.677256][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x10, &(0x7f00000002c0)={0x5415}) 05:04:08 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 05:04:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004306000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:08 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000100)=0xffffffff, 0x6, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x142000) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1083a496ae425c69ce28ff69e3b993c38d8c3572673263b91dfb948f74bc7c9630aa4cd388ec8437043ac798a98353c07b878d5644987c3c66a7cc5a3f13fd08768b3b0a66aaee2d67934a8bf5cc29caa52ba2a469144475b686e221ba2e8e8e1234553900713e44f3212807cf562d9b9e616691d2ed91918e0a65fd1a14952f1ee722473dba1b10133e4cca2937006c02a22e70c4281d5264beb0d48bcb986beacd68"], 0x10}}], 0x1, 0x0) 05:04:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004308000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 643.361453][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:08 executing program 1 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) [ 643.428250][T21948] mmap: syz-executor.5 (21948) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 05:04:08 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 05:04:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004310000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 643.583694][T21955] FAULT_INJECTION: forcing a failure. [ 643.583694][T21955] name failslab, interval 1, probability 0, space 0, times 0 05:04:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) [ 643.704812][T21955] CPU: 0 PID: 21955 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 643.712830][T21955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.722896][T21955] Call Trace: [ 643.726205][T21955] dump_stack+0x172/0x1f0 [ 643.730554][T21955] should_fail.cold+0xa/0x15 [ 643.735166][T21955] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 643.741160][T21955] ? ___might_sleep+0x163/0x280 [ 643.746028][T21955] __should_failslab+0x121/0x190 [ 643.750981][T21955] should_failslab+0x9/0x14 [ 643.755557][T21955] kmem_cache_alloc_node+0x261/0x710 [ 643.760876][T21955] ? lockdep_hardirqs_on+0x418/0x5d0 [ 643.766184][T21955] ? trace_hardirqs_on+0x67/0x220 [ 643.771226][T21955] ? kasan_check_read+0x11/0x20 [ 643.776092][T21955] copy_process.part.0+0x1eea/0x6950 [ 643.778383][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 643.781382][T21955] ? __f_unlock_pos+0x19/0x20 [ 643.781401][T21955] ? find_held_lock+0x35/0x130 [ 643.781429][T21955] ? __cleanup_sighand+0x60/0x60 [ 643.781451][T21955] ? kasan_check_write+0x14/0x20 [ 643.811745][T21955] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 643.817316][T21955] _do_fork+0x25d/0xfe0 [ 643.821494][T21955] ? copy_init_mm+0x20/0x20 [ 643.826006][T21955] ? fput+0x1b/0x20 [ 643.829866][T21955] ? ksys_write+0x1cf/0x290 [ 643.834470][T21955] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 643.839934][T21955] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 643.845405][T21955] ? do_syscall_64+0x26/0x680 [ 643.850088][T21955] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.856158][T21955] ? do_syscall_64+0x26/0x680 [ 643.856181][T21955] __x64_sys_clone+0xbf/0x150 [ 643.856201][T21955] do_syscall_64+0xfd/0x680 [ 643.865547][T21955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.875908][T21955] RIP: 0033:0x459519 [ 643.879810][T21955] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 643.899426][T21955] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 643.907848][T21955] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 643.916435][T21955] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 643.924413][T21955] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 643.932392][T21955] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 643.940370][T21955] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x4c01, &(0x7f00000002c0)={0x5415}) 05:04:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8, 0x400) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000100)=ANY=[@ANYBLOB="0002008020000b0001000000b4f10603060000004000"/40]) pwrite64(r2, &(0x7f0000000180)="096a6b8a7a71b1f6ccb98a5162e99aada7d68a069868011415f49f580103aa2258e6cc4d43038e5d88375e12eda91a0c324bbde283b0aa9d5eff3bcc3d047670c0909a8b7f28651ac2c55196eb13143e2e694964a03d37d96b862dd52848b2cf0b622a217b2eff434fb47c323814d098205b8ea853eb08a2663c0a7c927521437ca925", 0x83, 0x0) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004311000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 05:04:09 executing program 1 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) [ 644.305264][T21992] FAULT_INJECTION: forcing a failure. [ 644.305264][T21992] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 644.364988][T21992] CPU: 1 PID: 21992 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 644.373024][T21992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.383073][T21992] Call Trace: [ 644.383103][T21992] dump_stack+0x172/0x1f0 [ 644.383127][T21992] should_fail.cold+0xa/0x15 [ 644.383148][T21992] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 644.383167][T21992] ? ___might_sleep+0x163/0x280 [ 644.383193][T21992] should_fail_alloc_page+0x50/0x60 [ 644.411182][T21992] __alloc_pages_nodemask+0x1a1/0x8d0 [ 644.411203][T21992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 644.411221][T21992] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 644.411244][T21992] ? copy_process.part.0+0x1eea/0x6950 [ 644.433999][T21992] ? lockdep_hardirqs_on+0x418/0x5d0 [ 644.439294][T21992] ? trace_hardirqs_on+0x67/0x220 [ 644.444326][T21992] ? kasan_check_read+0x11/0x20 [ 644.449192][T21992] copy_process.part.0+0x44e/0x6950 [ 644.454398][T21992] ? __f_unlock_pos+0x19/0x20 [ 644.459078][T21992] ? find_held_lock+0x35/0x130 [ 644.459108][T21992] ? __cleanup_sighand+0x60/0x60 [ 644.459128][T21992] ? kasan_check_write+0x14/0x20 [ 644.459146][T21992] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 644.459164][T21992] _do_fork+0x25d/0xfe0 [ 644.459184][T21992] ? copy_init_mm+0x20/0x20 [ 644.459207][T21992] ? fput+0x1b/0x20 [ 644.491828][T21992] ? ksys_write+0x1cf/0x290 [ 644.496357][T21992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 644.501819][T21992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 644.507288][T21992] ? do_syscall_64+0x26/0x680 [ 644.511976][T21992] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 644.518050][T21992] ? do_syscall_64+0x26/0x680 [ 644.522742][T21992] __x64_sys_clone+0xbf/0x150 [ 644.527439][T21992] do_syscall_64+0xfd/0x680 [ 644.531959][T21992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 644.537870][T21992] RIP: 0033:0x459519 [ 644.541788][T21992] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:04:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101040, 0x0) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000100)) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004388000000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300060000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 644.561429][T21992] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 644.569858][T21992] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 644.577837][T21992] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 644.585821][T21992] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 644.593811][T21992] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 644.601795][T21992] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 05:04:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1, 0x240) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000100)={0x1f, 0x0, 0x2, 0x9, 0xc28, 0x5}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x5409, &(0x7f00000002c0)={0x5415}) 05:04:10 executing program 1 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) 05:04:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 05:04:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300110000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:10 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x200) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r1, &(0x7f0000001780)=[{{0x0, 0xfffffffffffffdc7, 0x0, 0xfffffffffffffe5c, &(0x7f0000000180)=[{0x244, 0x8000}], 0x10}}], 0x40000000000022b, 0x0) 05:04:10 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) [ 645.212676][ C1] net_ratelimit: 7 callbacks suppressed [ 645.212688][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 645.270441][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300400000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:10 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x140, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000100)=0x661) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000340)=0xec) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r1, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1000000000000000001c000000eb0000df9ebd0ee177e1d4d2c1674f7008207325b21cf968b37f9149d45688c73397f64ab0969cac1dbd39cb685f43aa6c58f2ffa2944eaf587f69c6dbf838d0f3b49b5def069d80d0b01f3d5fa650178509005d4ee353139ea5e322c4a2f024a9650f988e1027f4dbc22f9365c19017a2d654030ee2034f0000000000"], 0x10}}], 0x1, 0x0) [ 645.311342][T22135] FAULT_INJECTION: forcing a failure. [ 645.311342][T22135] name failslab, interval 1, probability 0, space 0, times 0 05:04:10 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 05:04:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) [ 645.425774][T22135] CPU: 1 PID: 22135 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 645.433802][T22135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 645.443875][T22135] Call Trace: [ 645.447188][T22135] dump_stack+0x172/0x1f0 [ 645.451548][T22135] should_fail.cold+0xa/0x15 [ 645.456163][T22135] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 645.461991][T22135] ? ___might_sleep+0x163/0x280 [ 645.466860][T22135] __should_failslab+0x121/0x190 [ 645.471809][T22135] should_failslab+0x9/0x14 [ 645.476332][T22135] kmem_cache_alloc+0x2af/0x6f0 [ 645.481198][T22135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 645.488493][T22135] ? __validate_process_creds+0x22d/0x380 [ 645.494236][T22135] prepare_creds+0x3e/0x3f0 [ 645.498752][T22135] copy_creds+0x7b/0x6c0 [ 645.505467][T22135] copy_process.part.0+0xbf6/0x6950 [ 645.511274][T22135] ? __f_unlock_pos+0x19/0x20 [ 645.517952][T22135] ? find_held_lock+0x35/0x130 [ 645.522732][T22135] ? __cleanup_sighand+0x60/0x60 [ 645.527687][T22135] ? kasan_check_write+0x14/0x20 [ 645.532630][T22135] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 645.538185][T22135] _do_fork+0x25d/0xfe0 [ 645.542353][T22135] ? copy_init_mm+0x20/0x20 [ 645.546865][T22135] ? fput+0x1b/0x20 [ 645.550678][T22135] ? ksys_write+0x1cf/0x290 [ 645.555188][T22135] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 645.560647][T22135] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 645.566110][T22135] ? do_syscall_64+0x26/0x680 [ 645.570785][T22135] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 645.576857][T22135] ? do_syscall_64+0x26/0x680 [ 645.581544][T22135] __x64_sys_clone+0xbf/0x150 [ 645.586235][T22135] do_syscall_64+0xfd/0x680 [ 645.590746][T22135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 645.596637][T22135] RIP: 0033:0x459519 [ 645.600537][T22135] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 645.620641][T22135] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 645.629050][T22135] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 645.637022][T22135] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 645.644991][T22135] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 645.652958][T22135] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 645.660929][T22135] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300880000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 645.690332][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) [ 645.929405][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x540b, &(0x7f00000002c0)={0x5415}) 05:04:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300001000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:11 executing program 1 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) 05:04:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 05:04:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) bind$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x2711, @reserved}, 0x10) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:11 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000001e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) [ 646.248400][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 646.273716][T22187] FAULT_INJECTION: forcing a failure. [ 646.273716][T22187] name failslab, interval 1, probability 0, space 0, times 0 [ 646.304447][T22187] CPU: 1 PID: 22187 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 646.312464][T22187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 646.312471][T22187] Call Trace: [ 646.312499][T22187] dump_stack+0x172/0x1f0 [ 646.312523][T22187] should_fail.cold+0xa/0x15 [ 646.312546][T22187] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 646.312569][T22187] ? ___might_sleep+0x163/0x280 [ 646.312593][T22187] __should_failslab+0x121/0x190 [ 646.312624][T22187] should_failslab+0x9/0x14 [ 646.345469][T22187] __kmalloc+0x2d9/0x740 [ 646.345488][T22187] ? refcount_inc_not_zero_checked+0x144/0x200 [ 646.345505][T22187] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 646.345525][T22187] ? security_prepare_creds+0x11d/0x190 [ 646.376634][T22187] security_prepare_creds+0x11d/0x190 [ 646.382026][T22187] prepare_creds+0x2f5/0x3f0 [ 646.386634][T22187] copy_creds+0x7b/0x6c0 [ 646.390892][T22187] copy_process.part.0+0xbf6/0x6950 [ 646.396103][T22187] ? __f_unlock_pos+0x19/0x20 [ 646.400791][T22187] ? find_held_lock+0x35/0x130 [ 646.405582][T22187] ? __cleanup_sighand+0x60/0x60 [ 646.410547][T22187] ? kasan_check_write+0x14/0x20 [ 646.415504][T22187] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 646.421068][T22187] _do_fork+0x25d/0xfe0 [ 646.425247][T22187] ? copy_init_mm+0x20/0x20 [ 646.429766][T22187] ? fput+0x1b/0x20 [ 646.433592][T22187] ? ksys_write+0x1cf/0x290 [ 646.438124][T22187] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 646.443598][T22187] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 646.449069][T22187] ? do_syscall_64+0x26/0x680 [ 646.453759][T22187] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 646.459851][T22187] ? do_syscall_64+0x26/0x680 [ 646.464553][T22187] __x64_sys_clone+0xbf/0x150 [ 646.469244][T22187] do_syscall_64+0xfd/0x680 [ 646.473766][T22187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 646.479670][T22187] RIP: 0033:0x459519 [ 646.483572][T22187] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:04:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) [ 646.503188][T22187] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 646.511608][T22187] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 646.519582][T22187] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 646.527582][T22187] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 646.535581][T22187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 646.543561][T22187] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = dup3(r1, r1, 0x80000) setsockopt$inet_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000240)="64765e025ea8eab1cd449e203b9d35141ed24ec008b844ad167b4be56fe191b2e7ddf1fe390b26790ec0cea9ade920307a4e7e3c9a738d0cfb79c1ede96ed33c04c0a5e71539db37bea33e01d774c832129b9a199397b8977edc409fe35dfc30dc6986accb49dbea259c2e3e927358488d9fc7f08f6d3f8fcff63db2c7ce15fa2ca5b6b64fe0567121a9e16004c59004f81f2986cb1aae6766c42abfb70ee6046c75164c3185cecb11eef7c5cac920ab92e96d6e3a4f1f663ad063c320141e66c627df61363ac43bbf715ad25650f96a558a8771eda022d22805", 0xda) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) connect$rds(r3, &(0x7f0000000100)={0x2, 0x4e21, @rand_addr=0x80000000}, 0x10) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000002e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:11 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) [ 646.781320][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 646.842898][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x540c, &(0x7f00000002c0)={0x5415}) 05:04:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 05:04:12 executing program 1 (fault-call:2 fault-nth:4): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) 05:04:12 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000006e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xf6, 0x41) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x102}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x100, 0x70bd2b, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x80) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) [ 647.112130][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 05:04:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffffffffffe}) 05:04:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x2}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x40, 0x201, 0x77c00000000000, 0x7fffffff, r2}, 0x10) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000008e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 647.314822][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 05:04:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000011e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 647.597937][T22348] FAULT_INJECTION: forcing a failure. [ 647.597937][T22348] name failslab, interval 1, probability 0, space 0, times 0 [ 647.634737][T22348] CPU: 0 PID: 22348 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 647.642743][T22348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 647.652799][T22348] Call Trace: [ 647.656108][T22348] dump_stack+0x172/0x1f0 [ 647.660479][T22348] should_fail.cold+0xa/0x15 [ 647.665093][T22348] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 647.670926][T22348] ? ___might_sleep+0x163/0x280 [ 647.675802][T22348] __should_failslab+0x121/0x190 [ 647.680776][T22348] should_failslab+0x9/0x14 [ 647.685293][T22348] kmem_cache_alloc+0x2af/0x6f0 [ 647.690160][T22348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 647.696419][T22348] __delayacct_tsk_init+0x20/0x80 [ 647.701457][T22348] copy_process.part.0+0x4553/0x6950 [ 647.706753][T22348] ? __f_unlock_pos+0x19/0x20 [ 647.711451][T22348] ? find_held_lock+0x35/0x130 [ 647.716232][T22348] ? __cleanup_sighand+0x60/0x60 [ 647.721176][T22348] ? kasan_check_write+0x14/0x20 [ 647.726118][T22348] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 647.731666][T22348] _do_fork+0x25d/0xfe0 [ 647.735834][T22348] ? copy_init_mm+0x20/0x20 [ 647.740355][T22348] ? fput+0x1b/0x20 [ 647.744175][T22348] ? ksys_write+0x1cf/0x290 [ 647.748697][T22348] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 647.754174][T22348] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 647.759648][T22348] ? do_syscall_64+0x26/0x680 [ 647.764366][T22348] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 647.770449][T22348] ? do_syscall_64+0x26/0x680 [ 647.775150][T22348] __x64_sys_clone+0xbf/0x150 [ 647.779854][T22348] do_syscall_64+0xfd/0x680 [ 647.784384][T22348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 647.790293][T22348] RIP: 0033:0x459519 [ 647.794202][T22348] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 647.813824][T22348] RSP: 002b:00007f3dbb5c1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 647.822248][T22348] RAX: ffffffffffffffda RBX: 00007f3dbb5c1c90 RCX: 0000000000459519 [ 647.830224][T22348] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 647.838201][T22348] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 647.846184][T22348] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb5c26d4 [ 647.854168][T22348] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x540d, &(0x7f00000002c0)={0x5415}) 05:04:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) getpeername$tipc(r1, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2000, 0x0) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000100)=0x7cb238cc) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='\x00'/16], 0x10}}], 0x1, 0x0) 05:04:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000040e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:13 executing program 1 (fault-call:2 fault-nth:5): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) 05:04:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) [ 648.039435][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 648.064440][T22377] FAULT_INJECTION: forcing a failure. [ 648.064440][T22377] name failslab, interval 1, probability 0, space 0, times 0 05:04:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000100)=0xc) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0xe8cd) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0xfd98) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) [ 648.194418][T22377] CPU: 1 PID: 22377 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 648.202445][T22377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.212511][T22377] Call Trace: [ 648.215820][T22377] dump_stack+0x172/0x1f0 [ 648.220172][T22377] should_fail.cold+0xa/0x15 [ 648.224773][T22377] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 648.230601][T22377] ? ___might_sleep+0x163/0x280 [ 648.235465][T22377] __should_failslab+0x121/0x190 [ 648.240418][T22377] should_failslab+0x9/0x14 [ 648.245185][T22377] kmem_cache_alloc_trace+0x2ce/0x750 [ 648.250564][T22377] ? mark_held_locks+0xa4/0xf0 [ 648.255343][T22377] alloc_perf_context+0x49/0xf0 [ 648.260193][T22377] inherit_task_group.isra.0.part.0+0x112/0x2c0 [ 648.266434][T22377] perf_event_init_task+0x3f5/0x7a0 [ 648.271636][T22377] ? perf_event_attrs+0x40/0x40 [ 648.276484][T22377] ? sched_fork+0x3cd/0x900 [ 648.280981][T22377] ? lockdep_init_map+0x1be/0x6d0 [ 648.286013][T22377] copy_process.part.0+0x19cd/0x6950 [ 648.291295][T22377] ? __f_unlock_pos+0x19/0x20 [ 648.295990][T22377] ? __cleanup_sighand+0x60/0x60 [ 648.300936][T22377] ? kasan_check_write+0x14/0x20 [ 648.305875][T22377] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 648.311424][T22377] _do_fork+0x25d/0xfe0 [ 648.315614][T22377] ? copy_init_mm+0x20/0x20 [ 648.320135][T22377] ? fput+0x1b/0x20 [ 648.323960][T22377] ? ksys_write+0x1cf/0x290 [ 648.328468][T22377] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 648.333923][T22377] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 648.339377][T22377] ? do_syscall_64+0x26/0x680 [ 648.344052][T22377] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 648.350124][T22377] ? do_syscall_64+0x26/0x680 [ 648.354838][T22377] __x64_sys_clone+0xbf/0x150 [ 648.359524][T22377] do_syscall_64+0xfd/0x680 [ 648.364033][T22377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 648.369921][T22377] RIP: 0033:0x459519 [ 648.373815][T22377] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:04:13 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffecd) getgid() r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') socket(0x3, 0x0, 0x8) getsockname(0xffffffffffffff9c, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x80) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) gettid() ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)=0x0) getpgid(r2) gettid() stat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, 0x0}) 05:04:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000088e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 648.393427][T22377] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 648.401853][T22377] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 648.409828][T22377] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 648.417856][T22377] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 648.425836][T22377] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 648.433812][T22377] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:13 executing program 1 (fault-call:2 fault-nth:6): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) 05:04:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 05:04:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300020000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 648.667520][T22497] binder: 22487:22497 unknown command 536871488 [ 648.669709][T22502] FAULT_INJECTION: forcing a failure. [ 648.669709][T22502] name failslab, interval 1, probability 0, space 0, times 0 [ 648.687254][T22497] binder: 22487:22497 ioctl c0306201 20000440 returned -22 [ 648.895332][T22502] CPU: 1 PID: 22502 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 648.903351][T22502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.913408][T22502] Call Trace: [ 648.916714][T22502] dump_stack+0x172/0x1f0 [ 648.921051][T22502] should_fail.cold+0xa/0x15 [ 648.925653][T22502] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 648.931471][T22502] ? ___might_sleep+0x163/0x280 [ 648.936332][T22502] __should_failslab+0x121/0x190 [ 648.941277][T22502] should_failslab+0x9/0x14 [ 648.945788][T22502] kmem_cache_alloc_trace+0x2ce/0x750 [ 648.951176][T22502] ? __lock_acquire+0x54f/0x5490 [ 648.956146][T22502] ? perf_lock_task_context+0x1a9/0x6e0 [ 648.961698][T22502] perf_event_alloc.part.0+0xbf/0x3220 [ 648.967163][T22502] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 648.972809][T22502] ? __perf_event_read+0xdf0/0xdf0 [ 648.977935][T22502] inherit_event.isra.0+0x20e/0xa40 [ 648.983145][T22502] ? perf_event_create_kernel_counter+0x3f0/0x3f0 [ 648.989565][T22502] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 648.995805][T22502] ? refcount_inc_checked+0x2b/0x70 [ 649.001052][T22502] inherit_task_group.isra.0.part.0+0x75/0x2c0 [ 649.007230][T22502] perf_event_init_task+0x3f5/0x7a0 [ 649.012436][T22502] ? perf_event_attrs+0x40/0x40 [ 649.017285][T22502] ? sched_fork+0x3cd/0x900 [ 649.021782][T22502] ? lockdep_init_map+0x1be/0x6d0 [ 649.026816][T22502] copy_process.part.0+0x19cd/0x6950 [ 649.032102][T22502] ? __f_unlock_pos+0x19/0x20 [ 649.036798][T22502] ? __cleanup_sighand+0x60/0x60 [ 649.041742][T22502] ? kasan_check_write+0x14/0x20 [ 649.046681][T22502] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 649.052234][T22502] _do_fork+0x25d/0xfe0 [ 649.056396][T22502] ? copy_init_mm+0x20/0x20 [ 649.060895][T22502] ? fput+0x1b/0x20 [ 649.064696][T22502] ? ksys_write+0x1cf/0x290 [ 649.069202][T22502] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 649.074659][T22502] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 649.080134][T22502] ? do_syscall_64+0x26/0x680 [ 649.084810][T22502] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.090891][T22502] ? do_syscall_64+0x26/0x680 [ 649.095574][T22502] __x64_sys_clone+0xbf/0x150 [ 649.100252][T22502] do_syscall_64+0xfd/0x680 [ 649.104756][T22502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.110648][T22502] RIP: 0033:0x459519 [ 649.114546][T22502] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 649.134153][T22502] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 05:04:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x5413, &(0x7f00000002c0)={0x5415}) 05:04:14 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) 05:04:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x4a00, 0x0, 0x0, 0xc0ffffff, 0xffffffde}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x44e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd85, 0x10, &(0x7f0000000000), 0xfffffffffffffe64}, 0x48) 05:04:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300060000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 649.142660][T22502] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 649.150647][T22502] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 649.158622][T22502] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 649.166597][T22502] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 649.174565][T22502] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0xfffffffffffffffc) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:14 executing program 1 (fault-call:2 fault-nth:7): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) 05:04:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300100000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300110000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000080), &(0x7f0000000100)=0x30) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="ffe0381c941000000000002000000000"], 0x10}}], 0x1, 0x0) [ 649.488659][T22539] FAULT_INJECTION: forcing a failure. [ 649.488659][T22539] name failslab, interval 1, probability 0, space 0, times 0 05:04:14 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 05:04:14 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/4, 0x4}], 0x1, 0x0) [ 649.566291][T22539] CPU: 0 PID: 22539 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 649.574315][T22539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.584381][T22539] Call Trace: [ 649.587692][T22539] dump_stack+0x172/0x1f0 [ 649.592041][T22539] should_fail.cold+0xa/0x15 [ 649.596642][T22539] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 649.602460][T22539] ? ___might_sleep+0x163/0x280 [ 649.607328][T22539] __should_failslab+0x121/0x190 [ 649.612287][T22539] should_failslab+0x9/0x14 [ 649.616795][T22539] kmem_cache_alloc_trace+0x2ce/0x750 [ 649.622181][T22539] ? lock_downgrade+0x880/0x880 [ 649.627039][T22539] ? inherit_event.isra.0+0x60d/0xa40 [ 649.632428][T22539] perf_event_alloc.part.0+0xbf/0x3220 [ 649.637899][T22539] ? kasan_check_write+0x14/0x20 [ 649.642848][T22539] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 649.648404][T22539] ? __perf_event_read+0xdf0/0xdf0 [ 649.653529][T22539] ? trace_hardirqs_on+0x67/0x220 [ 649.658565][T22539] ? kasan_check_read+0x11/0x20 05:04:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300880000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 649.663427][T22539] inherit_event.isra.0+0x20e/0xa40 [ 649.668641][T22539] ? perf_event_create_kernel_counter+0x3f0/0x3f0 [ 649.675066][T22539] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 649.681308][T22539] ? refcount_inc_checked+0x2b/0x70 [ 649.686527][T22539] inherit_task_group.isra.0.part.0+0x75/0x2c0 [ 649.692698][T22539] perf_event_init_task+0x3f5/0x7a0 [ 649.697948][T22539] ? perf_event_attrs+0x40/0x40 [ 649.702802][T22539] ? sched_fork+0x3cd/0x900 [ 649.707309][T22539] ? lockdep_init_map+0x1be/0x6d0 [ 649.712362][T22539] copy_process.part.0+0x19cd/0x6950 [ 649.717649][T22539] ? __f_unlock_pos+0x19/0x20 [ 649.722357][T22539] ? __cleanup_sighand+0x60/0x60 [ 649.727316][T22539] ? kasan_check_write+0x14/0x20 [ 649.732278][T22539] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 649.737840][T22539] _do_fork+0x25d/0xfe0 [ 649.742022][T22539] ? copy_init_mm+0x20/0x20 [ 649.746536][T22539] ? fput+0x1b/0x20 [ 649.750356][T22539] ? ksys_write+0x1cf/0x290 [ 649.754868][T22539] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 649.760333][T22539] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 649.765808][T22539] ? do_syscall_64+0x26/0x680 [ 649.770494][T22539] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.776567][T22539] ? do_syscall_64+0x26/0x680 [ 649.781259][T22539] __x64_sys_clone+0xbf/0x150 [ 649.785949][T22539] do_syscall_64+0xfd/0x680 [ 649.790463][T22539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.796357][T22539] RIP: 0033:0x459519 [ 649.800260][T22539] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 649.819866][T22539] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 649.828291][T22539] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 649.836268][T22539] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 649.844240][T22539] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 649.852208][T22539] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 649.852217][T22539] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x5414, &(0x7f00000002c0)={0x5415}) 05:04:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x4a00, 0x0, 0x0, 0xc0ffffff, 0xf}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x44e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd85, 0x10, &(0x7f0000000000), 0xfffffffffffffe64}, 0x48) 05:04:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000600e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000040)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:15 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 05:04:15 executing program 1 (fault-call:2 fault-nth:8): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) 05:04:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300001100e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x9, 0x4800) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x6) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080)=0x303, 0x4) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="10000029e96fb68d4480b10000000000"], 0x10}}], 0x1, 0x0) 05:04:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0}}, 0x18) 05:04:15 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) [ 650.465313][T22582] FAULT_INJECTION: forcing a failure. [ 650.465313][T22582] name failslab, interval 1, probability 0, space 0, times 0 [ 650.485184][ C1] net_ratelimit: 3 callbacks suppressed [ 650.485195][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 650.528654][T22582] CPU: 0 PID: 22582 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 650.536675][T22582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.546731][T22582] Call Trace: [ 650.550047][T22582] dump_stack+0x172/0x1f0 [ 650.554403][T22582] should_fail.cold+0xa/0x15 [ 650.559009][T22582] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 650.564838][T22582] ? ___might_sleep+0x163/0x280 [ 650.569700][T22582] __should_failslab+0x121/0x190 [ 650.574654][T22582] should_failslab+0x9/0x14 [ 650.579167][T22582] __kmalloc+0x2d9/0x740 [ 650.582061][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 650.583417][T22582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 650.583431][T22582] ? audit_alloc+0xae/0x750 [ 650.583451][T22582] ? security_task_alloc+0x111/0x180 [ 650.610478][T22582] security_task_alloc+0x111/0x180 [ 650.615602][T22582] copy_process.part.0+0x1fe9/0x6950 [ 650.621747][T22582] ? __f_unlock_pos+0x19/0x20 [ 650.626453][T22582] ? __cleanup_sighand+0x60/0x60 [ 650.631408][T22582] ? kasan_check_write+0x14/0x20 [ 650.643222][T22582] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 650.648786][T22582] _do_fork+0x25d/0xfe0 [ 650.652959][T22582] ? copy_init_mm+0x20/0x20 [ 650.657475][T22582] ? fput+0x1b/0x20 [ 650.661289][T22582] ? ksys_write+0x1cf/0x290 [ 650.665804][T22582] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 650.671268][T22582] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 650.676734][T22582] ? do_syscall_64+0x26/0x680 [ 650.681418][T22582] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.687492][T22582] ? do_syscall_64+0x26/0x680 [ 650.692180][T22582] __x64_sys_clone+0xbf/0x150 [ 650.696874][T22582] do_syscall_64+0xfd/0x680 [ 650.701396][T22582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.707291][T22582] RIP: 0033:0x459519 05:04:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x107000, 0x0) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000100)) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1000eec2e0862ea5d917710800000000"], 0x10}}], 0x1, 0x0) 05:04:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300004000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 650.711189][T22582] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 650.730799][T22582] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 650.739220][T22582] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 650.747194][T22582] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 650.755167][T22582] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 650.763142][T22582] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 650.771117][T22582] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 [ 650.851148][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x5415, &(0x7f00000002c0)={0x5415}) 05:04:16 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0x40405515, &(0x7f0000000340)={{0x3, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x0, 0x989680}}) 05:04:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300008800e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:16 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 05:04:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="10931396b300"/16], 0x10}}], 0x1, 0x0) 05:04:16 executing program 1 (fault-call:2 fault-nth:9): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) [ 651.224501][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 651.273957][T22718] FAULT_INJECTION: forcing a failure. [ 651.273957][T22718] name failslab, interval 1, probability 0, space 0, times 0 [ 651.289026][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 651.311319][T22718] CPU: 0 PID: 22718 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 651.319345][T22718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.329452][T22718] Call Trace: [ 651.332817][T22718] dump_stack+0x172/0x1f0 [ 651.337166][T22718] should_fail.cold+0xa/0x15 [ 651.341783][T22718] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 651.347700][T22718] ? ___might_sleep+0x163/0x280 [ 651.352601][T22718] __should_failslab+0x121/0x190 [ 651.357572][T22718] should_failslab+0x9/0x14 [ 651.362088][T22718] kmem_cache_alloc+0x2af/0x6f0 [ 651.366957][T22718] ? rcu_read_lock_sched_held+0x110/0x130 05:04:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3, 0x40000) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000100), &(0x7f0000000180)=0x4) 05:04:16 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1ff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc1105511, &(0x7f0000000340)={{0x3, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x0, 0x989680}}) 05:04:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000200e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 651.372683][T22718] ? __kmalloc+0x5d2/0x740 [ 651.377106][T22718] dup_fd+0x85/0xb30 [ 651.377125][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 651.381006][T22718] ? kasan_check_write+0x14/0x20 [ 651.381027][T22718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 651.381046][T22718] ? security_task_alloc+0xed/0x180 [ 651.408389][T22718] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 651.408970][T22718] copy_process.part.0+0x20a2/0x6950 [ 651.408984][T22718] ? __f_unlock_pos+0x19/0x20 05:04:16 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) io_submit(0x0, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 05:04:16 executing program 1 (fault-call:2 fault-nth:10): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) [ 651.409014][T22718] ? __cleanup_sighand+0x60/0x60 [ 651.409036][T22718] ? kasan_check_write+0x14/0x20 05:04:16 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) sendto$inet(r0, &(0x7f0000000280)="8d3d92cf26631b83c07444", 0xb, 0xf92ba7d34d35b2df, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) [ 651.409054][T22718] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 651.409073][T22718] _do_fork+0x25d/0xfe0 [ 651.409094][T22718] ? copy_init_mm+0x20/0x20 [ 651.409109][T22718] ? fput+0x1b/0x20 [ 651.409123][T22718] ? ksys_write+0x1cf/0x290 [ 651.409142][T22718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 651.409158][T22718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 651.409173][T22718] ? do_syscall_64+0x26/0x680 [ 651.409186][T22718] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.409200][T22718] ? do_syscall_64+0x26/0x680 [ 651.409218][T22718] __x64_sys_clone+0xbf/0x150 [ 651.409236][T22718] do_syscall_64+0xfd/0x680 [ 651.409253][T22718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.409264][T22718] RIP: 0033:0x459519 [ 651.409279][T22718] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 651.409287][T22718] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 651.409301][T22718] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 651.409308][T22718] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 651.409316][T22718] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 651.409325][T22718] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 651.409333][T22718] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 [ 651.704054][T22740] FAULT_INJECTION: forcing a failure. [ 651.704054][T22740] name failslab, interval 1, probability 0, space 0, times 0 [ 651.757426][T22740] CPU: 0 PID: 22740 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 651.765444][T22740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.775508][T22740] Call Trace: [ 651.778821][T22740] dump_stack+0x172/0x1f0 [ 651.783166][T22740] should_fail.cold+0xa/0x15 [ 651.787770][T22740] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 651.793590][T22740] ? ___might_sleep+0x163/0x280 [ 651.798457][T22740] __should_failslab+0x121/0x190 [ 651.803409][T22740] should_failslab+0x9/0x14 [ 651.807916][T22740] kmem_cache_alloc_trace+0x2ce/0x750 [ 651.813296][T22740] ? lock_downgrade+0x880/0x880 [ 651.818154][T22740] alloc_fdtable+0x86/0x290 [ 651.822658][T22740] dup_fd+0x743/0xb30 [ 651.826659][T22740] copy_process.part.0+0x20a2/0x6950 [ 651.832202][T22740] ? __f_unlock_pos+0x19/0x20 [ 651.836901][T22740] ? __cleanup_sighand+0x60/0x60 [ 651.841853][T22740] ? kasan_check_write+0x14/0x20 [ 651.846800][T22740] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 651.852361][T22740] _do_fork+0x25d/0xfe0 [ 651.856524][T22740] ? copy_init_mm+0x20/0x20 [ 651.861033][T22740] ? fput+0x1b/0x20 [ 651.864846][T22740] ? ksys_write+0x1cf/0x290 [ 651.869439][T22740] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 651.874901][T22740] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 651.880374][T22740] ? do_syscall_64+0x26/0x680 [ 651.885059][T22740] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.891145][T22740] ? do_syscall_64+0x26/0x680 [ 651.895836][T22740] __x64_sys_clone+0xbf/0x150 [ 651.900525][T22740] do_syscall_64+0xfd/0x680 [ 651.905034][T22740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.905048][T22740] RIP: 0033:0x459519 [ 651.905064][T22740] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 651.905072][T22740] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 651.905103][T22740] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 651.905119][T22740] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 651.958791][T22740] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 651.958801][T22740] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 651.958810][T22740] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000240)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180), &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x8, 0x0, 0x6, 0x2}) 05:04:17 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) io_submit(0x0, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 05:04:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000600e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:17 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000200)) seccomp(0x0, 0x0, 0x0) 05:04:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x5416, &(0x7f00000002c0)={0x5415}) 05:04:17 executing program 1 (fault-call:2 fault-nth:11): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) [ 652.230431][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 652.244070][ T27] audit: type=1326 audit(1561784657.297:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=22854 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c35a code=0x0 05:04:17 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) io_submit(0x0, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) [ 652.289792][T22860] FAULT_INJECTION: forcing a failure. [ 652.289792][T22860] name failslab, interval 1, probability 0, space 0, times 0 [ 652.313556][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 652.326373][T22860] CPU: 1 PID: 22860 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 652.334376][T22860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.344456][T22860] Call Trace: [ 652.347770][T22860] dump_stack+0x172/0x1f0 [ 652.352128][T22860] should_fail.cold+0xa/0x15 [ 652.356747][T22860] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 652.362570][T22860] ? ___might_sleep+0x163/0x280 [ 652.367434][T22860] __should_failslab+0x121/0x190 [ 652.372381][T22860] should_failslab+0x9/0x14 [ 652.376891][T22860] kmem_cache_alloc_trace+0x2ce/0x750 [ 652.382273][T22860] ? lock_downgrade+0x880/0x880 [ 652.387137][T22860] alloc_fdtable+0x86/0x290 [ 652.391648][T22860] dup_fd+0x743/0xb30 [ 652.395649][T22860] copy_process.part.0+0x20a2/0x6950 [ 652.400942][T22860] ? __f_unlock_pos+0x19/0x20 [ 652.405640][T22860] ? __cleanup_sighand+0x60/0x60 [ 652.410594][T22860] ? kasan_check_write+0x14/0x20 [ 652.415552][T22860] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 652.421138][T22860] _do_fork+0x25d/0xfe0 [ 652.424246][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 652.425315][T22860] ? copy_init_mm+0x20/0x20 [ 652.425333][T22860] ? fput+0x1b/0x20 [ 652.425347][T22860] ? ksys_write+0x1cf/0x290 [ 652.425374][T22860] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 652.443781][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 652.444683][T22860] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 652.444701][T22860] ? do_syscall_64+0x26/0x680 [ 652.444717][T22860] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 652.444737][T22860] ? do_syscall_64+0x26/0x680 05:04:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000080)=""/4, &(0x7f0000000100)=0x4) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x5) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000100)=0xfffffffffffffe01, &(0x7f0000000180)=0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r3 = add_key(&(0x7f0000000480)='rxrpc\x00', &(0x7f00000004c0)={'syz', 0x2}, &(0x7f0000000500)="68b2381814", 0x5, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r3, r4) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x410}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xf4, r5, 0x20c, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x99a}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100000000}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7fffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x68, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x34}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x4eaa8bdc11439bfc}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x38}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7788d01c}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4000000000000000}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x48004) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000440)=r2) shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ff9000/0x4000)=nil) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="100010000000000000000000000000006b6458f466eb34e5fdf8c6995d785e82a8effac7158056533f71cff2f660b180deff56bf45fa603a14220eee2f0080b12ce5be"], 0x10}}], 0x1, 0x0) [ 652.486607][T22860] __x64_sys_clone+0xbf/0x150 [ 652.491311][T22860] do_syscall_64+0xfd/0x680 [ 652.495830][T22860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 652.516367][T22860] RIP: 0033:0x459519 [ 652.520283][T22860] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:04:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300001000e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r2 = shmget$private(0x0, 0x3000, 0x80, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_LOCK(r2, 0xb) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$VT_RELDISP(r3, 0x5605) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:17 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0, 0x12f}]) 05:04:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300001100e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 652.539894][T22860] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 652.539910][T22860] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 652.539918][T22860] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 652.539926][T22860] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 652.539933][T22860] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 652.539941][T22860] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:17 executing program 1 (fault-call:2 fault-nth:12): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) 05:04:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="100600000000"], 0x6}}], 0x1, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000180)={0x1, 0x3}, 0x8) [ 652.892947][T22894] FAULT_INJECTION: forcing a failure. [ 652.892947][T22894] name failslab, interval 1, probability 0, space 0, times 0 [ 652.919440][T22894] CPU: 0 PID: 22894 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 652.927454][T22894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.937515][T22894] Call Trace: [ 652.940811][T22894] dump_stack+0x172/0x1f0 [ 652.945133][T22894] should_fail.cold+0xa/0x15 [ 652.949724][T22894] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 652.955570][T22894] ? ___might_sleep+0x163/0x280 [ 652.960426][T22894] __should_failslab+0x121/0x190 [ 652.965355][T22894] should_failslab+0x9/0x14 [ 652.969853][T22894] kmem_cache_alloc_node_trace+0x26d/0x720 [ 652.975672][T22894] ? kasan_unpoison_shadow+0x35/0x50 [ 652.980966][T22894] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 652.986774][T22894] __kmalloc_node+0x3d/0x70 [ 652.991284][T22894] kvmalloc_node+0x68/0x100 [ 652.995800][T22894] alloc_fdtable+0x142/0x290 [ 653.000375][T22894] dup_fd+0x743/0xb30 [ 653.004346][T22894] copy_process.part.0+0x20a2/0x6950 [ 653.009624][T22894] ? __f_unlock_pos+0x19/0x20 [ 653.014323][T22894] ? __cleanup_sighand+0x60/0x60 [ 653.019277][T22894] ? kasan_check_write+0x14/0x20 [ 653.024214][T22894] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 653.029761][T22894] _do_fork+0x25d/0xfe0 [ 653.033923][T22894] ? copy_init_mm+0x20/0x20 [ 653.038422][T22894] ? fput+0x1b/0x20 [ 653.042224][T22894] ? ksys_write+0x1cf/0x290 [ 653.046728][T22894] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 653.052182][T22894] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 653.057635][T22894] ? do_syscall_64+0x26/0x680 [ 653.062307][T22894] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.068371][T22894] ? do_syscall_64+0x26/0x680 [ 653.073050][T22894] __x64_sys_clone+0xbf/0x150 [ 653.077730][T22894] do_syscall_64+0xfd/0x680 [ 653.082232][T22894] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.088114][T22894] RIP: 0033:0x459519 [ 653.092003][T22894] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 653.111693][T22894] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 653.120109][T22894] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 653.128084][T22894] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 653.136048][T22894] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 653.144017][T22894] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 653.151985][T22894] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:18 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x602, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 05:04:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300008800e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:18 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0, 0x12f}]) 05:04:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0xfffffffffffffffd) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2040, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x4000, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(r3, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000000)={'caif0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(r3, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000100)=0x3) getrandom(0x0, 0x0, 0x1) sendmmsg(r3, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x20084840) socket$unix(0x1, 0x5, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) sched_setparam(r5, &(0x7f0000000180)=0x7fff) dup2(r4, r3) pipe2(&(0x7f0000000480)={0xffffffffffffffff}, 0x7fd) ioctl$LOOP_SET_CAPACITY(r6, 0x4c07) socket$unix(0x1, 0x0, 0x0) fstat(r2, &(0x7f0000000380)) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000300)=ANY=[@ANYBLOB="020000000000000000201000000000008900000000000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000e7a1ff90d1d62ef33862c8ad5200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffe70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000577e5c6c4548d516a5e194065b6d09174d0b2598d10c3907946f3ebca68872ff825bf213631e3ccf535b15ceccfd261403f8577965266e0df0958d8ca3f3e9ceed365c804c911987cdd7f5048d059b90faa6675ea36bd06cc"], @ANYBLOB="000000000000000000f0000000000000a900000000000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/169], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="faffffff000000100000000000000000"], 0x10}}], 0x1, 0x0) 05:04:18 executing program 1 (fault-call:2 fault-nth:13): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) 05:04:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x5418, &(0x7f00000002c0)={0x5415}) 05:04:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000006e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 653.456639][T23012] FAULT_INJECTION: forcing a failure. [ 653.456639][T23012] name failslab, interval 1, probability 0, space 0, times 0 05:04:18 executing program 0: syz_emit_ethernet(0x22, &(0x7f00000012c0)={@local, @broadcast, [{[], {0x8100, 0x5}}], {@generic={0x88ca, "54b5f368ff86ec18277bde862b6277e6"}}}, 0x0) 05:04:18 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, 0xffffffffffffffff, 0x0, 0x12f}]) [ 653.553201][T23012] CPU: 0 PID: 23012 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 653.561231][T23012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.571300][T23012] Call Trace: [ 653.574611][T23012] dump_stack+0x172/0x1f0 [ 653.578962][T23012] should_fail.cold+0xa/0x15 [ 653.583570][T23012] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 653.589400][T23012] ? ___might_sleep+0x163/0x280 [ 653.594272][T23012] __should_failslab+0x121/0x190 [ 653.599225][T23012] should_failslab+0x9/0x14 [ 653.603741][T23012] kmem_cache_alloc+0x2af/0x6f0 [ 653.608602][T23012] ? dup_fd+0x5c1/0xb30 [ 653.612770][T23012] copy_fs_struct+0x43/0x2d0 [ 653.617376][T23012] copy_process.part.0+0x4716/0x6950 [ 653.622667][T23012] ? __f_unlock_pos+0x19/0x20 [ 653.627374][T23012] ? __cleanup_sighand+0x60/0x60 [ 653.632325][T23012] ? kasan_check_write+0x14/0x20 [ 653.637273][T23012] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 653.642836][T23012] _do_fork+0x25d/0xfe0 [ 653.647004][T23012] ? copy_init_mm+0x20/0x20 [ 653.651514][T23012] ? fput+0x1b/0x20 [ 653.655329][T23012] ? ksys_write+0x1cf/0x290 [ 653.659849][T23012] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 653.665320][T23012] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 653.670797][T23012] ? do_syscall_64+0x26/0x680 [ 653.675482][T23012] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.681558][T23012] ? do_syscall_64+0x26/0x680 [ 653.686248][T23012] __x64_sys_clone+0xbf/0x150 [ 653.690938][T23012] do_syscall_64+0xfd/0x680 [ 653.695460][T23012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.701446][T23012] RIP: 0033:0x459519 [ 653.705342][T23012] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 653.725045][T23012] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 653.733477][T23012] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 653.741454][T23012] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 05:04:18 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000000)={@remote}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) getegid() fcntl$setstatus(r0, 0x4, 0x40c00) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001740)={{{@in=@initdev, @in6=@local}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, 0x0) geteuid() r2 = socket(0x0, 0x0, 0x10004) syz_genetlink_get_family_id$ipvs(&(0x7f00000014c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000001580)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x2000080000}, 0xc, &(0x7f0000001540)={&(0x7f00000015c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000}, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) readv(r0, &(0x7f00000013c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/167, 0xa7}, {0x0}, {&(0x7f0000001380)=""/63, 0x3f}], 0x7) [ 653.749439][T23012] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 653.757421][T23012] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 653.765403][T23012] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000011e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) poll(&(0x7f0000000080)=[{r0, 0x211c}, {r1, 0x1000}, {r1, 0x2}], 0x3, 0x7fff) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="109a4300e3ff030000000000000000006483da57bf3594a2d68133d71a050d391e0217c02713343733c899f3f381f9c3b5b6b2d7f177798cab6d69fff7a33cfacbc3634bdd6c64650e82335050d5971afa692e4e387df0424f5337a9e5e43a2e05620babfaa92dd2b00e501f498404e476b194c4a52aca0da749fc213fb42adca1b33289573f7c83223ede77579348af8cbf02dad76d537ae037be"], 0x10}}], 0x1, 0x0) connect(r0, &(0x7f0000000180)=@in={0x2, 0x4e21, @local}, 0x80) 05:04:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 05:04:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000040e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:19 executing program 1 (fault-call:2 fault-nth:14): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) 05:04:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 05:04:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="100000fd9ed32b000000000000000000"], 0x10}}], 0x1, 0x0) 05:04:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x541d, &(0x7f00000002c0)={0x5415}) 05:04:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000088e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 654.295681][T23152] FAULT_INJECTION: forcing a failure. [ 654.295681][T23152] name failslab, interval 1, probability 0, space 0, times 0 [ 654.360404][T23152] CPU: 1 PID: 23152 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 654.368422][T23152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.378490][T23152] Call Trace: [ 654.381804][T23152] dump_stack+0x172/0x1f0 [ 654.386162][T23152] should_fail.cold+0xa/0x15 [ 654.390773][T23152] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 654.396616][T23152] ? ___might_sleep+0x163/0x280 [ 654.401496][T23152] __should_failslab+0x121/0x190 [ 654.406453][T23152] should_failslab+0x9/0x14 [ 654.410967][T23152] kmem_cache_alloc+0x2af/0x6f0 [ 654.415840][T23152] ? do_raw_spin_unlock+0x57/0x270 [ 654.420966][T23152] ? _raw_spin_unlock+0x2d/0x50 [ 654.425825][T23152] copy_process.part.0+0x220e/0x6950 [ 654.431119][T23152] ? __f_unlock_pos+0x19/0x20 [ 654.436085][T23152] ? __cleanup_sighand+0x60/0x60 [ 654.441037][T23152] ? kasan_check_write+0x14/0x20 [ 654.445992][T23152] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 654.451552][T23152] _do_fork+0x25d/0xfe0 [ 654.455723][T23152] ? copy_init_mm+0x20/0x20 [ 654.460229][T23152] ? fput+0x1b/0x20 [ 654.464030][T23152] ? ksys_write+0x1cf/0x290 [ 654.468538][T23152] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 654.473995][T23152] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 654.479454][T23152] ? do_syscall_64+0x26/0x680 [ 654.484131][T23152] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.490197][T23152] ? do_syscall_64+0x26/0x680 [ 654.494889][T23152] __x64_sys_clone+0xbf/0x150 [ 654.499567][T23152] do_syscall_64+0xfd/0x680 [ 654.504072][T23152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.509961][T23152] RIP: 0033:0x459519 [ 654.513857][T23152] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 654.533461][T23152] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 654.541876][T23152] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 654.549840][T23152] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 654.557810][T23152] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 654.565784][T23152] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 654.573767][T23152] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 05:04:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e25}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @broadcast}, &(0x7f00000001c0)=0x8) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1000000000000000000000000000000093b9babcc1f9b7882f281d4d3f72c709526971f0eaae4c60d99d00b1"], 0x10}}], 0x1, 0x0) 05:04:19 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x200000000a, 0xffffffffffffffff) fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xd) r4 = accept$inet(r3, 0x0, 0x0) sendto(r4, &(0x7f0000000040), 0xfe81, 0x0, 0x0, 0x100000118) lstat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open$dir(0x0, 0x0, 0x0) 05:04:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000002e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0xd8219d7c28b5cc5b) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="104600"/16], 0x10}}], 0x1, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000000180)=""/132) 05:04:19 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 05:04:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000006e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:20 executing program 1 (fault-call:2 fault-nth:15): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) 05:04:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000240)=0x2, 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r2, 0x312, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'veth1\x00'}}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x40001) 05:04:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000011e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 655.249494][T23200] FAULT_INJECTION: forcing a failure. [ 655.249494][T23200] name failslab, interval 1, probability 0, space 0, times 0 [ 655.281267][T23200] CPU: 1 PID: 23200 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 655.289305][T23200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.299365][T23200] Call Trace: [ 655.302680][T23200] dump_stack+0x172/0x1f0 [ 655.307034][T23200] should_fail.cold+0xa/0x15 [ 655.311637][T23200] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 655.317455][T23200] ? ___might_sleep+0x163/0x280 [ 655.322323][T23200] __should_failslab+0x121/0x190 [ 655.327274][T23200] should_failslab+0x9/0x14 [ 655.331785][T23200] kmem_cache_alloc+0x2af/0x6f0 [ 655.336643][T23200] ? do_raw_spin_unlock+0x57/0x270 [ 655.341762][T23200] ? _raw_spin_unlock+0x2d/0x50 [ 655.346628][T23200] copy_process.part.0+0x220e/0x6950 [ 655.351918][T23200] ? __f_unlock_pos+0x19/0x20 [ 655.356614][T23200] ? __cleanup_sighand+0x60/0x60 [ 655.361563][T23200] ? kasan_check_write+0x14/0x20 [ 655.366511][T23200] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 655.372069][T23200] _do_fork+0x25d/0xfe0 [ 655.376245][T23200] ? copy_init_mm+0x20/0x20 [ 655.380759][T23200] ? fput+0x1b/0x20 [ 655.384575][T23200] ? ksys_write+0x1cf/0x290 [ 655.389086][T23200] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 655.394580][T23200] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 655.400049][T23200] ? do_syscall_64+0x26/0x680 [ 655.404733][T23200] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.410804][T23200] ? do_syscall_64+0x26/0x680 [ 655.415494][T23200] __x64_sys_clone+0xbf/0x150 [ 655.420183][T23200] do_syscall_64+0xfd/0x680 [ 655.424698][T23200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.430587][T23200] RIP: 0033:0x459519 [ 655.434480][T23200] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 655.454087][T23200] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 655.462510][T23200] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 655.470492][T23200] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 655.478470][T23200] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 655.487730][T23200] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 655.495707][T23200] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x541e, &(0x7f00000002c0)={0x5415}) 05:04:20 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 05:04:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x80000, 0x0) connect$llc(r2, &(0x7f0000000100)={0x1a, 0x337, 0x7, 0x4, 0xbf45, 0x4, @random="a488a2b2424a"}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}}], 0x1, 0x0) 05:04:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000088e4dbb77487e90104000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 05:04:20 executing program 1 (fault-call:2 fault-nth:16): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) 05:04:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90204000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 655.683831][ C1] net_ratelimit: 9 callbacks suppressed [ 655.683843][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 655.739880][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 655.761419][T23321] FAULT_INJECTION: forcing a failure. [ 655.761419][T23321] name failslab, interval 1, probability 0, space 0, times 0 [ 655.795260][T23321] CPU: 0 PID: 23321 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 655.803281][T23321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.813344][T23321] Call Trace: [ 655.816662][T23321] dump_stack+0x172/0x1f0 [ 655.821018][T23321] should_fail.cold+0xa/0x15 [ 655.825633][T23321] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 655.831464][T23321] ? ___might_sleep+0x163/0x280 [ 655.836395][T23321] __should_failslab+0x121/0x190 [ 655.841345][T23321] should_failslab+0x9/0x14 05:04:20 executing program 2: bpf$MAP_CREATE(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) [ 655.845856][T23321] kmem_cache_alloc+0x2af/0x6f0 [ 655.850716][T23321] ? lock_downgrade+0x880/0x880 [ 655.855658][T23321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.861912][T23321] alloc_pid+0x55/0x8f0 [ 655.866085][T23321] ? kasan_check_write+0x14/0x20 [ 655.871040][T23321] copy_process.part.0+0x2edc/0x6950 [ 655.876326][T23321] ? __f_unlock_pos+0x19/0x20 [ 655.881027][T23321] ? __cleanup_sighand+0x60/0x60 [ 655.885982][T23321] ? kasan_check_write+0x14/0x20 05:04:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) personality(0xd52d78a59b4356fb) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="100000b300"/17], 0x10}}], 0x1, 0x0) [ 655.886000][T23321] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 655.886018][T23321] _do_fork+0x25d/0xfe0 [ 655.886038][T23321] ? copy_init_mm+0x20/0x20 [ 655.886052][T23321] ? fput+0x1b/0x20 [ 655.886064][T23321] ? ksys_write+0x1cf/0x290 [ 655.886082][T23321] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 655.886096][T23321] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 655.886111][T23321] ? do_syscall_64+0x26/0x680 [ 655.886124][T23321] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.886137][T23321] ? do_syscall_64+0x26/0x680 [ 655.886156][T23321] __x64_sys_clone+0xbf/0x150 [ 655.886174][T23321] do_syscall_64+0xfd/0x680 [ 655.886195][T23321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.935182][T23321] RIP: 0033:0x459519 [ 655.935199][T23321] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 655.935214][T23321] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 655.978429][T23321] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 655.978439][T23321] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 655.978447][T23321] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 655.978454][T23321] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 655.978462][T23321] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 05:04:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90304000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:21 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='devtmpfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) lseek(r1, 0x7fffffffffe, 0x1) [ 656.075984][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) fcntl$notify(r1, 0x402, 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="100000eb7100"/16], 0x10}}], 0x1, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x141400, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000180)={0x73622a85, 0xa, 0x1}) connect$llc(r2, &(0x7f0000000100)={0x1a, 0x201, 0x3, 0x0, 0x2, 0x0, @remote}, 0x10) [ 656.355384][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 656.420812][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000005c0)) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x339}, 0xffffff4c) r2 = syz_open_pts(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") ioctl$TCSETSF(r2, 0x541f, &(0x7f00000002c0)={0x5415}) 05:04:21 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) 05:04:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90404000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:21 executing program 1 (fault-call:2 fault-nth:17): perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x100000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0x0, 0x0, 0x0) 05:04:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x3c}, {0x80000006}]}, 0x10) 05:04:21 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x3, @ipv4={[], [], @local}, 0x1}, @in={0x2, 0x4e21, @local}], 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) socket$inet6_sctp(0xa, 0x5, 0x84) write$vnet(r0, &(0x7f0000000580)={0x1, {&(0x7f00000003c0)=""/240, 0xf0, &(0x7f00000004c0)=""/167, 0x3, 0x7}}, 0x68) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)={0x3, {{0xa, 0x4e23, 0x4, @ipv4={[], [], @broadcast}, 0x300}}, 0x0, 0x3, [{{0xa, 0x4e20, 0x2, @remote, 0x3b}}, {{0xa, 0x4e22, 0x80000001, @dev={0xfe, 0x80, [], 0xb}, 0x3}}, {{0xa, 0x4e22, 0x0, @mcast2, 0x3}}]}, 0x210) tee(r1, r1, 0x99, 0x1) tee(r0, r2, 0x2, 0xd) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) fsetxattr$security_evm(r2, &(0x7f0000000600)='security.evm\x00', &(0x7f0000000640)=@md5={0x1, "5c39962bb2fd1268dd5b8faef40d28f5"}, 0x11, 0x69a5a38d2c55f90e) ioctl$void(r2, 0xc0045878) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r1, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='\x00\x00'], 0x1d0}}], 0x0, 0x0) [ 656.599307][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 656.632154][T23561] FAULT_INJECTION: forcing a failure. [ 656.632154][T23561] name failslab, interval 1, probability 0, space 0, times 0 05:04:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90504000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) 05:04:21 executing program 0: [ 656.675090][T23561] CPU: 0 PID: 23561 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 656.683113][T23561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.693172][T23561] Call Trace: [ 656.696481][T23561] dump_stack+0x172/0x1f0 [ 656.700830][T23561] should_fail.cold+0xa/0x15 [ 656.705437][T23561] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 656.711273][T23561] ? ___might_sleep+0x163/0x280 [ 656.711295][T23561] __should_failslab+0x121/0x190 [ 656.711313][T23561] should_failslab+0x9/0x14 [ 656.711326][T23561] kmem_cache_alloc+0x2af/0x6f0 [ 656.711338][T23561] ? __alloc_fd+0x44d/0x560 [ 656.711365][T23561] ? find_held_lock+0x35/0x130 [ 656.739725][T23561] __d_alloc+0x2e/0x8c0 [ 656.743895][T23561] d_alloc_pseudo+0x1e/0x70 [ 656.748410][T23561] alloc_file_pseudo+0xe2/0x280 [ 656.753273][T23561] ? alloc_file+0x4d0/0x4d0 [ 656.757824][T23561] ? _raw_spin_unlock+0x2d/0x50 [ 656.762717][T23561] ? __alloc_fd+0x44d/0x560 [ 656.767243][T23561] anon_inode_getfile+0xda/0x200 05:04:21 executing program 0: [ 656.772198][T23561] copy_process.part.0+0x65ed/0x6950 [ 656.777486][T23561] ? __f_unlock_pos+0x19/0x20 [ 656.782189][T23561] ? __cleanup_sighand+0x60/0x60 [ 656.787139][T23561] ? kasan_check_write+0x14/0x20 [ 656.792080][T23561] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 656.797634][T23561] _do_fork+0x25d/0xfe0 [ 656.801804][T23561] ? copy_init_mm+0x20/0x20 [ 656.806318][T23561] ? fput+0x1b/0x20 [ 656.810142][T23561] ? ksys_write+0x1cf/0x290 [ 656.814661][T23561] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 656.820134][T23561] ? trace_hardirqs_on_thunk+0x1a/0x1c 05:04:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) close(r0) lgetxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB='q'], 0x0, 0x0) [ 656.825600][T23561] ? do_syscall_64+0x26/0x680 [ 656.830285][T23561] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 656.836361][T23561] ? do_syscall_64+0x26/0x680 [ 656.841051][T23561] __x64_sys_clone+0xbf/0x150 [ 656.845743][T23561] do_syscall_64+0xfd/0x680 [ 656.850262][T23561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 656.856156][T23561] RIP: 0033:0x459519 [ 656.860060][T23561] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 656.879673][T23561] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 656.888097][T23561] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 656.896123][T23561] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 656.896133][T23561] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 656.896140][T23561] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 656.896147][T23561] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 [ 656.902762][T23561] kasan: CONFIG_KASAN_INLINE enabled [ 656.934896][T23561] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 656.947309][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:04:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="10000000011001000000000000000000"], 0x10}}], 0x1, 0x0) 05:04:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e61783167377400000100000000004300000000e4dbb77487e90105000000000040800000000000001b2300000503000018030000cc000000ac030000000000007e6dd28264b64f8dfac0dc1695c4d600001004000210040002d32379b87c5ade6f27a603551ae6543351c2f2d3c00f3f72e211777424c9814f1f852110e5d4a50b060000006b6312d04b000060aab341cfe8364422b866cd445d5d0f4d6715ba085916323e00000000000071cfe0a09044324001ea6716c1e50095"], 0x1) [ 656.974329][T23561] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 656.981342][T23561] CPU: 0 PID: 23561 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #43 [ 656.989765][T23561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.999838][T23561] RIP: 0010:get_task_pid+0xa7/0x2e0 [ 657.005040][T23561] Code: e8 6e 78 25 00 85 db 0f 85 fa 00 00 00 e8 e1 76 25 00 49 8d bd 38 05 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 0a 02 00 00 4d 8b a5 38 05 00 00 e8 b3 76 25 00 [ 657.023247][ T3880] kobject: 'loop5' (00000000c217bf35): kobject_uevent_env [ 657.024676][T23561] RSP: 0018:ffff88805e7f7da0 EFLAGS: 00010203 [ 657.037833][T23561] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90007ff2000 [ 657.045811][T23561] RDX: 00000000000000a7 RSI: ffffffff814b4c2f RDI: 000000000000053e [ 657.047964][ T3880] kobject: 'loop5' (00000000c217bf35): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 657.053787][T23561] RBP: ffff88805e7f7db8 R08: ffff8880596c0680 R09: ffffed1015d06c70 [ 657.053795][T23561] R10: ffffed1015d06c6f R11: ffff8880ae83637b R12: 0000000000000001 [ 657.053803][T23561] R13: 0000000000000006 R14: 0000000000000000 R15: ffffffffffffffea [ 657.053814][T23561] FS: 00007f3dbb604700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 657.053822][T23561] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 657.053840][T23561] CR2: 00007fed50009db8 CR3: 000000008fff9000 CR4: 00000000001406f0 [ 657.111374][T23561] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 657.115847][ T3880] kobject: 'loop4' (0000000068a01c6e): kobject_uevent_env [ 657.119349][T23561] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 657.119360][T23561] Call Trace: [ 657.119383][T23561] _do_fork+0x2f2/0xfe0 [ 657.119401][T23561] ? copy_init_mm+0x20/0x20 [ 657.119415][T23561] ? fput+0x1b/0x20 [ 657.119426][T23561] ? ksys_write+0x1cf/0x290 [ 657.119444][T23561] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 657.119465][T23561] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 657.138398][ T3880] kobject: 'loop4' (0000000068a01c6e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 657.141968][T23561] ? do_syscall_64+0x26/0x680 [ 657.141985][T23561] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 657.142006][T23561] ? do_syscall_64+0x26/0x680 [ 657.191588][T23561] __x64_sys_clone+0xbf/0x150 [ 657.196281][T23561] do_syscall_64+0xfd/0x680 [ 657.200809][T23561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 657.203053][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 657.206700][T23561] RIP: 0033:0x459519 [ 657.206717][T23561] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 657.206724][T23561] RSP: 002b:00007f3dbb603c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 657.206736][T23561] RAX: ffffffffffffffda RBX: 00007f3dbb603c90 RCX: 0000000000459519 [ 657.206742][T23561] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001100 [ 657.206749][T23561] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 657.206756][T23561] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3dbb6046d4 [ 657.206763][T23561] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 [ 657.206775][T23561] Modules linked in: [ 657.230897][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 657.242992][T23561] ---[ end trace 319ac58abec485a1 ]--- [ 657.276633][ T3880] kobject: 'loop5' (00000000c217bf35): kobject_uevent_env [ 657.296058][T23561] RIP: 0010:get_task_pid+0xa7/0x2e0 [ 657.316115][ T3880] kobject: 'loop5' (00000000c217bf35): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 657.320337][T23561] Code: e8 6e 78 25 00 85 db 0f 85 fa 00 00 00 e8 e1 76 25 00 49 8d bd 38 05 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 0a 02 00 00 4d 8b a5 38 05 00 00 e8 b3 76 25 00 [ 657.339569][ T3880] kobject: 'loop4' (0000000068a01c6e): kobject_uevent_env [ 657.362888][ T3880] kobject: 'loop4' (0000000068a01c6e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 657.368936][T23561] RSP: 0018:ffff88805e7f7da0 EFLAGS: 00010203 [ 657.379271][T23561] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90007ff2000 [ 657.387967][T23561] RDX: 00000000000000a7 RSI: ffffffff814b4c2f RDI: 000000000000053e [ 657.396392][T23561] RBP: ffff88805e7f7db8 R08: ffff8880596c0680 R09: ffffed1015d06c70 [ 657.404517][T23561] R10: ffffed1015d06c6f R11: ffff8880ae83637b R12: 0000000000000001 [ 657.412708][T23561] R13: 0000000000000006 R14: 0000000000000000 R15: ffffffffffffffea [ 657.424013][T23561] FS: 00007f3dbb604700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 657.433810][T23561] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 657.442086][T23561] CR2: 0000001b31522000 CR3: 000000008fff9000 CR4: 00000000001406e0 [ 657.450426][T23561] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 657.458595][T23561] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 657.468004][T23561] Kernel panic - not syncing: Fatal exception [ 657.475325][T23561] Kernel Offset: disabled [ 657.479657][T23561] Rebooting in 86400 seconds..